Results 1 to 10 of about 336,639 (325)

Physical functions: the common factor of side-channel and fault attacks? [PDF]

open access: green, 2015
International audienceSecurity is a key component for information technologies and communication. Among the security threats, a very important one is certainly due to vulnerabilities of the integrated circuits that implement cryptographic algorithms ...
Bruno Robisson, Hélène Le Bouder
openalex   +8 more sources

Multiphoton and Side-Channel Attacks in Mistrustful Quantum Cryptography [PDF]

open access: goldPRX Quantum, 2021
Mistrustful cryptography includes important tasks like bit commitment, oblivious transfer, coin flipping, secure computations, position authentication, digital signatures and secure unforgeable tokens. Practical quantum implementations presently use photonic setups. In many such implementations, Alice sends photon pulses encoding quantum states and Bob
Mathieu Bozzio   +4 more
  +11 more sources

Efficient AES Side-Channel Attacks Based on Residual Mamba Enhanced CNN [PDF]

open access: yesEntropy
With the continuous advancement of side-channel attacks (SCA), deep learning-based methods have emerged as a prominent research focus due to their powerful feature extraction and nonlinear modeling capabilities. Traditional convolutional neural networks (
Zhaobin Li, Chenchong Du, Xiaoyi Duan
doaj   +2 more sources

On the Challenges of Detecting Side-Channel Attacks in SGX

open access: greenProceedings of the 25th International Symposium on Research in Attacks, Intrusions and Defenses, 2020
Existing tools to detect side-channel attacks on Intel SGX are grounded on the observation that attacks affect the performance of the victim application. As such, all detection tools monitor the potential victim and raise an alarm if the witnessed performance (in terms of runtime, enclave interruptions, cache misses, etc.) is out of the ordinary.
Jianyu Jiang   +2 more
openalex   +4 more sources

Side-channel attacks [PDF]

open access: green, 2013
Annelie Heuser   +2 more
openalex   +3 more sources

Side Channel Attacks [PDF]

open access: yes, 2019
This Special Issue provides an opportunity for researchers in the area of side-channel attacks (SCAs) to highlight the most recent exciting technologies. The research papers published in this Special Issue represent recent progress in the field, including research on power analysis attacks, cache-based timing attacks, system-level countermeasures, and ...
Muhammad Yasin   +2 more
  +7 more sources

Deep Learning Side-Channel Collision Attack

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2023
With the breakthrough of Deep Neural Networks, many fields benefited from its enormously increasing performance. Although there is an increasing trend to utilize Deep Learning (DL) for Side-Channel Analysis (SCA) attacks, previous works made specific ...
Marvin Staib, Amir Moradi
doaj   +1 more source

ThermalBleed: A Practical Thermal Side-Channel Attack

open access: yesIEEE Access, 2022
Modern OSs expose an interface for monitoring CPU temperature to unprivileged users for effective user decision-based thermal management. Due to the low sampling rate and resolution, thermal sensors have generally been restricted to the construction of ...
Taehun Kim, Youngjoo Shin
doaj   +1 more source

The Best of Two Worlds: Deep Learning-assisted Template Attack

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2022
In the last decade, machine learning-based side-channel attacks have become a standard option when investigating profiling side-channel attacks. At the same time, the previous state-of-the-art technique, template attack, started losing its importance ...
Lichao Wu   +2 more
doaj   +1 more source

Deep Learning-based Side Channel Attack on HMAC SM3

open access: yesInternational Journal of Interactive Multimedia and Artificial Intelligence, 2021
SM3 is a Chinese hash standard. HMAC SM3 uses a secret key to encrypt the input text and gives an output as the HMAC of the input text. If the key is recovered, adversaries can easily forge a valid HMAC.
Xin Jin   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy