Results 41 to 50 of about 399,159 (347)

Strengthening Sequential Side-Channel Attacks Through Change Detection

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2020
The sequential structure of some side-channel attacks makes them subject to error propagation, i.e. when an error occurs during the recovery of some part of a secret key, all the following guesses might as well be chosen randomly.
Luca Frittoli   +7 more
doaj   +1 more source

Defending cache memory against cold-boot attacks boosted by power or EM radiation analysis [PDF]

open access: yes, 2017
Some algorithms running with compromised data select cache memory as a type of secure memory where data is confined and not transferred to main memory. However, cold-boot attacks that target cache memories exploit the data remanence. Thus, a sudden power
Manich Bou, Salvador, Neagu, Madalin
core   +2 more sources

Linear Repairing Codes and Side-Channel Attacks

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2018
To strengthen the resistance of countermeasures based on secret sharing,several works have suggested to use the scheme introduced by Shamir in 1978, which proposes to use the evaluation of a random d-degree polynomial into n ≥ d + 1 public points to ...
Hervé Chabanne   +2 more
doaj   +1 more source

An Evaluation of Power Side-Channel Resistance for RNS Secure Logic

open access: yesSensors, 2022
In this paper, residue number system (RNS) based logic is proposed as a protection against power side-channel attacks. Every input to RNS logic is encrypted as a share of the original input in the residue domain through modulus values.
Ravikumar Selvam, Akhilesh Tyagi
doaj   +1 more source

Will You Cross the Threshold for Me?

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2021
In this work, we propose generic and novel side-channel assisted chosenciphertext attacks on NTRU-based key encapsulation mechanisms (KEMs). These KEMs are IND-CCA secure, that is, they are secure in the chosen-ciphertext model.
Prasanna Ravi   +4 more
doaj   +1 more source

Experimental measurement-device-independent quantum digital signatures over a metropolitan network [PDF]

open access: yes, 2017
Quantum digital signatures (QDS) provide a means for signing electronic communications with informationtheoretic security. However, all previous demonstrations of quantum digital signatures assume trusted measurement devices. This renders them vulnerable
Andersson, Erika   +18 more
core   +2 more sources

Applying Thermal Side-Channel Attacks on Asymmetric Cryptography

open access: yesIEEE Transactions on Very Large Scale Integration (VLSI) Systems, 2021
Side-channel attacks (SCAs) are powerful attacks that could be used to retrieve keys from electronic devices. Several physical leakage sources can be exploited in SCAs, such as power, time, heat, and so on.
Abdullah Aljuffri   +4 more
semanticscholar   +1 more source

Kangaroos in Side-Channel Attacks [PDF]

open access: yes, 2015
Side-channel attacks are a powerful tool to discover the cryptographic secrets of a chip or other device but only too often do they require too many traces or leave too many possible keys to explore. In this paper we show that for side channel attacks on discrete-logarithm-based systems significantly more unknown bits can be handled by using Pollard's ...
Lange, T.   +2 more
openaire   +3 more sources

Insecurity of detector-device-independent quantum key distribution [PDF]

open access: yes, 2016
Detector-device-independent quantum key distribution (ddiQKD) held the promise of being robust to detector side-channels, a major security loophole in QKD implementations. In contrast to what has been claimed, however, we demonstrate that the security of
Curty, Marcos   +5 more
core   +2 more sources

Non-Profiled Deep Learning-Based Side-Channel Attacks

open access: yesIACR Cryptology ePrint Archive, 2019
Deep Learning has recently been introduced as a new alternative to perform Side-Channel analysis [MPP16]. Until now, studies have been focused on applying Deep Learning techniques to perform Profiled Side-Channel attacks where an attacker has a full ...
Benjamin Timon
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy