Results 271 to 280 of about 32,448 (286)
Some of the next articles are maybe not open access.
Processor with side-channel attack resistance
2013 IEEE International Solid-State Circuits Conference Digest of Technical Papers, 2013Public-key cryptosystems (Fig. 3.3.1) have been widely developed for ensuring the security of information exchange in network communications, financial markets, private data storage, and personal identification devices. In contrast to the well-known RSA algorithm, elliptic curve cryptography (ECC) provides the same security level with a shorter key ...
Chen-Yi Lee+3 more
openaire +2 more sources
Side Channel Attacks and Countermeasures
2011Side-channel attacks bypass the theoretical strength of cryptographic algorithms by exploiting weaknesses in the cryptographic system hardware implementation via nonprimary, side-channel inputs and outputs. Commonly exploited side-channel outputs include: power consumption, electromagnetic (EM) emissions, light, timing, and sound (Fig. 8.1).
openaire +2 more sources
Side-channel attacks on smartcards
Network Security, 2006The use of smartcards and PINs for two-factor authentication has become a popular - and cost-effective - method for overcoming the limitations of passwords and usernames. But there's a major irony: the cards themselves are susceptible to attack. Smartcards use cryptographic algorithms to protect secret information.
openaire +2 more sources
Drm to counter side-channel attacks?
Proceedings of the 2007 ACM workshop on Digital Rights Management, 2007In the DRM setting, the attacker is a very powerful adversary, owning the software as well as the underlying hardware. This context is far different from the black-box attacker commonly considered in conventional cryptography.Therefore, cryptographers have tried to design new cryptographic tools fitting the DRM requirements.
Stanislas Francfort+2 more
openaire +2 more sources
An overview of side channel analysis attacks
Proceedings of the 2008 ACM symposium on Information, computer and communications security, 2008During the last ten years, power analysis attacks have been widely developed under many forms. They analyze the relation between the power consumption or electromagnetic radiation of a cryptographic device and the handled data during cryptographic operations.
Thanh-Ha Le+2 more
openaire +2 more sources
Combined side-channel attacks on COMP128
2014 IEEE 8th International Conference on Application of Information and Communication Technologies (AICT), 2014Authentication in GSM networks uses COMP128, which is vulnerable to side-channel attack called partitioning attack. On the device constrained in resources, such as SIM-card, table lookups are quite unreliable, so the attack can be carried out using up to 1000 queries.
Alia Levina+2 more
openaire +2 more sources
Introduction to Side-Channel Attacks
2009Side-channel cryptanalysis is a new research area in applied cryptography that has gained more and more interest since the mid-nineties. It considers adversaries trying to take advantage of the physical specificities of actual cryptographic devices. These implementation-specific attacks frequently turn out to be much more efficient than the best known ...
openaire +1 more source
Embedded Cryptography: Side Channel Attacks
2006This article gives an overview of state-of-the-art side channel attacks and corresponding countermeasures which are currently discussed in the scientific literature. We compare different attacks with respect to the algorithms attacked, measurement costs, efficiency and practicability.
Kerstin Lemke+2 more
openaire +2 more sources