Results 41 to 50 of about 230,889 (263)
Securing RSA Algorithm Against Side Channel Attacks
RSA’s modular exponentiation is the basic operation in public key infrastructure and is naturally the target of side-channel attacks. In this work we propose two algorithms that defeat side-channel attacks: Paired Permutation Exponentiation (PPE) and ...
Fayez Gebali, Alshimaa Magdy
doaj +1 more source
Blind Cartography for Side Channel Attacks: Cross-Correlation Cartography
Side channel and fault injection attacks are major threats to cryptographic applications of embedded systems. Best performances for these attacks are achieved by focusing sensors or injectors on the sensible parts of the application, by means of ...
Laurent Sauvage +4 more
doaj +1 more source
CPAmap: On the Complexity of Secure FPGA Virtualization, Multi-Tenancy, and Physical Design
With virtualized Field Programmable Gate Arrays (FPGAs) on the verge of being deployed to the cloud computing domain, there is a rising interest in resolving recently identified security issues.
Jonas Krautter +2 more
doaj +1 more source
UCloD: Small Clock Delays to Mitigate Remote Power Analysis Attacks
This paper presents UCloD, a novel random clock delay-based robust and scalable countermeasure against recently discovered remote power analysis (RPA) attacks.
Darshana Jayasinghe +2 more
doaj +1 more source
A Decade in Software-Based Side and Covert Channel Attacks and Countermeasures: A Survey
As technology continues to evolve, it provides significant benefits, such as seamless access to information, while also introducing critical security challenges, including privacy vulnerabilities and the rapid spread of misinformation. One major class of
Teodora Vasilas, Remus Brad
doaj +1 more source
Survey of side channel attack on encrypted network traffic
By analyzing and extracting information such as packet size and timing leaked during Web application communication, side channel attack on encrypted network traffic is able to recognize users' identity and behavior and even restore the original data ...
Ding LI, Yuefei ZHU, Bin LU, Wei LIN
doaj +3 more sources
In situ molecular organization and heterogeneity of the Legionella Dot/Icm T4SS
We present a nearly complete in situ model of the Legionella Dot/Icm type IV secretion system, revealing its central secretion channel and identifying new components. Using cryo‐electron tomography with AI‐based modeling, our work highlights the structure, variability, and mechanism of this complex nanomachine, advancing understanding of bacterial ...
Przemysław Dutka +11 more
wiley +1 more source
Multiphoton and Side-Channel Attacks in Mistrustful Quantum Cryptography
Mistrustful cryptography includes important tasks like bit commitment, oblivious transfer, coin flipping, secure computations, position authentication, digital signatures and secure unforgeable tokens.
Mathieu Bozzio +4 more
doaj +1 more source
High Order Side-Channel Security for Elliptic-Curve Implementations
Elliptic-curve implementations protected with state-of-the-art countermeasures against side-channel attacks might still be vulnerable to advanced attacks that recover secret information from a single leakage trace.
Sonia Belaïd, Matthieu Rivain
doaj +1 more source
Frequency Throttling Side-Channel Attack
Modern processors dynamically control their operating frequency to optimize resource utilization, maximize energy savings, and conform to system-defined constraints. If, during the execution of a software workload, the running average of any electrical or thermal parameter exceeds its corresponding predefined threshold value, the power management ...
Liu, Chen +3 more
openaire +2 more sources

