Results 31 to 40 of about 2,364,158 (363)

Side-channel analysis in frequency domain with clustering

open access: yesDianzi Jishu Yingyong, 2021
The alignment of power traces is one of the key factors affecting the success of side-channel analysis. Frequency-domain side-channel analysis can effectively solve the alignment of power traces in the time domain.
Cai Juesong   +3 more
doaj   +1 more source

Side-channel Analysis of Lattice-based Post-quantum Cryptography: Exploiting Polynomial Multiplication

open access: yesIACR Cryptology ePrint Archive, 2022
Polynomial multiplication algorithms such as Toom-Cook and the Number Theoretic Transform are fundamental building blocks for lattice-based post-quantum cryptography.
Catinca Mujdei   +5 more
semanticscholar   +1 more source

Analysis of the algebraic side channel attack [PDF]

open access: yesJournal of Cryptographic Engineering, 2012
At CHES 2009, Renauld, Standaert and Veyrat-Charvillon introduced a new kind of attack called Algebraic Side-Channel Attacks (ASCA). They showed that side-channel information leads to effective algebraic attacks. These results are mostly experiments strongly based on a the use of a SAT-solver.
Jean-Charles Faugère   +4 more
openaire   +4 more sources

Side-Channel Power Analysis Based on SA-SVM

open access: yesApplied Sciences, 2023
Support vector machines (SVMs) have been widely used in side-channel power analysis. The selection of the penalty factor and kernel parameter heavily influences how well support vector machines work.
Ying Zhang   +4 more
doaj   +1 more source

Experimental Side Channel Analysis of BB84 QKD Source [PDF]

open access: yesIEEE Journal of Quantum Electronics, 2021
A typical implementation of BB84 protocol for quantum communication uses four laser diodes for transmitting weak coherent pulses, which may not have the same characteristics.
A. Biswas   +4 more
semanticscholar   +1 more source

Overview of Side Channel Analysis Based on Convolutional Neural Network [PDF]

open access: yesJisuanji kexue, 2022
The profiled side-channel analysis method can effectively attack the implementation of cryptographic,and the side-channel cryptanalysis method based on convolutional neural network (CNNSCA) can efficiently carry out cryptographic attacks,and even can ...
LIU Lin-yun, CHEN Kai-yan, LI Xiong-wei, ZHANG Yang, XIE Fang-fang
doaj   +1 more source

Deep Learning Side-Channel Collision Attack

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2023
With the breakthrough of Deep Neural Networks, many fields benefited from its enormously increasing performance. Although there is an increasing trend to utilize Deep Learning (DL) for Side-Channel Analysis (SCA) attacks, previous works made specific ...
Marvin Staib, Amir Moradi
doaj   +1 more source

Polynomial Evaluation and Side Channel Analysis [PDF]

open access: yes, 2016
Side Channel Analysis (SCA) is a class of attacks that exploits leakage of information from a cryptographic implementation during execution. To thwart it, masking is a common countermeasure. The principle is to randomly split every sensitive intermediate variable occurring in the computation into several shares and the number of shares, called the ...
Carlet, Claude, Prouff, Emmanuel
openaire   +4 more sources

The Benefits and Costs of Netlist Randomization Based Side-Channel Countermeasures: An In-Depth Evaluation

open access: yesJournal of Low Power Electronics and Applications, 2022
Exchanging FPGA-based implementations of cryptographic algorithms during run-time using netlist randomized versions has been introduced recently as a unique countermeasure against side channel attacks.
Ali Asghar   +2 more
doaj   +1 more source

Share-slicing: Friend or Foe?

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2019
Masking is a well loved and widely deployed countermeasure against side channel attacks, in particular in software. Under certain assumptions (w.r.t.
Si Gao   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy