Results 31 to 40 of about 2,490,029 (269)

Virtual Analysis and Reduction of Side-Channel Vulnerabilities of Smartcards [PDF]

open access: yes, 2004
This paper focuses on the usability of the PINPAS tool. The PINPAS tool is an instruction-level interpreter for smartcard assembler languages, augmented with facilities to study side-channel vulnerabilities. The tool can simulate side-channel leakage and
Hartog, J.I. den, Vink, E.P. de
core   +7 more sources

Two-stage Channel Frequency Response Estimation in OFDM Systems [PDF]

open access: yes, 2020
This paper proposes two-stage channel frequency response estimation algorithm in communication systems with OFDM technology. Algorithm is based on Kalman filter. Pilots from current and previous OFDM symbols are used for channel estimation.
Myronchuk, Oleksandr   +2 more
core   +2 more sources

Share-slicing: Friend or Foe?

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2019
Masking is a well loved and widely deployed countermeasure against side channel attacks, in particular in software. Under certain assumptions (w.r.t.
Si Gao   +3 more
doaj   +1 more source

Hypothesis Testing Based Side-Channel Collision Analysis

open access: yesIEEE Access, 2019
Side-channel collision analysis has become a research hotspot since its first publication in 2003. Compared with differential power analysis (DPA) and correlation power analysis (CPA), collision analysis does not need to know the intermediate value and ...
Dong Zheng, Xiang Jia, Meiling Zhang
doaj   +1 more source

Single Trace Side Channel Analysis on NTRU Implementation

open access: yesApplied Sciences, 2018
As researches on the quantum computer have progressed immensely, interests in post-quantum cryptography have greatly increased. NTRU is one of the well-known algorithms due to its practical key sizes and fast performance along with the resistance against
Soojung An   +4 more
doaj   +1 more source

The Benefits and Costs of Netlist Randomization Based Side-Channel Countermeasures: An In-Depth Evaluation

open access: yesJournal of Low Power Electronics and Applications, 2022
Exchanging FPGA-based implementations of cryptographic algorithms during run-time using netlist randomized versions has been introduced recently as a unique countermeasure against side channel attacks.
Ali Asghar   +2 more
doaj   +1 more source

Electromagnetic Side-Channel Analysis for IoT Forensics: Challenges, Framework, and Datasets

open access: yesIEEE Access, 2021
Electromagnetic (EM) side-channel radiation from Internet of Things (IoT) devices are shown to be effective at acquiring forensic insights during digital investigations.
Asanka P. Sayakkara, Nhien-An Le-Khac
semanticscholar   +1 more source

Deep Learning Side-Channel Collision Attack

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2023
With the breakthrough of Deep Neural Networks, many fields benefited from its enormously increasing performance. Although there is an increasing trend to utilize Deep Learning (DL) for Side-Channel Analysis (SCA) attacks, previous works made specific ...
Marvin Staib, Amir Moradi
doaj   +1 more source

Deep Learning-based Side Channel Attack on HMAC SM3

open access: yesInternational Journal of Interactive Multimedia and Artificial Intelligence, 2021
SM3 is a Chinese hash standard. HMAC SM3 uses a secret key to encrypt the input text and gives an output as the HMAC of the input text. If the key is recovered, adversaries can easily forge a valid HMAC.
Xin Jin   +3 more
doaj   +1 more source

Overview of Side Channel Analysis Based on Convolutional Neural Network [PDF]

open access: yesJisuanji kexue, 2022
The profiled side-channel analysis method can effectively attack the implementation of cryptographic,and the side-channel cryptanalysis method based on convolutional neural network (CNNSCA) can efficiently carry out cryptographic attacks,and even can ...
LIU Lin-yun, CHEN Kai-yan, LI Xiong-wei, ZHANG Yang, XIE Fang-fang
doaj   +1 more source

Home - About - Disclaimer - Privacy