Results 31 to 40 of about 2,490,029 (269)
Virtual Analysis and Reduction of Side-Channel Vulnerabilities of Smartcards [PDF]
This paper focuses on the usability of the PINPAS tool. The PINPAS tool is an instruction-level interpreter for smartcard assembler languages, augmented with facilities to study side-channel vulnerabilities. The tool can simulate side-channel leakage and
Hartog, J.I. den, Vink, E.P. de
core +7 more sources
Two-stage Channel Frequency Response Estimation in OFDM Systems [PDF]
This paper proposes two-stage channel frequency response estimation algorithm in communication systems with OFDM technology. Algorithm is based on Kalman filter. Pilots from current and previous OFDM symbols are used for channel estimation.
Myronchuk, Oleksandr +2 more
core +2 more sources
Masking is a well loved and widely deployed countermeasure against side channel attacks, in particular in software. Under certain assumptions (w.r.t.
Si Gao +3 more
doaj +1 more source
Hypothesis Testing Based Side-Channel Collision Analysis
Side-channel collision analysis has become a research hotspot since its first publication in 2003. Compared with differential power analysis (DPA) and correlation power analysis (CPA), collision analysis does not need to know the intermediate value and ...
Dong Zheng, Xiang Jia, Meiling Zhang
doaj +1 more source
Single Trace Side Channel Analysis on NTRU Implementation
As researches on the quantum computer have progressed immensely, interests in post-quantum cryptography have greatly increased. NTRU is one of the well-known algorithms due to its practical key sizes and fast performance along with the resistance against
Soojung An +4 more
doaj +1 more source
Exchanging FPGA-based implementations of cryptographic algorithms during run-time using netlist randomized versions has been introduced recently as a unique countermeasure against side channel attacks.
Ali Asghar +2 more
doaj +1 more source
Electromagnetic Side-Channel Analysis for IoT Forensics: Challenges, Framework, and Datasets
Electromagnetic (EM) side-channel radiation from Internet of Things (IoT) devices are shown to be effective at acquiring forensic insights during digital investigations.
Asanka P. Sayakkara, Nhien-An Le-Khac
semanticscholar +1 more source
Deep Learning Side-Channel Collision Attack
With the breakthrough of Deep Neural Networks, many fields benefited from its enormously increasing performance. Although there is an increasing trend to utilize Deep Learning (DL) for Side-Channel Analysis (SCA) attacks, previous works made specific ...
Marvin Staib, Amir Moradi
doaj +1 more source
Deep Learning-based Side Channel Attack on HMAC SM3
SM3 is a Chinese hash standard. HMAC SM3 uses a secret key to encrypt the input text and gives an output as the HMAC of the input text. If the key is recovered, adversaries can easily forge a valid HMAC.
Xin Jin +3 more
doaj +1 more source
Overview of Side Channel Analysis Based on Convolutional Neural Network [PDF]
The profiled side-channel analysis method can effectively attack the implementation of cryptographic,and the side-channel cryptanalysis method based on convolutional neural network (CNNSCA) can efficiently carry out cryptographic attacks,and even can ...
LIU Lin-yun, CHEN Kai-yan, LI Xiong-wei, ZHANG Yang, XIE Fang-fang
doaj +1 more source

