Results 71 to 80 of about 2,490,029 (269)

Spatial Coding Techniques for Molecular MIMO

open access: yes, 2017
This paper studies spatial diversity techniques applied to multiple-input multiple-output (MIMO) diffusion-based molecular communications (DBMC). Two types of spatial coding techniques, namely Alamouti-type coding and repetition MIMO coding are suggested
Chae, Chan-Byoung   +3 more
core   +1 more source

An Automated End-to-End Side Channel Analysis Based on Probabilistic Model

open access: yesApplied Sciences, 2020
In this paper, we propose a new automated way to find out the secret exponent from a single power trace. We segment the power trace into subsignals that are directly related to recovery of the secret exponent.
Jeonghwan Hwang, Ji Won Yoon
doaj   +1 more source

Side-Channel Analysis of Chaos-Based Substitution Box Structures

open access: yesIEEE Access, 2019
There is a theoretically strong relationship between chaos and cryptology. In practice, one of the most successful applications of this relationship is chaos-based s-box structures.
Mehmet Sahin Acikkapi   +2 more
doaj   +1 more source

Advanced stochastic methods in side channel analysis on block ciphers in the presence of masking

open access: yesJournal of Mathematical Cryptology, 2008
At CHES 2005 a new stochastic approach for differential side channel cryptanalysis on block ciphers was introduced and studied intensively. In the present paper we focus on a generalized variant that can handle arbitrary masking techniques.
Schindler Werner
doaj   +1 more source

On XTR and Side-Channel Analysis [PDF]

open access: yes, 2004
Over the past few years, there has been a large volume of work on both attacking elliptic curve cryptosystems (ECC) using side-channel analysis and the development of related defence methods. Lenstra and Verheul recently introduced XTR, a cryptosystem that can compete with ECC in terms of processing and bandwidth requirements. These properties make XTR
Page, Daniel, Stam, Martijn
openaire   +1 more source

Comparison between Side-Channel Analysis Distinguishers [PDF]

open access: yes, 2012
Side-channel analyses allow to extract keys from devices whatever their length. They rely on tools called "distinguishers". In this paper, we intend to compare two generic distinguishers per se: we provide a characterization environment where all the implementation details are equal, hence a fair comparison. In the field of distinguishers that use a
Houssem Maghrebi   +3 more
openaire   +1 more source

Mind the Portability: A Warriors Guide through Realistic Profiled Side-channel Analysis

open access: yesIACR Cryptology ePrint Archive, 2019
—Profiled side-channel attacks represent a practical threat to digital devices, thereby having the potential to disrupt the foundation of e-commerce, the Internet of Things (IoT), and smart cities.
S. Bhasin   +5 more
semanticscholar   +1 more source

A Modular and Optimized Toolbox for Side-Channel Analysis

open access: yesIEEE Access, 2019
The aim of this paper is to describe the characteristics of a toolbox developed to carry out a side-channel analysis of cryptosystems implemented in physical devices.
Alberto Fuentes Rodriguez   +3 more
doaj   +1 more source

Regenerative cooling design and analysis computer program [PDF]

open access: yes, 1975
Program evaluates influences of heat transfer, stress, and cycle life. Coolant passages may be tubes or channels, with or without gas-side wall coating. Program options include two-dimensional thermal analysis model of tube or channel cross-section using
Gerstley, J. G., Tobin, R. D.
core   +1 more source

Cloning Hardware Wallet Without Valid Credentials Through Side-Channel Analysis of Hash Function

open access: yesIEEE Access
Hardware wallets, specialized devices designed to securely manage users’ credentials, play a crucial role in securing cryptocurrencies, ensuring credentials remain under user control without reliance on third-party entities.
Dongjun Park   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy