Results 1 to 10 of about 336,639 (325)
Physical functions: the common factor of side-channel and fault attacks? [PDF]
International audienceSecurity is a key component for information technologies and communication. Among the security threats, a very important one is certainly due to vulnerabilities of the integrated circuits that implement cryptographic algorithms ...
Bruno Robisson, Hélène Le Bouder
openalex +8 more sources
Multiphoton and Side-Channel Attacks in Mistrustful Quantum Cryptography [PDF]
Mistrustful cryptography includes important tasks like bit commitment, oblivious transfer, coin flipping, secure computations, position authentication, digital signatures and secure unforgeable tokens. Practical quantum implementations presently use photonic setups. In many such implementations, Alice sends photon pulses encoding quantum states and Bob
Mathieu Bozzio+4 more
+11 more sources
Efficient AES Side-Channel Attacks Based on Residual Mamba Enhanced CNN [PDF]
With the continuous advancement of side-channel attacks (SCA), deep learning-based methods have emerged as a prominent research focus due to their powerful feature extraction and nonlinear modeling capabilities. Traditional convolutional neural networks (
Zhaobin Li, Chenchong Du, Xiaoyi Duan
doaj +2 more sources
On the Challenges of Detecting Side-Channel Attacks in SGX
Existing tools to detect side-channel attacks on Intel SGX are grounded on the observation that attacks affect the performance of the victim application. As such, all detection tools monitor the potential victim and raise an alarm if the witnessed performance (in terms of runtime, enclave interruptions, cache misses, etc.) is out of the ordinary.
Jianyu Jiang+2 more
openalex +4 more sources
This Special Issue provides an opportunity for researchers in the area of side-channel attacks (SCAs) to highlight the most recent exciting technologies. The research papers published in this Special Issue represent recent progress in the field, including research on power analysis attacks, cache-based timing attacks, system-level countermeasures, and ...
Muhammad Yasin+2 more
+7 more sources
Deep Learning Side-Channel Collision Attack
With the breakthrough of Deep Neural Networks, many fields benefited from its enormously increasing performance. Although there is an increasing trend to utilize Deep Learning (DL) for Side-Channel Analysis (SCA) attacks, previous works made specific ...
Marvin Staib, Amir Moradi
doaj +1 more source
ThermalBleed: A Practical Thermal Side-Channel Attack
Modern OSs expose an interface for monitoring CPU temperature to unprivileged users for effective user decision-based thermal management. Due to the low sampling rate and resolution, thermal sensors have generally been restricted to the construction of ...
Taehun Kim, Youngjoo Shin
doaj +1 more source
The Best of Two Worlds: Deep Learning-assisted Template Attack
In the last decade, machine learning-based side-channel attacks have become a standard option when investigating profiling side-channel attacks. At the same time, the previous state-of-the-art technique, template attack, started losing its importance ...
Lichao Wu+2 more
doaj +1 more source
Deep Learning-based Side Channel Attack on HMAC SM3
SM3 is a Chinese hash standard. HMAC SM3 uses a secret key to encrypt the input text and gives an output as the HMAC of the input text. If the key is recovered, adversaries can easily forge a valid HMAC.
Xin Jin+3 more
doaj +1 more source