Results 221 to 230 of about 2,490,029 (269)
Some of the next articles are maybe not open access.
Timing side channels for traffic analysis
2013 IEEE International Conference on Acoustics, Speech and Signal Processing, 2013Traffic analysis often requires direct observations of network connections at local vantage points. In this work, we show that traffic analysis can be performed remotely by taking advantage of a timing side channel. The timing side channel results from a shared resource, namely, the scheduler between two users.
Xun Gong, Negar Kiyavash
openaire +1 more source
Side-Channel Analysis of MAC-Keccak
2013 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST), 2013NIST recently completed the SHA-3 competition with the selection of Keccak as the new standard for crypto-graphic hashing. In this paper, we present a comprehensive Side-Channel Analysis of Keccak, when it is used with a secret key to generate a Message Authentication Code (MAC) (MAC-Keccak). Our analysis covers all the variations of the algorithm.
Mostafa Taha, Patrick Schaumont
openaire +1 more source
Fuzzy analysis of side channel information
2014 8th International Conference on Signal Processing and Communication Systems (ICSPCS), 2014Cryptographic algorithms implemented inside embedded systems have been designed to guarantee the security of data transition, but these electronic devices can be vulnerable to different class of attacks, mostly side channel attacks. Over the last decade, many attacks have been done successfully on different cryptographic algorithms, but these attacks ...
Ehsan Saeedi, Yinan Kong
openaire +1 more source
Breaking and Protecting the Crystal: Side-Channel Analysis of Dilithium in Hardware
IACR Cryptology ePrint Archive, 2022H. Steffen +3 more
semanticscholar +1 more source
Side-Channel Inspired Fault Analysis Techniques
2018In the previous chapter, we have presented to the reader differential fault attack (DFA) techniques where the adversary analyzes the propagation of an induced fault across the rounds of a block cipher/stream cipher to recover the key. The key recovery process in such attacks usually involves solving a system of equations, tracing the fault propagation ...
Sikhar Patranabis, Debdeep Mukhopadhyay
openaire +1 more source
Deep learning for side-channel analysis and introduction to ASCAD database
Journal of Cryptographic Engineering, 2019R. Benadjila +4 more
semanticscholar +1 more source
Focus is Key to Success: A Focal Loss Function for Deep Learning-based Side-channel Analysis
IACR Cryptology ePrint Archive, 2021Maikel Kerkhof +3 more
semanticscholar +1 more source
Side-channel analysis attacks based on deep learning network
Frontiers of Computer Science, 2021Yu Ou, Lang Li
semanticscholar +1 more source
On the Evaluation of Deep Learning-based Side-channel Analysis
IACR Cryptology ePrint Archive, 2021Lichao Wu, Guilherme Perin, S. Picek
semanticscholar +1 more source
Cancer treatment and survivorship statistics, 2022
Ca-A Cancer Journal for Clinicians, 2022Kimberly D Miller +2 more
exaly

