Results 251 to 260 of about 212,817 (301)
Some of the next articles are maybe not open access.

Combined Side-Channel Attacks

2011
The literature about side-channel attacks is very rich. Many side-channel distinguishers have been devised and studied; in the meantime, many different side-channels have been identified. Also, it has been underlined that the various samples garnered during the same acquisition can carry complementary information.
M. Abdelaziz Elaabid   +3 more
openaire   +1 more source

Multi-label Deep Learning based Side Channel Attack

Asian Hardware-Oriented Security and Trust Symposium, 2019
In this paper, a novel side channel attack method with multi-label deep learning is proposed, and it surpasses the state-of-the-art result in ASCAD benchmark dataset.
Libang Zhang   +4 more
semanticscholar   +1 more source

Side Channel Attack

2018
Embedded frameworks remain continuously adopted in a varied range of application places. Cryptography is the design besides analysis of calculated structures that enable communications for security issue in the presence of malicious adversaries. Side channel attacks are a current class of attacks that remains very powerful in practice.
EFE, Ahmet, ALASHİK, Khalid Mohammed
openaire   +1 more source

A Power Side-Channel Attack on the Reed-Muller Reed-Solomon Version of the HQC Cryptosystem

IACR Cryptology ePrint Archive, 2022
T. Schamberger   +4 more
semanticscholar   +1 more source

Traffic-Based Side-Channel Attack in Video Streaming

IEEE/ACM Transactions on Networking, 2019
Video streaming takes up an increasing proportion of network traffic nowadays. Dynamic adaptive streaming over HTTP (DASH) becomes the de facto standard of video streaming and it is adopted by Youtube, Netflix, and so on.
Jiaxi Gu   +3 more
semanticscholar   +1 more source

A New Key Recovery Side-Channel Attack on HQC with Chosen Ciphertext

Post-Quantum Cryptography, 2022
Guillaume Goy   +2 more
semanticscholar   +1 more source

Adaptive Channel Estimation in Side Channel Attacks

2018 IEEE International Workshop on Information Forensics and Security (WIFS), 2018
Side channel attacks exploit physical information that leaks from the target implementations to extract secret information, for example keys. Since the observable physical leakages are dependent on the internal state of the cryptographic implementation, predicting (or profiling) this dependency, which is also called leakage model or leakage function ...
Shan Jin, Riccardo Bettati
openaire   +1 more source

Embedded Cryptography: Side Channel Attacks

2006
This article gives an overview of state-of-the-art side channel attacks and corresponding countermeasures which are currently discussed in the scientific literature. We compare different attacks with respect to the algorithms attacked, measurement costs, efficiency and practicability.
Kai Schramm   +2 more
openaire   +1 more source

Profiling Side-Channel Attacks on Dilithium

We present an end-to-end (equivalent) key recovery attack on the Dilithium lattice-based signature scheme, one of the winners of the NIST postquantum cryptography competition. The attack is based on a small side-channel leakage we identified in a bit unpacking procedure inside Dilithium signature generation.
Ulitzsch, Vincent Quentin   +3 more
openaire   +1 more source

Side-Channel Attacks

2023
Lejla Batina, Ileana Buhan
openaire   +1 more source

Home - About - Disclaimer - Privacy