Results 221 to 230 of about 27,981 (260)
Some of the next articles are maybe not open access.
Introduction to side-channel attacks and fault attacks
2016 Asia-Pacific International Symposium on Electromagnetic Compatibility (APEMC), 2016Side-channel attacks and fault attacks use the physical interactions with cryptographic devices to achieve the shortcuts of recovering the secret key. For side-channel attacks, physical information leakage during the cryptographic calculation is measured and statistically analyzed to reveal the intermediate values.
Mengting Chen, Jian Wang, Yang Li
openaire +2 more sources
Adaptive Channel Estimation in Side Channel Attacks
2018 IEEE International Workshop on Information Forensics and Security (WIFS), 2018Side channel attacks exploit physical information that leaks from the target implementations to extract secret information, for example keys. Since the observable physical leakages are dependent on the internal state of the cryptographic implementation, predicting (or profiling) this dependency, which is also called leakage model or leakage function ...
Riccardo Bettati, Shan Jin
openaire +2 more sources
2011
The literature about side-channel attacks is very rich. Many side-channel distinguishers have been devised and studied; in the meantime, many different side-channels have been identified. Also, it has been underlined that the various samples garnered during the same acquisition can carry complementary information.
Olivier Meynard+3 more
openaire +2 more sources
The literature about side-channel attacks is very rich. Many side-channel distinguishers have been devised and studied; in the meantime, many different side-channels have been identified. Also, it has been underlined that the various samples garnered during the same acquisition can carry complementary information.
Olivier Meynard+3 more
openaire +2 more sources
USB side-channel attack on Tor
Computer Networks, 2018Abstract Tor is used to communicate anonymously by millions of daily users, which rely on it for their privacy, security, and often safety. In this paper we present a new attack on Tor that allows a malicious USB charging device (e.g., a public USB charging station) to identify which website is being visited by a smartphone user via Tor, thus ...
Qing Yang+4 more
openaire +2 more sources
Processor with side-channel attack resistance
2013 IEEE International Solid-State Circuits Conference Digest of Technical Papers, 2013Public-key cryptosystems (Fig. 3.3.1) have been widely developed for ensuring the security of information exchange in network communications, financial markets, private data storage, and personal identification devices. In contrast to the well-known RSA algorithm, elliptic curve cryptography (ECC) provides the same security level with a shorter key ...
Chen-Yi Lee+3 more
openaire +2 more sources
Side Channel Attacks and Countermeasures
2011Side-channel attacks bypass the theoretical strength of cryptographic algorithms by exploiting weaknesses in the cryptographic system hardware implementation via nonprimary, side-channel inputs and outputs. Commonly exploited side-channel outputs include: power consumption, electromagnetic (EM) emissions, light, timing, and sound (Fig. 8.1).
openaire +2 more sources
Side-channel attacks on smartcards
Network Security, 2006The use of smartcards and PINs for two-factor authentication has become a popular - and cost-effective - method for overcoming the limitations of passwords and usernames. But there's a major irony: the cards themselves are susceptible to attack. Smartcards use cryptographic algorithms to protect secret information.
openaire +2 more sources
Introduction to Side-Channel Attacks
2009Side-channel cryptanalysis is a new research area in applied cryptography that has gained more and more interest since the mid-nineties. It considers adversaries trying to take advantage of the physical specificities of actual cryptographic devices. These implementation-specific attacks frequently turn out to be much more efficient than the best known ...
openaire +1 more source
Embedded Cryptography: Side Channel Attacks
2006This article gives an overview of state-of-the-art side channel attacks and corresponding countermeasures which are currently discussed in the scientific literature. We compare different attacks with respect to the algorithms attacked, measurement costs, efficiency and practicability.
Kerstin Lemke+2 more
openaire +2 more sources