Results 281 to 290 of about 1,586,399 (314)
Some of the next articles are maybe not open access.

Abacus: Precise Side-Channel Analysis

2021 IEEE/ACM 43rd International Conference on Software Engineering (ICSE), 2021
Side-channel attacks allow adversaries to infer sensitive information from non-functional characteristics. Prior side-channel detection work is able to identify numerous potential vulnerabilities. However, in practice, many such vulnerabilities leak a negligible amount of sensitive information, and thus developers are often reluctant to address them ...
Qinkun Bao   +4 more
openaire   +1 more source

Side channel analysis of SPECK

Journal of Computer Security, 2020
SPECK is a family of lightweight block ciphers developed by Beaulieu et al. of the US National Security Agency (NSA) for the Internet of Things (IoT). It is an ARX-based design with a Feistel-like structure which supports keys of size ranging from 64 bits to 256 bits.
Joseph, Mabin   +2 more
openaire   +1 more source

Side Channel Analysis Resistant Design Flow

2006 IEEE International Symposium on Circuits and Systems, 2006
The threat of side-channel attacks (SCA) is of crucial importance when designing systems with cryptographic hardware or software. The FP6-funded project SCARD enhances the typical micro-chip design flow in order to provide a means for designing side-channel resistant circuits and systems.
Aigner, M   +7 more
openaire   +2 more sources

Side-Channel Analysis of Keymill

2017
One prominent countermeasure against side-channel attacks, especially differential power analysis (DPA), is fresh re-keying. In such schemes, the so-called re-keying function takes the burden of protecting a cryptographic primitive against DPA. To ensure the security of the scheme against side-channel analysis, the re-keying function has to withstand ...
Christoph Dobraunig   +3 more
openaire   +1 more source

Photonic Side-Channel Analysis of Arbiter PUFs

Journal of Cryptology, 2016
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Tajik, Shahin   +8 more
openaire   +3 more sources

Use of Simulators for Side-Channel Analysis

2017 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW), 2017
Side-channel attacks are among the most powerful and cost-effective attacks on cryptographic systems. Simulators that are developed for side-channel analysis are very useful for preliminary analysis of new schemes, in depth analysis of existing schemes as well as for analysis of products on early stages of development. The contribution of this paper is
Nikita Veshchikov, Sylvain Guilley
openaire   +1 more source

Federated Learning in Side-Channel Analysis

2021
Recently introduced federated learning is an attractive framework for the distributed training of deep learning models with thousands of participants. However, it can potentially be used with malicious intent. For example, adversaries can use their smartphones to jointly train a classifier for extracting secret keys from the smartphones’ SIM cards ...
Huanyu Wang, Elena Dubrova
openaire   +1 more source

Low-cost solutions for preventing simple side-channel analysis: side-channel atomicity

IEEE Transactions on Computers, 2004
We introduce simple methods to convert a cryptographic algorithm into an algorithm protected against simple side-channel attacks. Contrary to previously known solutions, the proposed techniques are not at the expense of the execution time. Moreover, they are generic and apply to virtually any algorithm.
B. Chevallier-Mames, M. Ciet, M. Joye
openaire   +1 more source

Deep Learning on Side-Channel Analysis

2022
Item does not contain ...
Krček, M.   +6 more
openaire   +2 more sources

Photonic Side-Channel Analysis

2018
In this chapter, we demonstrate that the primary security assumption on the infeasibility of direct delay measurements in delay-based PUFs is not valid. By performing an experiment on a PoC Arbiter PUF implementation on reconfigurable hardware, it becomes apparent that The Arbiter PUF family and more generally, the delay-based PUFs can be characterized
openaire   +1 more source

Home - About - Disclaimer - Privacy