Results 241 to 250 of about 348,356 (277)
Some of the next articles are maybe not open access.

Adaptive Channel Estimation in Side Channel Attacks

2018 IEEE International Workshop on Information Forensics and Security (WIFS), 2018
Side channel attacks exploit physical information that leaks from the target implementations to extract secret information, for example keys. Since the observable physical leakages are dependent on the internal state of the cryptographic implementation, predicting (or profiling) this dependency, which is also called leakage model or leakage function ...
Shan Jin, Riccardo Bettati
openaire   +1 more source

Embedded Cryptography: Side Channel Attacks

2006
This article gives an overview of state-of-the-art side channel attacks and corresponding countermeasures which are currently discussed in the scientific literature. We compare different attacks with respect to the algorithms attacked, measurement costs, efficiency and practicability.
Kai Schramm   +2 more
openaire   +1 more source

Profiling Side-Channel Attacks on Dilithium

We present an end-to-end (equivalent) key recovery attack on the Dilithium lattice-based signature scheme, one of the winners of the NIST postquantum cryptography competition. The attack is based on a small side-channel leakage we identified in a bit unpacking procedure inside Dilithium signature generation.
Ulitzsch, Vincent Quentin   +3 more
openaire   +1 more source

Side-Channel Attacks

2023
Lejla Batina, Ileana Buhan
openaire   +1 more source

Cache Based Side-Channel Attacks

2020
In the current era of computation, multiple processor cores are deployed in devices that range from smart-phones, laptops, desktops, servers, and cloud-based systems. Though, innovations in the world of hardware and computer architecture have resulted in faster computation in terms of better performance, a lot of sensitive data that is stored and ...
openaire   +1 more source

Side Channel Attacks and Countermeasures

2011
Side-channel attacks bypass the theoretical strength of cryptographic algorithms by exploiting weaknesses in the cryptographic system hardware implementation via nonprimary, side-channel inputs and outputs. Commonly exploited side-channel outputs include: power consumption, electromagnetic (EM) emissions, light, timing, and sound (Fig. 8.1).
openaire   +1 more source

MAGLeak: A Learning-Based Side-Channel Attack for Password Recognition With Multiple Sensors in IIoT Environment

IEEE Transactions on Industrial Informatics, 2022
Dajiang Chen, Zihao Zhao, Xue Qin
exaly  

Deep learning side-channel attack against hardware implementations of AES

Microprocessors and Microsystems, 2021
Kota Yoshida
exaly  

Introduction to Side-Channel Attacks

2009
Side-channel cryptanalysis is a new research area in applied cryptography that has gained more and more interest since the mid-nineties. It considers adversaries trying to take advantage of the physical specificities of actual cryptographic devices. These implementation-specific attacks frequently turn out to be much more efficient than the best known ...
openaire   +1 more source

Home - About - Disclaimer - Privacy