Results 321 to 330 of about 514,969 (347)
Some of the next articles are maybe not open access.
2018
Embedded frameworks remain continuously adopted in a varied range of application places. Cryptography is the design besides analysis of calculated structures that enable communications for security issue in the presence of malicious adversaries. Side channel attacks are a current class of attacks that remains very powerful in practice.
EFE, Ahmet, ALASHİK, Khalid Mohammed
openaire +1 more source
Embedded frameworks remain continuously adopted in a varied range of application places. Cryptography is the design besides analysis of calculated structures that enable communications for security issue in the presence of malicious adversaries. Side channel attacks are a current class of attacks that remains very powerful in practice.
EFE, Ahmet, ALASHİK, Khalid Mohammed
openaire +1 more source
A New Key Recovery Side-Channel Attack on HQC with Chosen Ciphertext
Post-Quantum Cryptography, 2022Guillaume Goy +2 more
semanticscholar +1 more source
Traffic-Based Side-Channel Attack in Video Streaming
IEEE/ACM Transactions on Networking, 2019Video streaming takes up an increasing proportion of network traffic nowadays. Dynamic adaptive streaming over HTTP (DASH) becomes the de facto standard of video streaming and it is adopted by Youtube, Netflix, and so on.
Jiaxi Gu +3 more
semanticscholar +1 more source
A Power Side-Channel Attack on the Reed-Muller Reed-Solomon Version of the HQC Cryptosystem
IACR Cryptology ePrint Archive, 2022T. Schamberger +4 more
semanticscholar +1 more source
Embedded Cryptography: Side Channel Attacks
2006This article gives an overview of state-of-the-art side channel attacks and corresponding countermeasures which are currently discussed in the scientific literature. We compare different attacks with respect to the algorithms attacked, measurement costs, efficiency and practicability.
Kai Schramm +2 more
openaire +1 more source
Profiling Side-Channel Attacks on Dilithium
We present an end-to-end (equivalent) key recovery attack on the Dilithium lattice-based signature scheme, one of the winners of the NIST postquantum cryptography competition. The attack is based on a small side-channel leakage we identified in a bit unpacking procedure inside Dilithium signature generation.Ulitzsch, Vincent Quentin +3 more
openaire +1 more source
Cache Based Side-Channel Attacks
2020In the current era of computation, multiple processor cores are deployed in devices that range from smart-phones, laptops, desktops, servers, and cloud-based systems. Though, innovations in the world of hardware and computer architecture have resulted in faster computation in terms of better performance, a lot of sensitive data that is stored and ...
openaire +1 more source
Side Channel Attacks and Countermeasures
2011Side-channel attacks bypass the theoretical strength of cryptographic algorithms by exploiting weaknesses in the cryptographic system hardware implementation via nonprimary, side-channel inputs and outputs. Commonly exploited side-channel outputs include: power consumption, electromagnetic (EM) emissions, light, timing, and sound (Fig. 8.1).
openaire +1 more source
A Power Side-Channel Attack on the CCA2-Secure HQC KEM
IACR Cryptology ePrint Archive, 2020T. Schamberger +3 more
semanticscholar +1 more source

