Results 321 to 330 of about 2,326,402 (364)
Some of the next articles are maybe not open access.
Static Power Side-Channel Analysis—An Investigation of Measurement Factors
IEEE Transactions on Very Large Scale Integration (VLSI) Systems, 2020The static power consumption of modern CMOS devices has become a substantial concern in the context of the side-channel security of cryptographic hardware.
Thorben Moos, A. Moradi, Bastian Richter
semanticscholar +1 more source
Fuzzy analysis of side channel information
2014 8th International Conference on Signal Processing and Communication Systems (ICSPCS), 2014Cryptographic algorithms implemented inside embedded systems have been designed to guarantee the security of data transition, but these electronic devices can be vulnerable to different class of attacks, mostly side channel attacks. Over the last decade, many attacks have been done successfully on different cryptographic algorithms, but these attacks ...
Ehsan Saeedi, Yinan Kong
openaire +2 more sources
Side-Channel Analysis and Countermeasure Design on ARM-Based Quantum-Resistant SIKE
IEEE transactions on computers, 2020The implementations of post-quantum cryptographic algorithms have been newly explored, whereas, the protection against side-channel attacks shall be considered upfront, since it can have a non-negligible impact on security and performance.
Fan Zhang+7 more
semanticscholar +1 more source
Side Channel Analysis Resistant Design Flow
2006 IEEE International Symposium on Circuits and Systems, 2006The threat of side-channel attacks (SCA) is of crucial importance when designing systems with cryptographic hardware or software. The FP6-funded project SCARD enhances the typical micro-chip design flow in order to provide a means for designing side-channel resistant circuits and systems.
Aigner, M+7 more
openaire +3 more sources
Photonic Side-Channel Analysis of Arbiter PUFs
Journal of Cryptology, 2016As intended by its name, physically unclonable functions (PUFs) are considered as an ultimate solution to deal with insecure storage, hardware counterfeiting, and many other security problems. However, many different successful attacks have already revealed vulnerabilities of certain digital intrinsic PUFs.
Tajik, Shahin+8 more
openaire +3 more sources
Photonic Side-Channel Analysis
2018In this chapter, we demonstrate that the primary security assumption on the infeasibility of direct delay measurements in delay-based PUFs is not valid. By performing an experiment on a PoC Arbiter PUF implementation on reconfigurable hardware, it becomes apparent that The Arbiter PUF family and more generally, the delay-based PUFs can be characterized
openaire +2 more sources
Side-Channel Analysis of the TERO PUF
2019Physical Unclonable Functions (PUFs) have the potential to provide a higher level of security for key storage than traditional Non-Volatile Memory (NVM). However, the susceptibility of the PUF primitives to non-invasive Side-Channel Analysis (SCA) is largely unexplored.
Michael Pehl+2 more
openaire +1 more source
Side-Channel Assisted Fault Analysis
2018In the preceding chapters, we have examined fault attacks as a form of active side-channel analysis, wherein the adversary injects a fault, and traces its propagation characteristics to recover the key. Certain classes of fault attacks such as FSA and DFIA have attack principles which are similar to that of side-channel attacks.
Sikhar Patranabis+3 more
openaire +2 more sources
Side-Channel Analysis of PUFs and Fuzzy Extractors
2011Embedded security systems based on Physical Unclonable Functions (PUFs) offer interesting protection properties, such as tamper resistance and unclonability. However, to establish PUFs as a high security primitive in the long run, their vulnerability to side-channel attacks has to be investigated.
Dominik Merli+3 more
openaire +2 more sources
Low-cost solutions for preventing simple side-channel analysis: side-channel atomicity
IEEE Transactions on Computers, 2004We introduce simple methods to convert a cryptographic algorithm into an algorithm protected against simple side-channel attacks. Contrary to previously known solutions, the proposed techniques are not at the expense of the execution time. Moreover, they are generic and apply to virtually any algorithm.
Mathieu Ciet+2 more
openaire +2 more sources