Results 51 to 60 of about 2,490,029 (269)

JitSCA: Jitter-based Side-Channel Analysis in Picoscale Resolution

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2023
In safety and security conscious environments, isolated communication channels are often deemed necessary. Galvanically isolated communication channels are typically expected not to allow physical side-channel attacks through that channel.
Kai Schoos   +3 more
doaj   +1 more source

Symbolic Analysis of Higher-Order Side Channel Countermeasures [PDF]

open access: yesIEEE Transactions on Computers, 2017
In this paper, we deal with the problem of efficiently assessing the higher order vulnerability of a hardware cryptographic circuit. Our main concern is to provide methods that allow a circuit designer to detect early in the design cycle if the implementation of a Boolean-additive masking countermeasure does not hold up to the required protection order.
Bisi E, Melzani F, Zaccaria V
openaire   +2 more sources

A Security Analysis of IoT Encryption: Side-channel Cube Attack on Simeck32/64 [PDF]

open access: yes, 2018
Simeck, a lightweight block cipher has been proposed to be one of the encryption that can be employed in the Internet of Things (IoT) applications. Therefore, this paper presents the security of the Simeck32/64 block cipher against side-channel cube ...
Abdul-Latip, Shekh Faisal   +2 more
core   +2 more sources

The Three Node Wireless Network: Achievable Rates and Cooperation Strategies

open access: yes, 2005
We consider a wireless network composed of three nodes and limited by the half-duplex and total power constraints. This formulation encompasses many of the special cases studied in the literature and allows for capturing the common features shared by ...
Gamal, Hesham El, Lai, Lifeng, Liu, Ke
core   +3 more sources

On the Achievable Error Region of Physical Layer Authentication Techniques over Rayleigh Fading Channels

open access: yes, 2014
For a physical layer message authentication procedure based on the comparison of channel estimates obtained from the received messages, we focus on an outer bound on the type I/II error probability region.
Ferrante, Augusto   +4 more
core   +1 more source

Convolutional Neural Networks for Profiled Side-channel Analysis [PDF]

open access: yesRadioengineering, 2019
Recent studies have shown that deep learning algorithms are very effective for evaluating the security of embedded systems. The deep learning technique represented by Convolutional Neural Networks (CNNs) has proven to be a promising paradigm in the ...
S. R. Hou, Y. J. Zhou, H. M. Liu
doaj  

A Novel Evaluation Metric for Deep Learning-Based Side Channel Analysis and Its Extended Application to Imbalanced Data

open access: yesIACR Trans. Cryptogr. Hardw. Embed. Syst., 2020
Since Kocher (CRYPTO’96) proposed timing attack, side channel analysis (SCA) has shown great potential to break cryptosystems via physical leakage. Recently, deep learning techniques are widely used in SCA and show equivalent and even better performance ...
Jiajia Zhang   +4 more
semanticscholar   +1 more source

A Taxonomy-Based Survey of EM-SCA and Implications for Multi-Robot Systems

open access: yesIEEE Open Journal of the Computer Society
Electromagnetic Side Channel Analysis (EM-SCA) is a major area of interest within the field of cybersecurity. EM-SCA makes use of the electromagnetic radiation that naturally leaks from any device that runs on electricity.
Yomna Mokhtar Ibrahim   +3 more
doaj   +1 more source

HRaccoon: A High-performance Configurable SCA Resilient Raccoon Hardware Accelerator

open access: yesTransactions on Cryptographic Hardware and Embedded Systems
The lattice-based Raccoon scheme is one of the candidates in Round 1 of the National Institute of Standards and Technology (NIST) post-quantum cryptography (PQC) additional digital signatures standardization process.
Ziying Ni   +4 more
doaj   +1 more source

A Novel Design Flow for a Security-Driven Synthesis of Side-Channel Hardened Cryptographic Modules

open access: yesJournal of Low Power Electronics and Applications, 2017
Over the last few decades, computer-aided engineering (CAE) tools have been developed and improved in order to ensure a short time-to-market in the chip design business.
Sorin A. Huss, Oliver Stein
doaj   +1 more source

Home - About - Disclaimer - Privacy