Results 1 to 10 of about 230,889 (263)

Side-Channel Expectation-Maximization Attacks

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2022
Block ciphers are protected against side-channel attacks by masking. On one hand, when the leakage model is unknown, second-order correlation attacks are typically used.
Julien Béguinot   +3 more
doaj   +5 more sources

Side-Channel Attacks [PDF]

open access: yes, 2019
Apart from the previously mentioned attacks that exploit the algorithmic weaknesses of logic locking techniques, logic locking is also vulnerable to the emerging class of side-channel attacks, which are the focus of this chapter. The chapter introduces four attacks on logic locking that exploit various side-channels to extract secret key.
Muhammad Yasin   +2 more
  +6 more sources

Side Channel Analysis Attack Based on Deep Learning LSTM [PDF]

open access: yesJisuanji gongcheng, 2021
The security of encrypted data is affected by encryption algorithms and encryption devices.The reliability of the encryption devices can be tested by using multiple types of attacks, such as energy analysis.Among different attack methods, the method of ...
WANG Junnian, ZHU Bin, YU Wenxin, WANG Wan, HU Fanliang
doaj   +1 more source

A Comprehensive Survey on the Non-Invasive Passive Side-Channel Analysis

open access: yesSensors, 2022
Side-channel analysis has become a widely recognized threat to the security of cryptographic implementations. Different side-channel attacks, as well as countermeasures, have been proposed in the literature.
Petr Socha   +2 more
doaj   +1 more source

Risky Translations: Securing TLBs against Timing Side Channels

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2022
Microarchitectural side-channel vulnerabilities in modern processors are known to be a powerful attack vector that can be utilized to bypass common security boundaries like memory isolation.
Florian Stolz   +3 more
doaj   +1 more source

Quantile: Quantifying Information Leakage

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2023
The masking countermeasure is very effective against side-channel attacks such as differential power analysis. However, the design of masked circuits is a challenging problem since one has to ensure security while minimizing performance overheads.
Vedad Hadžic   +4 more
doaj   +1 more source

Meet the Sherlock Holmes’ of Side Channel Leakage: A Survey of Cache SCA Detection Techniques

open access: yesIEEE Access, 2020
Cache Side Channel Attacks (SCAs) have gained a lot of attention in the recent past. Since, these attacks exploit the caching hardware vulnerabilities, they are fast and dangerous.
Ayaz Akram   +4 more
doaj   +1 more source

Correlation Power Analysis Attack Resisted Cryptographic RISC-V SoC With Random Dynamic Frequency Scaling Countermeasure

open access: yesIEEE Access, 2021
Cryptographic System-on-Chips (SoCs) are becoming more and more popular. In these systems, cryptographic accelerators are integrated with processor cores to provide users with the software’s flexibility and hardware’s high performance ...
Ba-Anh Dao   +5 more
doaj   +1 more source

A Memory Hierarchy Protected against Side-Channel Attacks

open access: yesCryptography, 2022
In the vulnerability analysis of System on Chips, memory hierarchy is considered among the most valuable element to protect against information theft. Many first-order side-channel attacks have been reported on all its components from the main memory to ...
Ezinam Bertrand Talaki   +3 more
doaj   +1 more source

IMPLEMENTATION OF SIDE-CHANNEL LEAKAGE DETECTION TECHNIQUE BASED ON NORMALIZED INTER-CLASS VARIANCE METHOD [PDF]

open access: yesНаучно-технический вестник информационных технологий, механики и оптики, 2016
The paper presents anew mathematical method for parasitic signal analyzing. NICV (Normalized Inter-Class Variance) method allows reducing considerably of computing and time expenditure in carrying out side channel attacks.
A. B. Levina, P. S. Borisenko
doaj   +1 more source

Home - About - Disclaimer - Privacy