Results 31 to 40 of about 350,749 (324)

CacheZoom: How SGX Amplifies The Power of Cache Attacks [PDF]

open access: yes, 2017
In modern computing environments, hardware resources are commonly shared, and parallel computation is widely used. Parallel tasks can cause privacy and security problems if proper isolation is not enforced.
D Brumley   +16 more
core   +2 more sources

Asymmetric Leakage from Multiplier and Collision-Based Single-Shot Side-Channel Attack [PDF]

open access: yes, 2016
The single-shot collision attack on RSA proposed by Hanley et al. is studied focusing on the difference between two operands of multiplier. It is shown that how leakage from integer multiplier and long-integer multiplication algorithm can be asymmetric ...
Daisuke SUZUKI   +2 more
core   +2 more sources

Experimental measurement-device-independent quantum digital signatures over a metropolitan network [PDF]

open access: yes, 2017
Quantum digital signatures (QDS) provide a means for signing electronic communications with informationtheoretic security. However, all previous demonstrations of quantum digital signatures assume trusted measurement devices. This renders them vulnerable
Andersson, Erika   +18 more
core   +2 more sources

Fault Template Attack Based on Fault Probability

open access: yesIEEE Access, 2023
Template attack uses leaked information from various side channels and may break out the countermeasures embedded in the algorithm, which is considered a powerful side-channel attack method.
Tong Wu, Dawei Zhou, Lei Du, Shiwei Wang
doaj   +1 more source

Weak randomness completely trounces the security of QKD [PDF]

open access: yes, 2012
In usual security proofs of quantum protocols the adversary (Eve) is expected to have full control over any quantum communication between any communicating parties (Alice and Bob).
C. H. Bennett   +8 more
core   +2 more sources

Side-Channel Attack on a Protected RFID Card

open access: yesIEEE Access, 2018
Side-channel attack is a known security risk to smart cards, and there have been efforts by smart card manufacturers to incorporate side-channel attack countermeasures. In this paper, we study a widely used smart card that uses the 3DES algorithm. First,
Rixin Xu   +6 more
doaj   +1 more source

Stealing Keys From Hardware Wallets: A Single Trace Side-Channel Attack on Elliptic Curve Scalar Multiplication Without Profiling

open access: yesIEEE Access, 2023
Over the past decade, decentralized cryptocurrencies have received attention in industry and academia. Hardware wallets are dedicated devices that manage cryptocurrencies safely without entrusting cryptographic keys to a third party. Side-channel attacks
Dongjun Park   +5 more
doaj   +1 more source

A Template Attack Against VERIFY PIN Algorithms [PDF]

open access: yes, 2016
International audienceThis paper presents the first side channel analysis from electromagnetic emissions on VERIFY PIN algorithms. To enter a PIN code, a user has a limited number of trials.
Barry, Thierno   +4 more
core   +3 more sources

Algebraic Side-Channel Attack on Twofish [PDF]

open access: yesJournal of Internet Services and Information Security, 2017
While algebraic side-channel attack (ASCA) has been successful in breaking simple cryptographic algorithms, it has never been done on larger or more complex algorithms such as Twofish.
Chujiao Ma, John Chandy, Zhijie Shi
doaj  

SITM: See-In-The-Middle Side-Channel Assisted Middle Round Differential Cryptanalysis on SPN Block Ciphers

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2019
Side-channel analysis constitutes a powerful attack vector against cryptographic implementations. Techniques such as power and electromagnetic side-channel analysis have been extensively studied to provide an efficient way to recover the secret key used ...
Shivam Bhasin   +5 more
doaj   +1 more source

Home - About - Disclaimer - Privacy