Results 221 to 230 of about 27,981 (260)
Some of the next articles are maybe not open access.

Introduction to side-channel attacks and fault attacks

2016 Asia-Pacific International Symposium on Electromagnetic Compatibility (APEMC), 2016
Side-channel attacks and fault attacks use the physical interactions with cryptographic devices to achieve the shortcuts of recovering the secret key. For side-channel attacks, physical information leakage during the cryptographic calculation is measured and statistically analyzed to reveal the intermediate values.
Mengting Chen, Jian Wang, Yang Li
openaire   +2 more sources

Adaptive Channel Estimation in Side Channel Attacks

2018 IEEE International Workshop on Information Forensics and Security (WIFS), 2018
Side channel attacks exploit physical information that leaks from the target implementations to extract secret information, for example keys. Since the observable physical leakages are dependent on the internal state of the cryptographic implementation, predicting (or profiling) this dependency, which is also called leakage model or leakage function ...
Riccardo Bettati, Shan Jin
openaire   +2 more sources

Combined Side-Channel Attacks

2011
The literature about side-channel attacks is very rich. Many side-channel distinguishers have been devised and studied; in the meantime, many different side-channels have been identified. Also, it has been underlined that the various samples garnered during the same acquisition can carry complementary information.
Olivier Meynard   +3 more
openaire   +2 more sources

USB side-channel attack on Tor

Computer Networks, 2018
Abstract Tor is used to communicate anonymously by millions of daily users, which rely on it for their privacy, security, and often safety. In this paper we present a new attack on Tor that allows a malicious USB charging device (e.g., a public USB charging station) to identify which website is being visited by a smartphone user via Tor, thus ...
Qing Yang   +4 more
openaire   +2 more sources

Processor with side-channel attack resistance

2013 IEEE International Solid-State Circuits Conference Digest of Technical Papers, 2013
Public-key cryptosystems (Fig. 3.3.1) have been widely developed for ensuring the security of information exchange in network communications, financial markets, private data storage, and personal identification devices. In contrast to the well-known RSA algorithm, elliptic curve cryptography (ECC) provides the same security level with a shorter key ...
Chen-Yi Lee   +3 more
openaire   +2 more sources

Side Channel Attacks and Countermeasures

2011
Side-channel attacks bypass the theoretical strength of cryptographic algorithms by exploiting weaknesses in the cryptographic system hardware implementation via nonprimary, side-channel inputs and outputs. Commonly exploited side-channel outputs include: power consumption, electromagnetic (EM) emissions, light, timing, and sound (Fig. 8.1).
openaire   +2 more sources

Side-channel attacks on smartcards

Network Security, 2006
The use of smartcards and PINs for two-factor authentication has become a popular - and cost-effective - method for overcoming the limitations of passwords and usernames. But there's a major irony: the cards themselves are susceptible to attack. Smartcards use cryptographic algorithms to protect secret information.
openaire   +2 more sources

Introduction to Side-Channel Attacks

2009
Side-channel cryptanalysis is a new research area in applied cryptography that has gained more and more interest since the mid-nineties. It considers adversaries trying to take advantage of the physical specificities of actual cryptographic devices. These implementation-specific attacks frequently turn out to be much more efficient than the best known ...
openaire   +1 more source

Side-Channel Attacks

2023
Lejla Batina, Ileana Buhan
openaire   +1 more source

Embedded Cryptography: Side Channel Attacks

2006
This article gives an overview of state-of-the-art side channel attacks and corresponding countermeasures which are currently discussed in the scientific literature. We compare different attacks with respect to the algorithms attacked, measurement costs, efficiency and practicability.
Kerstin Lemke   +2 more
openaire   +2 more sources

Home - About - Disclaimer - Privacy