Results 41 to 50 of about 230,889 (263)

Securing RSA Algorithm Against Side Channel Attacks

open access: yesTelecom
RSA’s modular exponentiation is the basic operation in public key infrastructure and is naturally the target of side-channel attacks. In this work we propose two algorithms that defeat side-channel attacks: Paired Permutation Exponentiation (PPE) and ...
Fayez Gebali, Alshimaa Magdy
doaj   +1 more source

Blind Cartography for Side Channel Attacks: Cross-Correlation Cartography

open access: yesInternational Journal of Reconfigurable Computing, 2012
Side channel and fault injection attacks are major threats to cryptographic applications of embedded systems. Best performances for these attacks are achieved by focusing sensors or injectors on the sensible parts of the application, by means of ...
Laurent Sauvage   +4 more
doaj   +1 more source

CPAmap: On the Complexity of Secure FPGA Virtualization, Multi-Tenancy, and Physical Design

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2020
With virtualized Field Programmable Gate Arrays (FPGAs) on the verge of being deployed to the cloud computing domain, there is a rising interest in resolving recently identified security issues.
Jonas Krautter   +2 more
doaj   +1 more source

UCloD: Small Clock Delays to Mitigate Remote Power Analysis Attacks

open access: yesIEEE Access, 2021
This paper presents UCloD, a novel random clock delay-based robust and scalable countermeasure against recently discovered remote power analysis (RPA) attacks.
Darshana Jayasinghe   +2 more
doaj   +1 more source

A Decade in Software-Based Side and Covert Channel Attacks and Countermeasures: A Survey

open access: yesIEEE Access
As technology continues to evolve, it provides significant benefits, such as seamless access to information, while also introducing critical security challenges, including privacy vulnerabilities and the rapid spread of misinformation. One major class of
Teodora Vasilas, Remus Brad
doaj   +1 more source

Survey of side channel attack on encrypted network traffic

open access: yes网络与信息安全学报, 2021
By analyzing and extracting information such as packet size and timing leaked during Web application communication, side channel attack on encrypted network traffic is able to recognize users' identity and behavior and even restore the original data ...
Ding LI, Yuefei ZHU, Bin LU, Wei LIN
doaj   +3 more sources

In situ molecular organization and heterogeneity of the Legionella Dot/Icm T4SS

open access: yesFEBS Letters, EarlyView.
We present a nearly complete in situ model of the Legionella Dot/Icm type IV secretion system, revealing its central secretion channel and identifying new components. Using cryo‐electron tomography with AI‐based modeling, our work highlights the structure, variability, and mechanism of this complex nanomachine, advancing understanding of bacterial ...
Przemysław Dutka   +11 more
wiley   +1 more source

Multiphoton and Side-Channel Attacks in Mistrustful Quantum Cryptography

open access: yesPRX Quantum, 2021
Mistrustful cryptography includes important tasks like bit commitment, oblivious transfer, coin flipping, secure computations, position authentication, digital signatures and secure unforgeable tokens.
Mathieu Bozzio   +4 more
doaj   +1 more source

High Order Side-Channel Security for Elliptic-Curve Implementations

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2022
Elliptic-curve implementations protected with state-of-the-art countermeasures against side-channel attacks might still be vulnerable to advanced attacks that recover secret information from a single leakage trace.
Sonia Belaïd, Matthieu Rivain
doaj   +1 more source

Frequency Throttling Side-Channel Attack

open access: yesProceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022
Modern processors dynamically control their operating frequency to optimize resource utilization, maximize energy savings, and conform to system-defined constraints. If, during the execution of a software workload, the running average of any electrical or thermal parameter exceeds its corresponding predefined threshold value, the power management ...
Liu, Chen   +3 more
openaire   +2 more sources

Home - About - Disclaimer - Privacy