Results 21 to 30 of about 349,795 (327)

A Security Analysis of IoT Encryption: Side-channel Cube Attack on Simeck32/64 [PDF]

open access: yes, 2018
Simeck, a lightweight block cipher has been proposed to be one of the encryption that can be employed in the Internet of Things (IoT) applications. Therefore, this paper presents the security of the Simeck32/64 block cipher against side-channel cube ...
Abdul-Latip, Shekh Faisal   +2 more
core   +2 more sources

Asymmetric Leakage from Multiplier and Collision-Based Single-Shot Side-Channel Attack [PDF]

open access: yes, 2016
The single-shot collision attack on RSA proposed by Hanley et al. is studied focusing on the difference between two operands of multiplier. It is shown that how leakage from integer multiplier and long-integer multiplication algorithm can be asymmetric ...
Daisuke SUZUKI   +2 more
core   +2 more sources

Experimental measurement-device-independent quantum digital signatures over a metropolitan network [PDF]

open access: yes, 2017
Quantum digital signatures (QDS) provide a means for signing electronic communications with informationtheoretic security. However, all previous demonstrations of quantum digital signatures assume trusted measurement devices. This renders them vulnerable
Andersson, Erika   +18 more
core   +2 more sources

Fault Template Attack Based on Fault Probability

open access: yesIEEE Access, 2023
Template attack uses leaked information from various side channels and may break out the countermeasures embedded in the algorithm, which is considered a powerful side-channel attack method.
Tong Wu, Dawei Zhou, Lei Du, Shiwei Wang
doaj   +1 more source

Weak randomness completely trounces the security of QKD [PDF]

open access: yes, 2012
In usual security proofs of quantum protocols the adversary (Eve) is expected to have full control over any quantum communication between any communicating parties (Alice and Bob).
C. H. Bennett   +8 more
core   +2 more sources

Stealing Keys From Hardware Wallets: A Single Trace Side-Channel Attack on Elliptic Curve Scalar Multiplication Without Profiling

open access: yesIEEE Access, 2023
Over the past decade, decentralized cryptocurrencies have received attention in industry and academia. Hardware wallets are dedicated devices that manage cryptocurrencies safely without entrusting cryptographic keys to a third party. Side-channel attacks
Dongjun Park   +5 more
doaj   +1 more source

Side channel attacks on smart home systems: A short overview [PDF]

open access: yes, 2017
This paper provides an overview on side-channel attacks with emphasis on vulnerabilities in the smart home. Smart homes are enabled by the latest developments in sensors, communication technologies, internet protocols, and cloud services.
Abdullah, A. H.   +3 more
core   +1 more source

Side-Channel Attack on a Protected RFID Card

open access: yesIEEE Access, 2018
Side-channel attack is a known security risk to smart cards, and there have been efforts by smart card manufacturers to incorporate side-channel attack countermeasures. In this paper, we study a widely used smart card that uses the 3DES algorithm. First,
Rixin Xu   +6 more
doaj   +1 more source

A Template Attack Against VERIFY PIN Algorithms [PDF]

open access: yes, 2016
International audienceThis paper presents the first side channel analysis from electromagnetic emissions on VERIFY PIN algorithms. To enter a PIN code, a user has a limited number of trials.
Barry, Thierno   +4 more
core   +3 more sources

Algebraic Side-Channel Attack on Twofish [PDF]

open access: yesJournal of Internet Services and Information Security, 2017
While algebraic side-channel attack (ASCA) has been successful in breaking simple cryptographic algorithms, it has never been done on larger or more complex algorithms such as Twofish.
Chujiao Ma, John Chandy, Zhijie Shi
doaj  

Home - About - Disclaimer - Privacy