Results 31 to 40 of about 1,586,399 (314)

Deep Learning-based Side Channel Attack on HMAC SM3

open access: yesInternational Journal of Interactive Multimedia and Artificial Intelligence, 2021
SM3 is a Chinese hash standard. HMAC SM3 uses a secret key to encrypt the input text and gives an output as the HMAC of the input text. If the key is recovered, adversaries can easily forge a valid HMAC.
Xin Jin   +3 more
doaj   +1 more source

Symbolic Analysis of Higher-Order Side Channel Countermeasures [PDF]

open access: yesIEEE Transactions on Computers, 2017
In this paper, we deal with the problem of efficiently assessing the higher order vulnerability of a hardware cryptographic circuit. Our main concern is to provide methods that allow a circuit designer to detect early in the design cycle if the implementation of a Boolean-additive masking countermeasure does not hold up to the required protection order.
Bisi E, Melzani F, Zaccaria V
openaire   +2 more sources

Enhancing Time-Frequency Analysis with Zero-Mean Preprocessing

open access: yesSensors, 2022
Side-channel analysis is a critical threat to cryptosystems on the Internet of Things and in relation to embedded devices, and appropriate side-channel countermeasure must be required for physical security.
Sunghyun Jin   +3 more
doaj   +1 more source

A Security Analysis of IoT Encryption: Side-channel Cube Attack on Simeck32/64 [PDF]

open access: yes, 2018
Simeck, a lightweight block cipher has been proposed to be one of the encryption that can be employed in the Internet of Things (IoT) applications. Therefore, this paper presents the security of the Simeck32/64 block cipher against side-channel cube ...
Abdul-Latip, Shekh Faisal   +2 more
core   +2 more sources

Implementation of Disassembler on Microcontroller Using Side-Channel Power Consumption Leakage

open access: yesSensors, 2022
With the development of 5G and network technology, the usage of IoT devices has become popular. Because most of these IoT devices can be controlled by an adversary away from the administrator, several security issues such as firmware dumping can arise ...
Daehyeon Bae, Jaecheol Ha
doaj   +1 more source

Deep Learning Method for Power Side-Channel Analysis on Chip Leakages

open access: yesElektronika ir Elektrotechnika, 2023
Power side channel analysis signal analysis is automated using deep learning. Signal processing and cryptanalytic techniques are necessary components of power side channel analysis.
Amjed Abbas Ahmed   +2 more
doaj   +1 more source

The Three Node Wireless Network: Achievable Rates and Cooperation Strategies

open access: yes, 2005
We consider a wireless network composed of three nodes and limited by the half-duplex and total power constraints. This formulation encompasses many of the special cases studied in the literature and allows for capturing the common features shared by ...
Gamal, Hesham El, Lai, Lifeng, Liu, Ke
core   +3 more sources

StaTI: Protecting against Fault Attacks Using Stable Threshold Implementations

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2023
Fault attacks impose a serious threat against the practical implementations of cryptographic algorithms. Statistical Ineffective Fault Attacks (SIFA), exploiting the dependency between the secret data and the fault propagation overcame many of the known
Siemen Dhooghe   +2 more
doaj   +1 more source

A Taxonomy-Based Survey of EM-SCA and Implications for Multi-Robot Systems

open access: yesIEEE Open Journal of the Computer Society
Electromagnetic Side Channel Analysis (EM-SCA) is a major area of interest within the field of cybersecurity. EM-SCA makes use of the electromagnetic radiation that naturally leaks from any device that runs on electricity.
Yomna Mokhtar Ibrahim   +3 more
doaj   +1 more source

Convolutional Neural Networks for Profiled Side-channel Analysis [PDF]

open access: yesRadioengineering, 2019
Recent studies have shown that deep learning algorithms are very effective for evaluating the security of embedded systems. The deep learning technique represented by Convolutional Neural Networks (CNNs) has proven to be a promising paradigm in the ...
S. R. Hou, Y. J. Zhou, H. M. Liu
doaj  

Home - About - Disclaimer - Privacy