Results 321 to 330 of about 514,969 (347)
Some of the next articles are maybe not open access.

Side Channel Attack

2018
Embedded frameworks remain continuously adopted in a varied range of application places. Cryptography is the design besides analysis of calculated structures that enable communications for security issue in the presence of malicious adversaries. Side channel attacks are a current class of attacks that remains very powerful in practice.
EFE, Ahmet, ALASHİK, Khalid Mohammed
openaire   +1 more source

A New Key Recovery Side-Channel Attack on HQC with Chosen Ciphertext

Post-Quantum Cryptography, 2022
Guillaume Goy   +2 more
semanticscholar   +1 more source

Traffic-Based Side-Channel Attack in Video Streaming

IEEE/ACM Transactions on Networking, 2019
Video streaming takes up an increasing proportion of network traffic nowadays. Dynamic adaptive streaming over HTTP (DASH) becomes the de facto standard of video streaming and it is adopted by Youtube, Netflix, and so on.
Jiaxi Gu   +3 more
semanticscholar   +1 more source

A Power Side-Channel Attack on the Reed-Muller Reed-Solomon Version of the HQC Cryptosystem

IACR Cryptology ePrint Archive, 2022
T. Schamberger   +4 more
semanticscholar   +1 more source

Embedded Cryptography: Side Channel Attacks

2006
This article gives an overview of state-of-the-art side channel attacks and corresponding countermeasures which are currently discussed in the scientific literature. We compare different attacks with respect to the algorithms attacked, measurement costs, efficiency and practicability.
Kai Schramm   +2 more
openaire   +1 more source

Profiling Side-Channel Attacks on Dilithium

We present an end-to-end (equivalent) key recovery attack on the Dilithium lattice-based signature scheme, one of the winners of the NIST postquantum cryptography competition. The attack is based on a small side-channel leakage we identified in a bit unpacking procedure inside Dilithium signature generation.
Ulitzsch, Vincent Quentin   +3 more
openaire   +1 more source

Side-Channel Attacks

2023
Lejla Batina, Ileana Buhan
openaire   +1 more source

Cache Based Side-Channel Attacks

2020
In the current era of computation, multiple processor cores are deployed in devices that range from smart-phones, laptops, desktops, servers, and cloud-based systems. Though, innovations in the world of hardware and computer architecture have resulted in faster computation in terms of better performance, a lot of sensitive data that is stored and ...
openaire   +1 more source

Side Channel Attacks and Countermeasures

2011
Side-channel attacks bypass the theoretical strength of cryptographic algorithms by exploiting weaknesses in the cryptographic system hardware implementation via nonprimary, side-channel inputs and outputs. Commonly exploited side-channel outputs include: power consumption, electromagnetic (EM) emissions, light, timing, and sound (Fig. 8.1).
openaire   +1 more source

A Power Side-Channel Attack on the CCA2-Secure HQC KEM

IACR Cryptology ePrint Archive, 2020
T. Schamberger   +3 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy