Results 41 to 50 of about 2,364,158 (363)

On XTR and Side-Channel Analysis [PDF]

open access: yes, 2004
Over the past few years, there has been a large volume of work on both attacking elliptic curve cryptosystems (ECC) using side-channel analysis and the development of related defence methods. Lenstra and Verheul recently introduced XTR, a cryptosystem that can compete with ECC in terms of processing and bandwidth requirements. These properties make XTR
Page, Daniel, Stam, Martijn
openaire   +2 more sources

DifFuzz: Differential Fuzzing for Side-Channel Analysis [PDF]

open access: yes2019 IEEE/ACM 41st International Conference on Software Engineering (ICSE), 2019
This summary is based on our research results on ``DifFuzz: Differential Fuzzing for Side-Channel Analysis'' which was published in the proceedings of the 41st International Conference on Software Engineering. Side-channel analysis aims to investigate the risk that a potential attacker can infer any secret information through observations of the system,
Yannic Noller   +2 more
openaire   +3 more sources

Hypothesis Testing Based Side-Channel Collision Analysis

open access: yesIEEE Access, 2019
Side-channel collision analysis has become a research hotspot since its first publication in 2003. Compared with differential power analysis (DPA) and correlation power analysis (CPA), collision analysis does not need to know the intermediate value and ...
Dong Zheng, Xiang Jia, Meiling Zhang
doaj   +1 more source

Electromagnetic Side-Channel Analysis for IoT Forensics: Challenges, Framework, and Datasets

open access: yesIEEE Access, 2021
Electromagnetic (EM) side-channel radiation from Internet of Things (IoT) devices are shown to be effective at acquiring forensic insights during digital investigations.
Asanka P. Sayakkara, Nhien-An Le-Khac
semanticscholar   +1 more source

SCAUL: Power Side-Channel Analysis With Unsupervised Learning [PDF]

open access: yesIEEE transactions on computers, 2020
Existing power analysis techniques rely on strong adversary models with prior knowledge of the leakage or training data. We introduce side-channel analysis with unsupervised learning (SCAUL) that can recover the secret key without requiring prior ...
Keyvan Ramezanpour   +2 more
semanticscholar   +1 more source

Challenging Assumptions of Normality in AES s-Box Configurations under Side-Channel Analysis

open access: yesJournal of Cybersecurity and Privacy, 2023
Power-based Side-Channel Analysis (SCA) began with visual-based examinations and has progressed to utilize data-driven statistical analysis. Two distinct classifications of these methods have emerged over the years; those focused on leakage exploitation ...
Clay Carper   +4 more
doaj   +1 more source

Practical challenges in data‐driven interpolation: Dealing with noise, enforcing stability, and computing realizations

open access: yesInternational Journal of Adaptive Control and Signal Processing, EarlyView., 2023
Summary In this contribution, we propose a detailed study of interpolation‐based data‐driven methods that are of relevance in the model reduction and also in the systems and control communities. The data are given by samples of the transfer function of the underlying (unknown) model, that is, we analyze frequency‐response data.
Quirin Aumann, Ion Victor Gosea
wiley   +1 more source

Single Trace Side Channel Analysis on NTRU Implementation

open access: yesApplied Sciences, 2018
As researches on the quantum computer have progressed immensely, interests in post-quantum cryptography have greatly increased. NTRU is one of the well-known algorithms due to its practical key sizes and fast performance along with the resistance against
Soojung An   +4 more
doaj   +1 more source

Forensic Insights From Smartphones Through Electromagnetic Side-Channel Analysis

open access: yesIEEE Access, 2021
The increasing use of smartphones has increased their presence in legal and corporate investigations. Unlike desktop and laptop computers, forensic analysis of smartphones is a challenging task due to their limited interfaces to retrieve information of ...
Asanka P. Sayakkara, Nhien-An Le-Khac
doaj   +1 more source

JitSCA: Jitter-based Side-Channel Analysis in Picoscale Resolution

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2023
In safety and security conscious environments, isolated communication channels are often deemed necessary. Galvanically isolated communication channels are typically expected not to allow physical side-channel attacks through that channel.
Kai Schoos   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy