Results 1 to 10 of about 1,857,403 (288)

A Comprehensive Survey on the Non-Invasive Passive Side-Channel Analysis [PDF]

open access: yesSensors, 2022
Side-channel analysis has become a widely recognized threat to the security of cryptographic implementations. Different side-channel attacks, as well as countermeasures, have been proposed in the literature.
Petr Socha   +2 more
doaj   +2 more sources

Hybrid Threshold Denoising Framework Using Singular Value Decomposition for Side-Channel Analysis Preprocessing [PDF]

open access: yesEntropy, 2023
The traces used in side-channel analysis are essential to breaking the key of encryption and the signal quality greatly affects the correct rate of key guessing.
Yuanzhen Wang   +7 more
doaj   +2 more sources

An Evaluation of Power Side-Channel Resistance for RNS Secure Logic [PDF]

open access: yesSensors, 2022
In this paper, residue number system (RNS) based logic is proposed as a protection against power side-channel attacks. Every input to RNS logic is encrypted as a share of the original input in the residue domain through modulus values.
Ravikumar Selvam, Akhilesh Tyagi
doaj   +2 more sources

Side channel analysis based on feature fusion network. [PDF]

open access: yesPLoS ONE, 2022
Various physical information can be leaked while the encryption algorithm is running in the device. Side-channel analysis exploits these leakages to recover keys.
Feng Ni   +4 more
doaj   +2 more sources

We know what you're doing! Application detection using thermal data [PDF]

open access: yesLeibniz Transactions on Embedded Systems, 2021
Modern mobile and embedded devices have high computing power which allows them to be used for multiple purposes. Therefore, applications with low security restrictions may execute on the same device as applications handling highly sensitive information ...
Miedl, Philipp   +2 more
doaj   +1 more source

Side-Channel Expectation-Maximization Attacks

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2022
Block ciphers are protected against side-channel attacks by masking. On one hand, when the leakage model is unknown, second-order correlation attacks are typically used.
Julien Béguinot   +3 more
doaj   +3 more sources

CacheHawkeye: Detecting Cache Side Channel Attacks Based on Memory Events

open access: yesFuture Internet, 2022
Cache side channel attacks, as a type of cryptanalysis, seriously threaten the security of the cryptosystem. These attacks continuously monitor the memory addresses associated with the victim’s secret information, which cause frequent memory access on ...
Hui Yan, Chaoyuan Cui
doaj   +1 more source

Side-Channel Protections for Picnic Signatures

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2021
We study masking countermeasures for side-channel attacks against signature schemes constructed from the MPC-in-the-head paradigm, specifically when the MPC protocol uses preprocessing.
Diego F. Aranha   +6 more
doaj   +1 more source

Side-Channel Masking with Common Shares

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2022
To counter side-channel attacks, a masking scheme randomly encodes keydependent variables into several shares, and transforms operations into the masked correspondence (called gadget) operating on shares.
Weijia Wang   +4 more
doaj   +1 more source

Deep Learning Side-Channel Collision Attack

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2023
With the breakthrough of Deep Neural Networks, many fields benefited from its enormously increasing performance. Although there is an increasing trend to utilize Deep Learning (DL) for Side-Channel Analysis (SCA) attacks, previous works made specific ...
Marvin Staib, Amir Moradi
doaj   +1 more source

Home - About - Disclaimer - Privacy