Results 241 to 250 of about 346,808 (259)
Some of the next articles are maybe not open access.

Profiling Side-Channel Attacks on Dilithium

We present an end-to-end (equivalent) key recovery attack on the Dilithium lattice-based signature scheme, one of the winners of the NIST postquantum cryptography competition. The attack is based on a small side-channel leakage we identified in a bit unpacking procedure inside Dilithium signature generation.
Ulitzsch, Vincent Quentin   +3 more
openaire   +1 more source

Side-Channel Attacks

2023
Lejla Batina, Ileana Buhan
openaire   +1 more source

Cache Based Side-Channel Attacks

2020
In the current era of computation, multiple processor cores are deployed in devices that range from smart-phones, laptops, desktops, servers, and cloud-based systems. Though, innovations in the world of hardware and computer architecture have resulted in faster computation in terms of better performance, a lot of sensitive data that is stored and ...
openaire   +1 more source

Side Channel Attacks and Countermeasures

2011
Side-channel attacks bypass the theoretical strength of cryptographic algorithms by exploiting weaknesses in the cryptographic system hardware implementation via nonprimary, side-channel inputs and outputs. Commonly exploited side-channel outputs include: power consumption, electromagnetic (EM) emissions, light, timing, and sound (Fig. 8.1).
openaire   +1 more source

Introduction to Side-Channel Attacks

2009
Side-channel cryptanalysis is a new research area in applied cryptography that has gained more and more interest since the mid-nineties. It considers adversaries trying to take advantage of the physical specificities of actual cryptographic devices. These implementation-specific attacks frequently turn out to be much more efficient than the best known ...
openaire   +1 more source

Foundations of Side-Channel Attacks

2021
Maamar Ouladj, Sylvain Guilley
openaire   +1 more source

Home - About - Disclaimer - Privacy