Results 281 to 290 of about 349,795 (327)
Some of the next articles are maybe not open access.
Thwarting side-channel attacks
Communications of the ACM, 2020Deep learning challenges chip security.
openaire +1 more source
IEEE Transactions on Dependable and Secure Computing, 2020
Graphics Processing Units (GPUs) are commonly integrated with computing devices to enhance the performance and capabilities of graphical workloads. In addition, they are increasingly being integrated in data centers and clouds such that they can be used to accelerate data intensive workloads.
Hoda Naghibijouybari +3 more
openaire +1 more source
Graphics Processing Units (GPUs) are commonly integrated with computing devices to enhance the performance and capabilities of graphical workloads. In addition, they are increasingly being integrated in data centers and clouds such that they can be used to accelerate data intensive workloads.
Hoda Naghibijouybari +3 more
openaire +1 more source
Timing and Side Channel Attacks
2015How would you know the US pentagon is planning an attack on Iraq? One possible plan is to infiltrate the pentagon using spies, flipping traitors etc. But this sounds like lots of work and it is a dangerous work. That is the direct approach. Another possible plan is to ask the pizza delivery guys in the area.
Resh Amit, Zaidenberg Nezer
openaire +2 more sources
Mitigating Electromagnetic Side-Channel Attacks
Advances in Multidisciplinary and scientific Research Journal Publication, 2022By providing new sources of electronic evidence, the Internet of Things (IoT) has opened up new possibilities for digital forensics. Obtaining electronic data from IoT, on the other hand, is a difficult process for a variety of reasons, including the use of various types of standard interfaces, the use of light-weight data encryption, such as elliptic ...
openaire +1 more source
2011
The literature about side-channel attacks is very rich. Many side-channel distinguishers have been devised and studied; in the meantime, many different side-channels have been identified. Also, it has been underlined that the various samples garnered during the same acquisition can carry complementary information.
M. Abdelaziz Elaabid +3 more
openaire +1 more source
The literature about side-channel attacks is very rich. Many side-channel distinguishers have been devised and studied; in the meantime, many different side-channels have been identified. Also, it has been underlined that the various samples garnered during the same acquisition can carry complementary information.
M. Abdelaziz Elaabid +3 more
openaire +1 more source
2018
Embedded frameworks remain continuously adopted in a varied range of application places. Cryptography is the design besides analysis of calculated structures that enable communications for security issue in the presence of malicious adversaries. Side channel attacks are a current class of attacks that remains very powerful in practice.
EFE, Ahmet, ALASHİK, Khalid Mohammed
openaire +1 more source
Embedded frameworks remain continuously adopted in a varied range of application places. Cryptography is the design besides analysis of calculated structures that enable communications for security issue in the presence of malicious adversaries. Side channel attacks are a current class of attacks that remains very powerful in practice.
EFE, Ahmet, ALASHİK, Khalid Mohammed
openaire +1 more source
Adaptive Channel Estimation in Side Channel Attacks
2018 IEEE International Workshop on Information Forensics and Security (WIFS), 2018Side channel attacks exploit physical information that leaks from the target implementations to extract secret information, for example keys. Since the observable physical leakages are dependent on the internal state of the cryptographic implementation, predicting (or profiling) this dependency, which is also called leakage model or leakage function ...
Shan Jin, Riccardo Bettati
openaire +1 more source
Embedded Cryptography: Side Channel Attacks
2006This article gives an overview of state-of-the-art side channel attacks and corresponding countermeasures which are currently discussed in the scientific literature. We compare different attacks with respect to the algorithms attacked, measurement costs, efficiency and practicability.
Kai Schramm +2 more
openaire +1 more source
Profiling Side-Channel Attacks on Dilithium
We present an end-to-end (equivalent) key recovery attack on the Dilithium lattice-based signature scheme, one of the winners of the NIST postquantum cryptography competition. The attack is based on a small side-channel leakage we identified in a bit unpacking procedure inside Dilithium signature generation.Ulitzsch, Vincent Quentin +3 more
openaire +1 more source

