Results 41 to 50 of about 2,364,158 (363)
On XTR and Side-Channel Analysis [PDF]
Over the past few years, there has been a large volume of work on both attacking elliptic curve cryptosystems (ECC) using side-channel analysis and the development of related defence methods. Lenstra and Verheul recently introduced XTR, a cryptosystem that can compete with ECC in terms of processing and bandwidth requirements. These properties make XTR
Page, Daniel, Stam, Martijn
openaire +2 more sources
DifFuzz: Differential Fuzzing for Side-Channel Analysis [PDF]
This summary is based on our research results on ``DifFuzz: Differential Fuzzing for Side-Channel Analysis'' which was published in the proceedings of the 41st International Conference on Software Engineering. Side-channel analysis aims to investigate the risk that a potential attacker can infer any secret information through observations of the system,
Yannic Noller+2 more
openaire +3 more sources
Hypothesis Testing Based Side-Channel Collision Analysis
Side-channel collision analysis has become a research hotspot since its first publication in 2003. Compared with differential power analysis (DPA) and correlation power analysis (CPA), collision analysis does not need to know the intermediate value and ...
Dong Zheng, Xiang Jia, Meiling Zhang
doaj +1 more source
Electromagnetic Side-Channel Analysis for IoT Forensics: Challenges, Framework, and Datasets
Electromagnetic (EM) side-channel radiation from Internet of Things (IoT) devices are shown to be effective at acquiring forensic insights during digital investigations.
Asanka P. Sayakkara, Nhien-An Le-Khac
semanticscholar +1 more source
SCAUL: Power Side-Channel Analysis With Unsupervised Learning [PDF]
Existing power analysis techniques rely on strong adversary models with prior knowledge of the leakage or training data. We introduce side-channel analysis with unsupervised learning (SCAUL) that can recover the secret key without requiring prior ...
Keyvan Ramezanpour+2 more
semanticscholar +1 more source
Challenging Assumptions of Normality in AES s-Box Configurations under Side-Channel Analysis
Power-based Side-Channel Analysis (SCA) began with visual-based examinations and has progressed to utilize data-driven statistical analysis. Two distinct classifications of these methods have emerged over the years; those focused on leakage exploitation ...
Clay Carper+4 more
doaj +1 more source
Summary In this contribution, we propose a detailed study of interpolation‐based data‐driven methods that are of relevance in the model reduction and also in the systems and control communities. The data are given by samples of the transfer function of the underlying (unknown) model, that is, we analyze frequency‐response data.
Quirin Aumann, Ion Victor Gosea
wiley +1 more source
Single Trace Side Channel Analysis on NTRU Implementation
As researches on the quantum computer have progressed immensely, interests in post-quantum cryptography have greatly increased. NTRU is one of the well-known algorithms due to its practical key sizes and fast performance along with the resistance against
Soojung An+4 more
doaj +1 more source
Forensic Insights From Smartphones Through Electromagnetic Side-Channel Analysis
The increasing use of smartphones has increased their presence in legal and corporate investigations. Unlike desktop and laptop computers, forensic analysis of smartphones is a challenging task due to their limited interfaces to retrieve information of ...
Asanka P. Sayakkara, Nhien-An Le-Khac
doaj +1 more source
JitSCA: Jitter-based Side-Channel Analysis in Picoscale Resolution
In safety and security conscious environments, isolated communication channels are often deemed necessary. Galvanically isolated communication channels are typically expected not to allow physical side-channel attacks through that channel.
Kai Schoos+3 more
doaj +1 more source