Results 11 to 20 of about 2,326,402 (364)

Virtual Analysis and Reduction of Side-Channel Vulnerabilities of Smartcards [PDF]

open access: bronze, 2005
This paper focuses on the usability of the PINPAS tool. The PINPAS tool is an instruction-level interpreter for smartcard assembler languages, augmented with facilities to study side-channel vulnerabilities. The tool can simulate side-channel leakage and has a suite of utilities to analyze this.
Jerry den Hartog, E.P. de Vink
core   +14 more sources

NeuroSCA: Evolving Activation Functions for Side-Channel Analysis

open access: yesIEEE Access, 2023
The choice of activation functions can significantly impact the performance of neural networks. Due to an ever-increasing number of new activation functions being proposed in the literature, selecting the appropriate activation function becomes even more
Karlo Knezevic   +4 more
doaj   +6 more sources

Experimental Side Channel Analysis of BB84 QKD Source [PDF]

open access: yesIEEE Journal of Quantum Electronics, 2021
A typical implementation of BB84 protocol for quantum communication uses four laser diodes for transmitting weak coherent pulses, which may not have the same characteristics.
A. Biswas   +4 more
semanticscholar   +5 more sources

Ranking Loss: Maximizing the Success Rate in Deep Learning Side-Channel Analysis

open access: diamondIACR Cryptology ePrint Archive, 2020
The side-channel community recently investigated a new approach, based on deep learning, to significantly improve profiled attacks against embedded systems.
Gabriel Zaid   +4 more
openalex   +3 more sources

A Comprehensive Study of Deep Learning for Side-Channel Analysis

open access: yesIACR Transactions on Cryptographic Hardware and Embedded Systems, 2019
Recently, several studies have been published on the application of deep learning to enhance Side-Channel Attacks (SCA). These seminal works have practically validated the soundness of the approach, especially against implementations protected by masking
Loïc Masure, Cécile Canovas, E. Prouff
semanticscholar   +6 more sources

Systematic Side-Channel Analysis of Curve25519 with Machine Learning [PDF]

open access: yesJournal of Hardware and Systems Security, 2020
Profiling attacks, especially those based on machine learning, proved to be very successful techniques in recent years when considering the side-channel analysis of symmetric-key crypto implementations.
Léo Weissbart   +3 more
semanticscholar   +5 more sources

A Modular and Optimized Toolbox for Side-Channel Analysis [PDF]

open access: yesIEEE Access, 2019
The aim of this paper is to describe the characteristics of a toolbox developed to carry out a side-channel analysis of cryptosystems implemented in physical devices.
Alberto Fuentes Rodriguez   +3 more
doaj   +3 more sources

CPSGD: A Novel Optimization Algorithm and Its Application in Side-Channel Analysis [PDF]

open access: goldMathematics
In recent years, side-channel analysis based on deep learning has garnered significant attention from researchers. A pivotal reason for this lies in the fact that deep learning-based side-channel analysis requires minimal preprocessing of side-channel ...
Yifan Zhang   +3 more
doaj   +2 more sources

SCAR: Power Side-Channel Analysis at RTL Level [PDF]

open access: greenIEEE Transactions on Very Large Scale Integration (VLSI) Systems
Power side-channel attacks exploit the dynamic power consumption of cryptographic operations to leak sensitive information of encryption hardware. Therefore, it is necessary to conduct power side-channel analysis for assessing the susceptibility of cryptographic systems and mitigating potential risks.
Amisha Srivastava   +6 more
openalex   +3 more sources

The Dark Side(-Channel) of Mobile Devices: A Survey on Network Traffic Analysis

open access: green, 2017
In recent years, mobile devices (e.g., smartphones and tablets) have met an increasing commercial success and have become a fundamental element of the everyday life for billions of people all around the world.
Mauro Conti   +3 more
openalex   +4 more sources

Home - About - Disclaimer - Privacy