Results 31 to 40 of about 212,817 (301)

Side-Channel Attack on a Protected RFID Card

open access: yesIEEE Access, 2018
Side-channel attack is a known security risk to smart cards, and there have been efforts by smart card manufacturers to incorporate side-channel attack countermeasures. In this paper, we study a widely used smart card that uses the 3DES algorithm. First,
Rixin Xu   +6 more
doaj   +1 more source

Algebraic Side-Channel Attack on Twofish [PDF]

open access: yesJournal of Internet Services and Information Security, 2017
While algebraic side-channel attack (ASCA) has been successful in breaking simple cryptographic algorithms, it has never been done on larger or more complex algorithms such as Twofish.
Chujiao Ma, John Chandy, Zhijie Shi
doaj  

SITM: See-In-The-Middle Side-Channel Assisted Middle Round Differential Cryptanalysis on SPN Block Ciphers

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2019
Side-channel analysis constitutes a powerful attack vector against cryptographic implementations. Techniques such as power and electromagnetic side-channel analysis have been extensively studied to provide an efficient way to recover the secret key used ...
Shivam Bhasin   +5 more
doaj   +1 more source

Kangaroos in Side-Channel Attacks [PDF]

open access: yes, 2015
Side-channel attacks are a powerful tool to discover the cryptographic secrets of a chip or other device but only too often do they require too many traces or leave too many possible keys to explore. In this paper we show that for side channel attacks on discrete-logarithm-based systems significantly more unknown bits can be handled by using Pollard's ...
Lange, T.   +2 more
openaire   +3 more sources

Practical Approaches Toward Deep-Learning-Based Cross-Device Power Side-Channel Attack [PDF]

open access: yesIEEE Transactions on Very Large Scale Integration (VLSI) Systems, 2019
Power side-channel analysis (SCA) has been of immense interest to most embedded designers to evaluate the physical security of the system. This work presents profiling-based cross-device power SCA attacks using deep-learning techniques on 8-bit AVR ...
Anupam Golder   +5 more
semanticscholar   +1 more source

Single trace side-channel attack on key reconciliation in quantum key distribution system and its efficient countermeasures

open access: yesICT Express, 2021
Although quantum mechanics guarantees the security of the quantum key distribution system, it is crucial to examine whether the implementation flaws can lead to the disclosure of sensitive information. In this paper, we propose the side-channel attack on
Dongjun Park   +5 more
doaj   +1 more source

Side Channel Attacks

open access: yes, 2011
This chapter presents the main Side-Channel Attacks, a kind of hardware cryptanalytic techniques which exploits the physical behavior of an IC to extract secrets implied in cryptographic operations. We show in this chapter the main modern concepts about Side Channel Attacks (Simple and Differential Power Analysis) and how they can be deployed on FPGA ...
Lomné, Victor   +4 more
openaire   +2 more sources

Locating Side Channel Leakage in Time through Matched Filters

open access: yesCryptography, 2022
Side channel attacks provide an effective way to extract secret information from the execution of cryptographic algorithms run on a variety of computing devices.
Alessandro Barenghi   +2 more
doaj   +1 more source

Practical Analysis of Sending or Not-Sending Twin-Field Quantum Key Distribution with Frequency Side Channels

open access: yesApplied Sciences, 2021
The twin-field quantum key distribution (TF-QKD) and its variants can overcome the fundamental rate-distance limit of QKD. However, their physical implementations with the side channels remain the subject of further research.
Yi-Fei Lu   +9 more
doaj   +1 more source

Optimal Collision Side-Channel Attacks [PDF]

open access: yes, 2020
Collision side-channel attacks are effective attacks against cryptographic implementations, however, optimality and efficiency of collision side-channel attacks is an open question. In this paper, we show that collision side-channel attacks can be derived using maximum likelihood principle when the distribution of the values of the leakage function is ...
Cezary Glowacz, Vincent Grosso
openaire   +1 more source

Home - About - Disclaimer - Privacy