Results 211 to 220 of about 2,490,029 (269)
Some of the next articles are maybe not open access.
Photonic Side-Channel Analysis of Arbiter PUFs
Journal of Cryptology, 2016zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Tajik, Shahin +8 more
openaire +3 more sources
Use of Simulators for Side-Channel Analysis
2017 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW), 2017Side-channel attacks are among the most powerful and cost-effective attacks on cryptographic systems. Simulators that are developed for side-channel analysis are very useful for preliminary analysis of new schemes, in depth analysis of existing schemes as well as for analysis of products on early stages of development. The contribution of this paper is
Nikita Veshchikov, Sylvain Guilley
openaire +1 more source
Federated Learning in Side-Channel Analysis
2021Recently introduced federated learning is an attractive framework for the distributed training of deep learning models with thousands of participants. However, it can potentially be used with malicious intent. For example, adversaries can use their smartphones to jointly train a classifier for extracting secret keys from the smartphones’ SIM cards ...
Huanyu Wang, Elena Dubrova
openaire +1 more source
Low-cost solutions for preventing simple side-channel analysis: side-channel atomicity
IEEE Transactions on Computers, 2004We introduce simple methods to convert a cryptographic algorithm into an algorithm protected against simple side-channel attacks. Contrary to previously known solutions, the proposed techniques are not at the expense of the execution time. Moreover, they are generic and apply to virtually any algorithm.
B. Chevallier-Mames, M. Ciet, M. Joye
openaire +1 more source
Static Power Side-Channel Analysis—An Investigation of Measurement Factors
IEEE Transactions on Very Large Scale Integration (VLSI) Systems, 2020The static power consumption of modern CMOS devices has become a substantial concern in the context of the side-channel security of cryptographic hardware.
Thorben Moos, A. Moradi, Bastian Richter
semanticscholar +1 more source
Test Generation using Reinforcement Learning for Delay-based Side-Channel Analysis
2020 IEEE/ACM International Conference On Computer Aided Design (ICCAD), 2020Reliability and trustworthiness are dominant factors in designing System-on-Chips (SoCs) for a variety of applications. Malicious implants, such as hardware Trojans, can lead to undesired information leakage or system malfunction.
Zhixin Pan, Jennifer Sheldon, P. Mishra
semanticscholar +1 more source
Deep Learning on Side-Channel Analysis
2022Item does not contain ...
Krček, M. +6 more
openaire +2 more sources
Photonic Side-Channel Analysis
2018In this chapter, we demonstrate that the primary security assumption on the infeasibility of direct delay measurements in delay-based PUFs is not valid. By performing an experiment on a PoC Arbiter PUF implementation on reconfigurable hardware, it becomes apparent that The Arbiter PUF family and more generally, the delay-based PUFs can be characterized
openaire +1 more source
Side channel analysis on android smartphones
2016 24th Signal Processing and Communication Application Conference (SIU), 2016In recent years, smartphones have become inseparable components of people's daily life. However, the great popularity of smartphones causes some security problems. For example, users may store their contact lists, passwords and other credentials in their smartphones.
Erhan Davarci +3 more
openaire +1 more source
Side-Channel Assisted Fault Analysis
2018In the preceding chapters, we have examined fault attacks as a form of active side-channel analysis, wherein the adversary injects a fault, and traces its propagation characteristics to recover the key. Certain classes of fault attacks such as FSA and DFIA have attack principles which are similar to that of side-channel attacks.
Sikhar Patranabis +3 more
openaire +1 more source

