Results 61 to 70 of about 2,326,402 (364)

It Started with Templates: The Future of Profiling in Side-Channel Analysis [PDF]

open access: yes, 2021
AbstractSide-channel attacks (SCAs) are powerful attacks based on the information obtained from the implementation of cryptographic devices. Profiling side-channel attacks has received a lot of attention in recent years due to the fact that this type of attack defines the worst-case security assumptions.
Batina, Lejla   +3 more
openaire   +3 more sources

Deep Learning-based Side Channel Attack on HMAC SM3

open access: yesInternational Journal of Interactive Multimedia and Artificial Intelligence, 2021
SM3 is a Chinese hash standard. HMAC SM3 uses a secret key to encrypt the input text and gives an output as the HMAC of the input text. If the key is recovered, adversaries can easily forge a valid HMAC.
Xin Jin   +3 more
doaj   +1 more source

Side Channel Leakages Against Financial IC Card of the Republic of Korea

open access: yesApplied Sciences, 2018
Integrated circuit (IC) chip cards are commonly used in payment system applications since they can provide security and convenience simultaneously. More precisely, Europay, MasterCard, and VISA (EMV) are widely known to be well equipped with security ...
Yoo-Seung Won   +2 more
doaj   +1 more source

Déjà Vu: Side-Channel Analysis of Mozilla's NSS [PDF]

open access: yesProceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020
Recent work on Side Channel Analysis (SCA) targets old, well-known vulnerabilities, even previously exploited, reported, and patched in high-profile cryptography libraries. Nevertheless, researchers continue to find and exploit the same vulnerabilities in old and new products, highlighting a big issue among vendors: effectively tracking and fixing ...
Hassan, Sohaib ul   +6 more
openaire   +3 more sources

Defending cache memory against cold-boot attacks boosted by power or EM radiation analysis [PDF]

open access: yes, 2017
Some algorithms running with compromised data select cache memory as a type of secure memory where data is confined and not transferred to main memory. However, cold-boot attacks that target cache memories exploit the data remanence. Thus, a sudden power
Manich Bou, Salvador, Neagu, Madalin
core   +2 more sources

Refining the NaV1.7 pharmacophore of a class of venom‐derived peptide inhibitors via a combination of in silico screening and rational engineering

open access: yesFEBS Letters, EarlyView.
Venom peptides have shown promise in treating pain. Our study uses computer screening to identify a peptide that targets a sodium channel (NaV1.7) linked to chronic pain. We produced the peptide in the laboratory and refined its design, advancing the search for innovative pain therapies.
Gagan Sharma   +8 more
wiley   +1 more source

On the Machine Learning Techniques for Side-channel Analysis [PDF]

open access: yes, 2016
Side-channel attacks represent one of the most powerful category of attacks on cryptographic devices with profiled attacks in a prominent place as the most powerful among them.
Guilley, Sylvain   +2 more
core  

HRaccoon: A High-performance Configurable SCA Resilient Raccoon Hardware Accelerator

open access: yesTransactions on Cryptographic Hardware and Embedded Systems
The lattice-based Raccoon scheme is one of the candidates in Round 1 of the National Institute of Standards and Technology (NIST) post-quantum cryptography (PQC) additional digital signatures standardization process.
Ziying Ni   +4 more
doaj   +1 more source

Enhancing Time-Frequency Analysis with Zero-Mean Preprocessing

open access: yesSensors, 2022
Side-channel analysis is a critical threat to cryptosystems on the Internet of Things and in relation to embedded devices, and appropriate side-channel countermeasure must be required for physical security.
Sunghyun Jin   +3 more
doaj   +1 more source

Ion channel function of polycystin‐2/polycystin‐1 heteromer revealed by structure‐guided mutagenesis

open access: yesFEBS Letters, EarlyView.
Mutations in polycystin‐1 (PC1) or polycystin‐2 (PC2) cause autosomal‐dominant polycystic kidney disease (ADPKD). We generated a novel gain‐of‐function PC2/PC1 heteromeric ion channel by mutating pore‐blocking residues. Moreover, we demonstrated that PC2 will preferentially assemble with PC1 to form heteromeric complexes when PC1 is co‐expressed ...
Tobias Staudner   +7 more
wiley   +1 more source

Home - About - Disclaimer - Privacy