Results 1 to 10 of about 1,857,403 (288)
A Comprehensive Survey on the Non-Invasive Passive Side-Channel Analysis [PDF]
Side-channel analysis has become a widely recognized threat to the security of cryptographic implementations. Different side-channel attacks, as well as countermeasures, have been proposed in the literature.
Petr Socha +2 more
doaj +2 more sources
Hybrid Threshold Denoising Framework Using Singular Value Decomposition for Side-Channel Analysis Preprocessing [PDF]
The traces used in side-channel analysis are essential to breaking the key of encryption and the signal quality greatly affects the correct rate of key guessing.
Yuanzhen Wang +7 more
doaj +2 more sources
An Evaluation of Power Side-Channel Resistance for RNS Secure Logic [PDF]
In this paper, residue number system (RNS) based logic is proposed as a protection against power side-channel attacks. Every input to RNS logic is encrypted as a share of the original input in the residue domain through modulus values.
Ravikumar Selvam, Akhilesh Tyagi
doaj +2 more sources
Side channel analysis based on feature fusion network. [PDF]
Various physical information can be leaked while the encryption algorithm is running in the device. Side-channel analysis exploits these leakages to recover keys.
Feng Ni +4 more
doaj +2 more sources
We know what you're doing! Application detection using thermal data [PDF]
Modern mobile and embedded devices have high computing power which allows them to be used for multiple purposes. Therefore, applications with low security restrictions may execute on the same device as applications handling highly sensitive information ...
Miedl, Philipp +2 more
doaj +1 more source
Side-Channel Expectation-Maximization Attacks
Block ciphers are protected against side-channel attacks by masking. On one hand, when the leakage model is unknown, second-order correlation attacks are typically used.
Julien Béguinot +3 more
doaj +3 more sources
CacheHawkeye: Detecting Cache Side Channel Attacks Based on Memory Events
Cache side channel attacks, as a type of cryptanalysis, seriously threaten the security of the cryptosystem. These attacks continuously monitor the memory addresses associated with the victim’s secret information, which cause frequent memory access on ...
Hui Yan, Chaoyuan Cui
doaj +1 more source
Side-Channel Protections for Picnic Signatures
We study masking countermeasures for side-channel attacks against signature schemes constructed from the MPC-in-the-head paradigm, specifically when the MPC protocol uses preprocessing.
Diego F. Aranha +6 more
doaj +1 more source
Side-Channel Masking with Common Shares
To counter side-channel attacks, a masking scheme randomly encodes keydependent variables into several shares, and transforms operations into the masked correspondence (called gadget) operating on shares.
Weijia Wang +4 more
doaj +1 more source
Deep Learning Side-Channel Collision Attack
With the breakthrough of Deep Neural Networks, many fields benefited from its enormously increasing performance. Although there is an increasing trend to utilize Deep Learning (DL) for Side-Channel Analysis (SCA) attacks, previous works made specific ...
Marvin Staib, Amir Moradi
doaj +1 more source

