Results 21 to 30 of about 231,688 (280)

CacheZoom: How SGX Amplifies The Power of Cache Attacks [PDF]

open access: yes, 2017
In modern computing environments, hardware resources are commonly shared, and parallel computation is widely used. Parallel tasks can cause privacy and security problems if proper isolation is not enforced.
D Brumley   +16 more
core   +2 more sources

Runtime Randomized Relocation of Crypto Libraries for Mitigating Cache Attacks

open access: yesIEEE Access, 2021
Crypto libraries such as OpenSSL and Libgcrypt are essential building blocks for implementing secure cloud services. Unfortunately, these libraries are subject to cache side-channel attacks, which are more devastating in cloud environments where ...
Youngjoo Shin, Joobeom Yun
doaj   +1 more source

Are Timing-Based Side-Channel Attacks Feasible in Shared, Modern Computing Hardware? [PDF]

open access: yes, 2018
There exist various vulnerabilities in computing hardware that adversaries can exploit to mount attacks against the users of such hardware. Microarchitectural Attacks, the result of these vulnerabilities, take advantage of Microarchitectural performance ...
A.Clements   +58 more
core   +2 more sources

Linear Repairing Codes and Side-Channel Attacks

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2018
To strengthen the resistance of countermeasures based on secret sharing,several works have suggested to use the scheme introduced by Shamir in 1978, which proposes to use the evaluation of a random d-degree polynomial into n ≥ d + 1 public points to ...
Hervé Chabanne   +2 more
doaj   +1 more source

Strengthening Sequential Side-Channel Attacks Through Change Detection

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2020
The sequential structure of some side-channel attacks makes them subject to error propagation, i.e. when an error occurs during the recovery of some part of a secret key, all the following guesses might as well be chosen randomly.
Luca Frittoli   +7 more
doaj   +1 more source

An Evaluation of Power Side-Channel Resistance for RNS Secure Logic

open access: yesSensors, 2022
In this paper, residue number system (RNS) based logic is proposed as a protection against power side-channel attacks. Every input to RNS logic is encrypted as a share of the original input in the residue domain through modulus values.
Ravikumar Selvam, Akhilesh Tyagi
doaj   +1 more source

Will You Cross the Threshold for Me?

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2021
In this work, we propose generic and novel side-channel assisted chosenciphertext attacks on NTRU-based key encapsulation mechanisms (KEMs). These KEMs are IND-CCA secure, that is, they are secure in the chosen-ciphertext model.
Prasanna Ravi   +4 more
doaj   +1 more source

Kangaroos in Side-Channel Attacks [PDF]

open access: yes, 2015
Side-channel attacks are a powerful tool to discover the cryptographic secrets of a chip or other device but only too often do they require too many traces or leave too many possible keys to explore. In this paper we show that for side channel attacks on discrete-logarithm-based systems significantly more unknown bits can be handled by using Pollard's ...
Lange, T.   +2 more
openaire   +3 more sources

Attacks on IoT: Side-Channel Power Acquisition Framework for Intrusion Detection

open access: yesFuture Internet, 2023
This study proposes the wider use of non-intrusive side-channel power data in cybersecurity for intrusion detection. An in-depth analysis of side-channel IoT power behaviour is performed on two well-known IoT devices—a Raspberry Pi 3 model B and a ...
Dominic Lightbody   +4 more
doaj   +1 more source

Experimental measurement-device-independent quantum digital signatures over a metropolitan network [PDF]

open access: yes, 2017
Quantum digital signatures (QDS) provide a means for signing electronic communications with informationtheoretic security. However, all previous demonstrations of quantum digital signatures assume trusted measurement devices. This renders them vulnerable
Andersson, Erika   +18 more
core   +2 more sources

Home - About - Disclaimer - Privacy