Results 61 to 70 of about 2,326,402 (364)
It Started with Templates: The Future of Profiling in Side-Channel Analysis [PDF]
AbstractSide-channel attacks (SCAs) are powerful attacks based on the information obtained from the implementation of cryptographic devices. Profiling side-channel attacks has received a lot of attention in recent years due to the fact that this type of attack defines the worst-case security assumptions.
Batina, Lejla+3 more
openaire +3 more sources
Deep Learning-based Side Channel Attack on HMAC SM3
SM3 is a Chinese hash standard. HMAC SM3 uses a secret key to encrypt the input text and gives an output as the HMAC of the input text. If the key is recovered, adversaries can easily forge a valid HMAC.
Xin Jin+3 more
doaj +1 more source
Side Channel Leakages Against Financial IC Card of the Republic of Korea
Integrated circuit (IC) chip cards are commonly used in payment system applications since they can provide security and convenience simultaneously. More precisely, Europay, MasterCard, and VISA (EMV) are widely known to be well equipped with security ...
Yoo-Seung Won+2 more
doaj +1 more source
Déjà Vu: Side-Channel Analysis of Mozilla's NSS [PDF]
Recent work on Side Channel Analysis (SCA) targets old, well-known vulnerabilities, even previously exploited, reported, and patched in high-profile cryptography libraries. Nevertheless, researchers continue to find and exploit the same vulnerabilities in old and new products, highlighting a big issue among vendors: effectively tracking and fixing ...
Hassan, Sohaib ul+6 more
openaire +3 more sources
Defending cache memory against cold-boot attacks boosted by power or EM radiation analysis [PDF]
Some algorithms running with compromised data select cache memory as a type of secure memory where data is confined and not transferred to main memory. However, cold-boot attacks that target cache memories exploit the data remanence. Thus, a sudden power
Manich Bou, Salvador, Neagu, Madalin
core +2 more sources
Venom peptides have shown promise in treating pain. Our study uses computer screening to identify a peptide that targets a sodium channel (NaV1.7) linked to chronic pain. We produced the peptide in the laboratory and refined its design, advancing the search for innovative pain therapies.
Gagan Sharma+8 more
wiley +1 more source
On the Machine Learning Techniques for Side-channel Analysis [PDF]
Side-channel attacks represent one of the most powerful category of attacks on cryptographic devices with profiled attacks in a prominent place as the most powerful among them.
Guilley, Sylvain+2 more
core
HRaccoon: A High-performance Configurable SCA Resilient Raccoon Hardware Accelerator
The lattice-based Raccoon scheme is one of the candidates in Round 1 of the National Institute of Standards and Technology (NIST) post-quantum cryptography (PQC) additional digital signatures standardization process.
Ziying Ni+4 more
doaj +1 more source
Enhancing Time-Frequency Analysis with Zero-Mean Preprocessing
Side-channel analysis is a critical threat to cryptosystems on the Internet of Things and in relation to embedded devices, and appropriate side-channel countermeasure must be required for physical security.
Sunghyun Jin+3 more
doaj +1 more source
Ion channel function of polycystin‐2/polycystin‐1 heteromer revealed by structure‐guided mutagenesis
Mutations in polycystin‐1 (PC1) or polycystin‐2 (PC2) cause autosomal‐dominant polycystic kidney disease (ADPKD). We generated a novel gain‐of‐function PC2/PC1 heteromeric ion channel by mutating pore‐blocking residues. Moreover, we demonstrated that PC2 will preferentially assemble with PC1 to form heteromeric complexes when PC1 is co‐expressed ...
Tobias Staudner+7 more
wiley +1 more source