Results 21 to 30 of about 346,808 (259)
Experimental measurement-device-independent quantum digital signatures over a metropolitan network [PDF]
Quantum digital signatures (QDS) provide a means for signing electronic communications with informationtheoretic security. However, all previous demonstrations of quantum digital signatures assume trusted measurement devices. This renders them vulnerable
Andersson, Erika +18 more
core +2 more sources
Fault Template Attack Based on Fault Probability
Template attack uses leaked information from various side channels and may break out the countermeasures embedded in the algorithm, which is considered a powerful side-channel attack method.
Tong Wu, Dawei Zhou, Lei Du, Shiwei Wang
doaj +1 more source
Weak randomness completely trounces the security of QKD [PDF]
In usual security proofs of quantum protocols the adversary (Eve) is expected to have full control over any quantum communication between any communicating parties (Alice and Bob).
C. H. Bennett +8 more
core +2 more sources
Side channel attacks on smart home systems: A short overview [PDF]
This paper provides an overview on side-channel attacks with emphasis on vulnerabilities in the smart home. Smart homes are enabled by the latest developments in sensors, communication technologies, internet protocols, and cloud services.
Abdullah, A. H. +3 more
core +1 more source
Over the past decade, decentralized cryptocurrencies have received attention in industry and academia. Hardware wallets are dedicated devices that manage cryptocurrencies safely without entrusting cryptographic keys to a third party. Side-channel attacks
Dongjun Park +5 more
doaj +1 more source
Side-Channel Attack on a Protected RFID Card
Side-channel attack is a known security risk to smart cards, and there have been efforts by smart card manufacturers to incorporate side-channel attack countermeasures. In this paper, we study a widely used smart card that uses the 3DES algorithm. First,
Rixin Xu +6 more
doaj +1 more source
A Template Attack Against VERIFY PIN Algorithms [PDF]
International audienceThis paper presents the first side channel analysis from electromagnetic emissions on VERIFY PIN algorithms. To enter a PIN code, a user has a limited number of trials.
Barry, Thierno +4 more
core +3 more sources
Algebraic Side-Channel Attack on Twofish [PDF]
While algebraic side-channel attack (ASCA) has been successful in breaking simple cryptographic algorithms, it has never been done on larger or more complex algorithms such as Twofish.
Chujiao Ma, John Chandy, Zhijie Shi
doaj
Side-channel analysis constitutes a powerful attack vector against cryptographic implementations. Techniques such as power and electromagnetic side-channel analysis have been extensively studied to provide an efficient way to recover the secret key used ...
Shivam Bhasin +5 more
doaj +1 more source
Kangaroos in Side-Channel Attacks [PDF]
Side-channel attacks are a powerful tool to discover the cryptographic secrets of a chip or other device but only too often do they require too many traces or leave too many possible keys to explore. In this paper we show that for side channel attacks on discrete-logarithm-based systems significantly more unknown bits can be handled by using Pollard's ...
Lange, T. +2 more
openaire +3 more sources

