Results 31 to 40 of about 1,586,399 (314)
Deep Learning-based Side Channel Attack on HMAC SM3
SM3 is a Chinese hash standard. HMAC SM3 uses a secret key to encrypt the input text and gives an output as the HMAC of the input text. If the key is recovered, adversaries can easily forge a valid HMAC.
Xin Jin +3 more
doaj +1 more source
Symbolic Analysis of Higher-Order Side Channel Countermeasures [PDF]
In this paper, we deal with the problem of efficiently assessing the higher order vulnerability of a hardware cryptographic circuit. Our main concern is to provide methods that allow a circuit designer to detect early in the design cycle if the implementation of a Boolean-additive masking countermeasure does not hold up to the required protection order.
Bisi E, Melzani F, Zaccaria V
openaire +2 more sources
Enhancing Time-Frequency Analysis with Zero-Mean Preprocessing
Side-channel analysis is a critical threat to cryptosystems on the Internet of Things and in relation to embedded devices, and appropriate side-channel countermeasure must be required for physical security.
Sunghyun Jin +3 more
doaj +1 more source
A Security Analysis of IoT Encryption: Side-channel Cube Attack on Simeck32/64 [PDF]
Simeck, a lightweight block cipher has been proposed to be one of the encryption that can be employed in the Internet of Things (IoT) applications. Therefore, this paper presents the security of the Simeck32/64 block cipher against side-channel cube ...
Abdul-Latip, Shekh Faisal +2 more
core +2 more sources
Implementation of Disassembler on Microcontroller Using Side-Channel Power Consumption Leakage
With the development of 5G and network technology, the usage of IoT devices has become popular. Because most of these IoT devices can be controlled by an adversary away from the administrator, several security issues such as firmware dumping can arise ...
Daehyeon Bae, Jaecheol Ha
doaj +1 more source
Deep Learning Method for Power Side-Channel Analysis on Chip Leakages
Power side channel analysis signal analysis is automated using deep learning. Signal processing and cryptanalytic techniques are necessary components of power side channel analysis.
Amjed Abbas Ahmed +2 more
doaj +1 more source
The Three Node Wireless Network: Achievable Rates and Cooperation Strategies
We consider a wireless network composed of three nodes and limited by the half-duplex and total power constraints. This formulation encompasses many of the special cases studied in the literature and allows for capturing the common features shared by ...
Gamal, Hesham El, Lai, Lifeng, Liu, Ke
core +3 more sources
StaTI: Protecting against Fault Attacks Using Stable Threshold Implementations
Fault attacks impose a serious threat against the practical implementations of cryptographic algorithms. Statistical Ineffective Fault Attacks (SIFA), exploiting the dependency between the secret data and the fault propagation overcame many of the known
Siemen Dhooghe +2 more
doaj +1 more source
A Taxonomy-Based Survey of EM-SCA and Implications for Multi-Robot Systems
Electromagnetic Side Channel Analysis (EM-SCA) is a major area of interest within the field of cybersecurity. EM-SCA makes use of the electromagnetic radiation that naturally leaks from any device that runs on electricity.
Yomna Mokhtar Ibrahim +3 more
doaj +1 more source
Convolutional Neural Networks for Profiled Side-channel Analysis [PDF]
Recent studies have shown that deep learning algorithms are very effective for evaluating the security of embedded systems. The deep learning technique represented by Convolutional Neural Networks (CNNs) has proven to be a promising paradigm in the ...
S. R. Hou, Y. J. Zhou, H. M. Liu
doaj

