Results 71 to 80 of about 373,745 (119)
Some of the next articles are maybe not open access.

Use of Simulators for Side-Channel Analysis

2017 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW), 2017
Side-channel attacks are among the most powerful and cost-effective attacks on cryptographic systems. Simulators that are developed for side-channel analysis are very useful for preliminary analysis of new schemes, in depth analysis of existing schemes as well as for analysis of products on early stages of development. The contribution of this paper is
Nikita Veshchikov, Sylvain Guilley
openaire   +1 more source

Federated Learning in Side-Channel Analysis

2021
Recently introduced federated learning is an attractive framework for the distributed training of deep learning models with thousands of participants. However, it can potentially be used with malicious intent. For example, adversaries can use their smartphones to jointly train a classifier for extracting secret keys from the smartphones’ SIM cards ...
Huanyu Wang, Elena Dubrova
openaire   +1 more source

Low-cost solutions for preventing simple side-channel analysis: side-channel atomicity

IEEE Transactions on Computers, 2004
We introduce simple methods to convert a cryptographic algorithm into an algorithm protected against simple side-channel attacks. Contrary to previously known solutions, the proposed techniques are not at the expense of the execution time. Moreover, they are generic and apply to virtually any algorithm.
B. Chevallier-Mames, M. Ciet, M. Joye
openaire   +1 more source

Deep Learning on Side-Channel Analysis

2022
Item does not contain ...
Krček, M.   +6 more
openaire   +2 more sources

Photonic Side-Channel Analysis

2018
In this chapter, we demonstrate that the primary security assumption on the infeasibility of direct delay measurements in delay-based PUFs is not valid. By performing an experiment on a PoC Arbiter PUF implementation on reconfigurable hardware, it becomes apparent that The Arbiter PUF family and more generally, the delay-based PUFs can be characterized
openaire   +1 more source

Side channel analysis on android smartphones

2016 24th Signal Processing and Communication Application Conference (SIU), 2016
In recent years, smartphones have become inseparable components of people's daily life. However, the great popularity of smartphones causes some security problems. For example, users may store their contact lists, passwords and other credentials in their smartphones.
Erhan Davarci   +3 more
openaire   +1 more source

Side-Channel Assisted Fault Analysis

2018
In the preceding chapters, we have examined fault attacks as a form of active side-channel analysis, wherein the adversary injects a fault, and traces its propagation characteristics to recover the key. Certain classes of fault attacks such as FSA and DFIA have attack principles which are similar to that of side-channel attacks.
Sikhar Patranabis   +3 more
openaire   +1 more source

Timing side channels for traffic analysis

2013 IEEE International Conference on Acoustics, Speech and Signal Processing, 2013
Traffic analysis often requires direct observations of network connections at local vantage points. In this work, we show that traffic analysis can be performed remotely by taking advantage of a timing side channel. The timing side channel results from a shared resource, namely, the scheduler between two users.
Xun Gong, Negar Kiyavash
openaire   +1 more source

Side-Channel Analysis of MAC-Keccak

2013 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST), 2013
NIST recently completed the SHA-3 competition with the selection of Keccak as the new standard for crypto-graphic hashing. In this paper, we present a comprehensive Side-Channel Analysis of Keccak, when it is used with a secret key to generate a Message Authentication Code (MAC) (MAC-Keccak). Our analysis covers all the variations of the algorithm.
Mostafa Taha, Patrick Schaumont
openaire   +1 more source

Fuzzy analysis of side channel information

2014 8th International Conference on Signal Processing and Communication Systems (ICSPCS), 2014
Cryptographic algorithms implemented inside embedded systems have been designed to guarantee the security of data transition, but these electronic devices can be vulnerable to different class of attacks, mostly side channel attacks. Over the last decade, many attacks have been done successfully on different cryptographic algorithms, but these attacks ...
Ehsan Saeedi, Yinan Kong
openaire   +1 more source

Home - About - Disclaimer - Privacy