Results 31 to 40 of about 346,808 (259)
Although quantum mechanics guarantees the security of the quantum key distribution system, it is crucial to examine whether the implementation flaws can lead to the disclosure of sensitive information. In this paper, we propose the side-channel attack on
Dongjun Park +5 more
doaj +1 more source
This chapter presents the main Side-Channel Attacks, a kind of hardware cryptanalytic techniques which exploits the physical behavior of an IC to extract secrets implied in cryptographic operations. We show in this chapter the main modern concepts about Side Channel Attacks (Simple and Differential Power Analysis) and how they can be deployed on FPGA ...
Lomné, Victor +4 more
openaire +2 more sources
Physical functions : the common factor of side-channel and fault attacks ? [PDF]
International audienceSecurity is a key component for information technologies and communication. Among the security threats, a very important one is certainly due to vulnerabilities of the integrated circuits that implement cryptographic algorithms ...
Le Bouder, Hélène, Robisson, Bruno
core +5 more sources
Locating Side Channel Leakage in Time through Matched Filters
Side channel attacks provide an effective way to extract secret information from the execution of cryptographic algorithms run on a variety of computing devices.
Alessandro Barenghi +2 more
doaj +1 more source
Revealing a double-inversion mechanism for the F- + CH3Cl S(N)2 reaction [PDF]
Stereo-specific reaction mechanisms play a fundamental role in chemistry. The back-side attack inversion and front-side attack retention pathways of the bimolecular nucleophilic substitution (S(N)2) reactions are the textbook examples for stereo-specific
Czakó, Gábor, Szabó, István
core +1 more source
A Key-Recovery Side-Channel Attack on Classic McEliece Implementations
In this paper, we propose the first key-recovery side-channel attack on Classic McEliece, a KEM finalist in the NIST Post-quantum Cryptography Standardization Project.
Qian Guo +2 more
doaj +3 more sources
The twin-field quantum key distribution (TF-QKD) and its variants can overcome the fundamental rate-distance limit of QKD. However, their physical implementations with the side channels remain the subject of further research.
Yi-Fei Lu +9 more
doaj +1 more source
Optimal Collision Side-Channel Attacks [PDF]
Collision side-channel attacks are effective attacks against cryptographic implementations, however, optimality and efficiency of collision side-channel attacks is an open question. In this paper, we show that collision side-channel attacks can be derived using maximum likelihood principle when the distribution of the values of the leakage function is ...
Cezary Glowacz, Vincent Grosso
openaire +1 more source
Failure of the Point Blinding Countermeasure Against Fault Attack in Pairing-Based Cryptography [PDF]
Article published in the proceedings of the C2SI conference, May 2015.Pairings are mathematical tools that have been proven to be very useful in the construction of many cryptographic protocols.
El Mrabet, Nadia, Fouotsa, Emmanuel
core +3 more sources
AES Side-Channel Countermeasure using Random Tower Field Constructions [PDF]
International audienceMasking schemes to secure AES implementations against side-channel attacks is a topic of ongoing research. The most sensitive part of the AES is the non-linear SubBytes operation, in particular, the inversion in GF(2^8), the Galois ...
Bonnecaze, Alexis +2 more
core +3 more sources

