Results 21 to 30 of about 32,448 (286)

Soft Analytical Side-Channel Attacks [PDF]

open access: yes, 2014
In this paper, we introduce a new approach to side-channel key recovery, that combines the low time/memory complexity and noise tolerance of standard (divide and conquer) differential power analysis with the optimal data complexity of algebraic side-channel attacks.
Veyrat-Charvillon, Nicolas   +3 more
openaire   +4 more sources

Frequency Throttling Side-Channel Attack

open access: yesProceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022
Modern processors dynamically control their operating frequency to optimize resource utilization, maximize energy savings, and conform to system-defined constraints. If, during the execution of a software workload, the running average of any electrical or thermal parameter exceeds its corresponding predefined threshold value, the power management ...
Liu, Chen   +3 more
openaire   +2 more sources

Side-Channel Attack on a Protected RFID Card

open access: yesIEEE Access, 2018
Side-channel attack is a known security risk to smart cards, and there have been efforts by smart card manufacturers to incorporate side-channel attack countermeasures. In this paper, we study a widely used smart card that uses the 3DES algorithm. First,
Rixin Xu   +6 more
doaj   +1 more source

A Key-Recovery Side-Channel Attack on Classic McEliece Implementations

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2022
In this paper, we propose the first key-recovery side-channel attack on Classic McEliece, a KEM finalist in the NIST Post-quantum Cryptography Standardization Project.
Qian Guo   +2 more
doaj   +3 more sources

SITM: See-In-The-Middle Side-Channel Assisted Middle Round Differential Cryptanalysis on SPN Block Ciphers

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2019
Side-channel analysis constitutes a powerful attack vector against cryptographic implementations. Techniques such as power and electromagnetic side-channel analysis have been extensively studied to provide an efficient way to recover the secret key used ...
Shivam Bhasin   +5 more
doaj   +1 more source

Algebraic Side-Channel Attack on Twofish [PDF]

open access: yesJournal of Internet Services and Information Security, 2017
While algebraic side-channel attack (ASCA) has been successful in breaking simple cryptographic algorithms, it has never been done on larger or more complex algorithms such as Twofish.
Chujiao Ma, John Chandy, Zhijie Shi
doaj  

Single trace side-channel attack on key reconciliation in quantum key distribution system and its efficient countermeasures

open access: yesICT Express, 2021
Although quantum mechanics guarantees the security of the quantum key distribution system, it is crucial to examine whether the implementation flaws can lead to the disclosure of sensitive information. In this paper, we propose the side-channel attack on
Dongjun Park   +5 more
doaj   +1 more source

Side-Channel Expectation-Maximization Attacks

open access: yesIACR Transactions on Cryptographic Hardware and Embedded Systems, 2022
Block ciphers are protected against side-channel attacks by masking. On one hand, when the leakage model is unknown, second-order correlation attacks are typically used. On the other hand, when the leakage model can be profiled, template attacks are prescribed.
Julien Béguinot   +3 more
openaire   +3 more sources

Locating Side Channel Leakage in Time through Matched Filters

open access: yesCryptography, 2022
Side channel attacks provide an effective way to extract secret information from the execution of cryptographic algorithms run on a variety of computing devices.
Alessandro Barenghi   +2 more
doaj   +1 more source

Synthesis of Adaptive Side-Channel Attacks [PDF]

open access: yes2017 IEEE 30th Computer Security Foundations Symposium (CSF), 2017
We present symbolic analysis techniques for detecting vulnerabilities that are due to adaptive side-channel attacks, and synthesizing inputs that exploit the identified vulnerabilities. We start with a symbolic attack model that encodes succinctly all the side-channel attacks that an adversary can make.
Phan, Q-S   +4 more
openaire   +2 more sources

Home - About - Disclaimer - Privacy