Results 291 to 300 of about 336,639 (325)
Some of the next articles are maybe not open access.

Processor with side-channel attack resistance

2013 IEEE International Solid-State Circuits Conference Digest of Technical Papers, 2013
Public-key cryptosystems (Fig. 3.3.1) have been widely developed for ensuring the security of information exchange in network communications, financial markets, private data storage, and personal identification devices. In contrast to the well-known RSA algorithm, elliptic curve cryptography (ECC) provides the same security level with a shorter key ...
Chen-Yi Lee   +3 more
openaire   +2 more sources

Side Channel Attacks and Countermeasures

2011
Side-channel attacks bypass the theoretical strength of cryptographic algorithms by exploiting weaknesses in the cryptographic system hardware implementation via nonprimary, side-channel inputs and outputs. Commonly exploited side-channel outputs include: power consumption, electromagnetic (EM) emissions, light, timing, and sound (Fig. 8.1).
openaire   +2 more sources

Side-channel attacks on smartcards

Network Security, 2006
The use of smartcards and PINs for two-factor authentication has become a popular - and cost-effective - method for overcoming the limitations of passwords and usernames. But there's a major irony: the cards themselves are susceptible to attack. Smartcards use cryptographic algorithms to protect secret information.
openaire   +2 more sources

Drm to counter side-channel attacks?

Proceedings of the 2007 ACM workshop on Digital Rights Management, 2007
In the DRM setting, the attacker is a very powerful adversary, owning the software as well as the underlying hardware. This context is far different from the black-box attacker commonly considered in conventional cryptography.Therefore, cryptographers have tried to design new cryptographic tools fitting the DRM requirements.
Stanislas Francfort   +2 more
openaire   +2 more sources

An overview of side channel analysis attacks

Proceedings of the 2008 ACM symposium on Information, computer and communications security, 2008
During the last ten years, power analysis attacks have been widely developed under many forms. They analyze the relation between the power consumption or electromagnetic radiation of a cryptographic device and the handled data during cryptographic operations.
Thanh-Ha Le   +2 more
openaire   +2 more sources

Introduction to Side-Channel Attacks

2009
Side-channel cryptanalysis is a new research area in applied cryptography that has gained more and more interest since the mid-nineties. It considers adversaries trying to take advantage of the physical specificities of actual cryptographic devices. These implementation-specific attacks frequently turn out to be much more efficient than the best known ...
openaire   +1 more source

Side-Channel Attacks

2023
Lejla Batina, Ileana Buhan
openaire   +1 more source

Embedded Cryptography: Side Channel Attacks

2006
This article gives an overview of state-of-the-art side channel attacks and corresponding countermeasures which are currently discussed in the scientific literature. We compare different attacks with respect to the algorithms attacked, measurement costs, efficiency and practicability.
Kerstin Lemke   +2 more
openaire   +2 more sources

Cancer treatment and survivorship statistics, 2022

Ca-A Cancer Journal for Clinicians, 2022
Kimberly D Miller   +2 more
exaly  

Foundations of Side-Channel Attacks

2021
Maamar Ouladj, Sylvain Guilley
openaire   +2 more sources

Home - About - Disclaimer - Privacy