Results 31 to 40 of about 230,889 (263)

Hardware architecture implemented on FPGA for protecting cryptographic keys against side-channel attacks [PDF]

open access: yes, 2016
This paper presents a new hardware architecture designed for protecting the key of cryptographic algorithms against attacks by side-channel analysis (SCA).
Cantó Navarro, Enrique   +2 more
core   +2 more sources

Side Channel Attacks

open access: yes, 2011
This chapter presents the main Side-Channel Attacks, a kind of hardware cryptanalytic techniques which exploits the physical behavior of an IC to extract secrets implied in cryptographic operations. We show in this chapter the main modern concepts about Side Channel Attacks (Simple and Differential Power Analysis) and how they can be deployed on FPGA ...
Lomné, Victor   +4 more
openaire   +2 more sources

Side-channel-free quantum key distribution [PDF]

open access: yes, 2012
Quantum key distribution (QKD) offers the promise of absolutely secure communications. However, proofs of absolute security often assume perfect implementation from theory to experiment.
A. S. Holevo   +5 more
core   +2 more sources

Ozone: Efficient Execution with Zero Timing Leakage for Modern Microarchitectures

open access: yes, 2017
Time variation during program execution can leak sensitive information. Time variations due to program control flow and hardware resource contention have been used to steal encryption keys in cipher implementations such as AES and RSA.
Austin, Todd, Aweke, Zelalem Birhanu
core   +1 more source

Side channel attacks on smart home systems: A short overview [PDF]

open access: yes, 2017
This paper provides an overview on side-channel attacks with emphasis on vulnerabilities in the smart home. Smart homes are enabled by the latest developments in sensors, communication technologies, internet protocols, and cloud services.
Abdullah, A. H.   +3 more
core   +1 more source

Optimal Collision Side-Channel Attacks [PDF]

open access: yes, 2020
Collision side-channel attacks are effective attacks against cryptographic implementations, however, optimality and efficiency of collision side-channel attacks is an open question. In this paper, we show that collision side-channel attacks can be derived using maximum likelihood principle when the distribution of the values of the leakage function is ...
Cezary Glowacz, Vincent Grosso
openaire   +1 more source

Side-Channel Attacks on Masked Bitsliced Implementations of AES

open access: yesCryptography, 2022
In this paper, we provide a detailed analysis of CPA and Template Attacks on masked implementations of bitsliced AES, targeting a 32-bit platform through the ChipWhisperer side-channel acquisition tool.
Anca Rădulescu, Marios O. Choudary
doaj   +1 more source

DR.SGX: Hardening SGX Enclaves against Cache Attacks with Data Location Randomization

open access: yes, 2019
Recent research has demonstrated that Intel's SGX is vulnerable to software-based side-channel attacks. In a common attack, the adversary monitors CPU caches to infer secret-dependent data accesses patterns. Known defenses have major limitations, as they
Brasser, Ferdinand   +5 more
core   +1 more source

Algebraic Side-Channel Attacks [PDF]

open access: yes, 2010
In 2002, algebraic attacks using overdefined systems of equations have been proposed as a potentially very powerful cryptanalysis technique against block ciphers. However, although a number of convincing experiments have been performed against certain reduced algorithms, it is not clear whether these attacks can be successfully applied in general and ...
Mathieu Renauld   +1 more
openaire   +1 more source

A Novel Side-Channel in Real-Time Schedulers

open access: yes, 2019
We demonstrate the presence of a novel scheduler side-channel in preemptive, fixed-priority real-time systems (RTS); examples of such systems can be found in automotive systems, avionic systems, power plants and industrial control systems among others ...
Bobba, Rakesh B.   +4 more
core   +1 more source

Home - About - Disclaimer - Privacy