Results 41 to 50 of about 336,639 (325)

Multiple-Valued Plaintext-Checking Side-Channel Attacks on Post-Quantum KEMs

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2023
In this paper, we present a side-channel analysis (SCA) on key encapsulation mechanisms (KEMs) based on the Fujisaki–Okamoto (FO) transformation and its variants.
Yutaro Tanaka   +5 more
doaj   +1 more source

Side Channel Attacks

open access: yes, 2011
This chapter presents the main Side-Channel Attacks, a kind of hardware cryptanalytic techniques which exploits the physical behavior of an IC to extract secrets implied in cryptographic operations. We show in this chapter the main modern concepts about Side Channel Attacks (Simple and Differential Power Analysis) and how they can be deployed on FPGA ...
Lomné, Victor   +4 more
openaire   +3 more sources

SonarSnoop: active acoustic side-channel attacks [PDF]

open access: yesInternational Journal of Information Security, 2019
We report the first active acoustic side-channel attack. Speakers are used to emit human inaudible acoustic signals and the echo is recorded via microphones, turning the acoustic system of a smart phone into a sonar system. The echo signal can be used to profile user interaction with the device.
Peng Cheng   +3 more
openaire   +5 more sources

Sabotage Attack Detection for Additive Manufacturing Systems

open access: yesIEEE Access, 2020
This paper presents a novel multi-modal sabotage attack detection system for Additive Manufacturing (AM) machines. By utilizing multiple side-channels, we improve system state estimation significantly in comparison to uni-modal techniques.
Shih-Yuan Yu   +3 more
doaj   +1 more source

Algebraic Side-Channel Attacks [PDF]

open access: yes, 2010
In 2002, algebraic attacks using overdefined systems of equations have been proposed as a potentially very powerful cryptanalysis technique against block ciphers. However, although a number of convincing experiments have been performed against certain reduced algorithms, it is not clear whether these attacks can be successfully applied in general and ...
Mathieu Renauld   +1 more
openaire   +2 more sources

Linear Repairing Codes and Side-Channel Attacks [PDF]

open access: yesIACR Transactions on Cryptographic Hardware and Embedded Systems, 2018
To strengthen the resistance of countermeasures based on secret sharing,several works have suggested to use the scheme introduced by Shamir in 1978, which proposes to use the evaluation of a random d-degree polynomial into n ≥ d + 1 public points to share the sensitive data.
Chabanne, Hervé   +2 more
openaire   +2 more sources

Failure of the Point Blinding Countermeasure Against Fault Attack in Pairing-Based Cryptography [PDF]

open access: yes, 2015
Article published in the proceedings of the C2SI conference, May 2015.Pairings are mathematical tools that have been proven to be very useful in the construction of many cryptographic protocols.
El Mrabet, Nadia, Fouotsa, Emmanuel
core   +3 more sources

Colored Petri Net Based Cache Side Channel Vulnerability Evaluation

open access: yesIEEE Access, 2019
The cache side channel leakage is a very serious security issue in the information security field. In order to solve this problem, a large number of security mechanisms have been applied to protect the cache.
Limin Wang   +3 more
doaj   +1 more source

Defeating Hardware Prefetchers in Flush+Reload Side-Channel Attack

open access: yesIEEE Access, 2021
Hardware prefetching can seriously interfere with Flush+Reload cache side channel attack. This interference is not taken into consideration in previous Flush+Reload attacks.
Zihao Wang   +3 more
doaj   +1 more source

Attack of the Knights:Non Uniform Cache Side Channel Attack

open access: yesAnnual Computer Security Applications Conference, 2023
For a distributed last-level cache (LLC) in a large multicore chip, the access time to one LLC bank can significantly differ from that to another due to the difference in physical distance. In this paper, we successfully demonstrated a new distance-based side-channel attack by timing the AES decryption operation and extracting part of an AES secret key
Farabi Mahmud   +5 more
openaire   +2 more sources

Home - About - Disclaimer - Privacy