Results 61 to 70 of about 399,159 (347)
Algebraic Side-Channel Attacks [PDF]
In 2002, algebraic attacks using overdefined systems of equations have been proposed as a potentially very powerful cryptanalysis technique against block ciphers. However, although a number of convincing experiments have been performed against certain reduced algorithms, it is not clear whether these attacks can be successfully applied in general and ...
Mathieu Renauld +1 more
openaire +1 more source
Securing RSA Algorithm Against Side Channel Attacks
RSA’s modular exponentiation is the basic operation in public key infrastructure and is naturally the target of side-channel attacks. In this work we propose two algorithms that defeat side-channel attacks: Paired Permutation Exponentiation (PPE) and ...
Fayez Gebali, Alshimaa Magdy
doaj +1 more source
Blind Cartography for Side Channel Attacks: Cross-Correlation Cartography
Side channel and fault injection attacks are major threats to cryptographic applications of embedded systems. Best performances for these attacks are achieved by focusing sensors or injectors on the sensible parts of the application, by means of ...
Laurent Sauvage +4 more
doaj +1 more source
CPAmap: On the Complexity of Secure FPGA Virtualization, Multi-Tenancy, and Physical Design
With virtualized Field Programmable Gate Arrays (FPGAs) on the verge of being deployed to the cloud computing domain, there is a rising interest in resolving recently identified security issues.
Jonas Krautter +2 more
doaj +1 more source
UCloD: Small Clock Delays to Mitigate Remote Power Analysis Attacks
This paper presents UCloD, a novel random clock delay-based robust and scalable countermeasure against recently discovered remote power analysis (RPA) attacks.
Darshana Jayasinghe +2 more
doaj +1 more source
Side-channel-free quantum key distribution [PDF]
Quantum key distribution (QKD) offers the promise of absolutely secure communications. However, proofs of absolute security often assume perfect implementation from theory to experiment.
A. S. Holevo +5 more
core +2 more sources
A Decade in Software-Based Side and Covert Channel Attacks and Countermeasures: A Survey
As technology continues to evolve, it provides significant benefits, such as seamless access to information, while also introducing critical security challenges, including privacy vulnerabilities and the rapid spread of misinformation. One major class of
Teodora Vasilas, Remus Brad
doaj +1 more source
Survey of side channel attack on encrypted network traffic
By analyzing and extracting information such as packet size and timing leaked during Web application communication, side channel attack on encrypted network traffic is able to recognize users' identity and behavior and even restore the original data ...
Ding LI, Yuefei ZHU, Bin LU, Wei LIN
doaj +3 more sources
The newfound relationship between extrachromosomal DNAs and excised signal circles
Extrachromosomal DNAs (ecDNAs) contribute to the progression of many human cancers. In addition, circular DNA by‐products of V(D)J recombination, excised signal circles (ESCs), have roles in cancer progression but have largely been overlooked. In this Review, we explore the roles of ecDNAs and ESCs in cancer development, and highlight why these ...
Dylan Casey, Zeqian Gao, Joan Boyes
wiley +1 more source
Multiphoton and Side-Channel Attacks in Mistrustful Quantum Cryptography
Mistrustful cryptography includes important tasks like bit commitment, oblivious transfer, coin flipping, secure computations, position authentication, digital signatures and secure unforgeable tokens.
Mathieu Bozzio +4 more
doaj +1 more source

