Results 41 to 50 of about 348,356 (277)

A Key-Recovery Side-Channel Attack on Classic McEliece Implementations

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2022
In this paper, we propose the first key-recovery side-channel attack on Classic McEliece, a KEM finalist in the NIST Post-quantum Cryptography Standardization Project.
Qian Guo   +2 more
doaj   +3 more sources

Practical Analysis of Sending or Not-Sending Twin-Field Quantum Key Distribution with Frequency Side Channels

open access: yesApplied Sciences, 2021
The twin-field quantum key distribution (TF-QKD) and its variants can overcome the fundamental rate-distance limit of QKD. However, their physical implementations with the side channels remain the subject of further research.
Yi-Fei Lu   +9 more
doaj   +1 more source

Physical functions : the common factor of side-channel and fault attacks ? [PDF]

open access: yes, 2014
International audienceSecurity is a key component for information technologies and communication. Among the security threats, a very important one is certainly due to vulnerabilities of the integrated circuits that implement cryptographic algorithms ...
Le Bouder, Hélène, Robisson, Bruno
core   +5 more sources

Algebraic Side-Channel Attacks [PDF]

open access: yes, 2010
In 2002, algebraic attacks using overdefined systems of equations have been proposed as a potentially very powerful cryptanalysis technique against block ciphers. However, although a number of convincing experiments have been performed against certain reduced algorithms, it is not clear whether these attacks can be successfully applied in general and ...
Mathieu Renauld   +1 more
openaire   +1 more source

Sabotage Attack Detection for Additive Manufacturing Systems

open access: yesIEEE Access, 2020
This paper presents a novel multi-modal sabotage attack detection system for Additive Manufacturing (AM) machines. By utilizing multiple side-channels, we improve system state estimation significantly in comparison to uni-modal techniques.
Shih-Yuan Yu   +3 more
doaj   +1 more source

Multiple-Valued Plaintext-Checking Side-Channel Attacks on Post-Quantum KEMs

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2023
In this paper, we present a side-channel analysis (SCA) on key encapsulation mechanisms (KEMs) based on the Fujisaki–Okamoto (FO) transformation and its variants.
Yutaro Tanaka   +5 more
doaj   +1 more source

Failure of the Point Blinding Countermeasure Against Fault Attack in Pairing-Based Cryptography [PDF]

open access: yes, 2015
Article published in the proceedings of the C2SI conference, May 2015.Pairings are mathematical tools that have been proven to be very useful in the construction of many cryptographic protocols.
El Mrabet, Nadia, Fouotsa, Emmanuel
core   +3 more sources

Dynamic migration method of key virtual network function based on risk awareness

open access: yesTongxin xuebao, 2020
Aiming at the problems that traditional dynamic migration methods have many migration nodes,high migration frequency,and long service function chain (SFC) link path after migration when dealing with side channel attack,a dynamic migration method of ...
Shaohu DING   +4 more
doaj   +2 more sources

Colored Petri Net Based Cache Side Channel Vulnerability Evaluation

open access: yesIEEE Access, 2019
The cache side channel leakage is a very serious security issue in the information security field. In order to solve this problem, a large number of security mechanisms have been applied to protect the cache.
Limin Wang   +3 more
doaj   +1 more source

AES Side-Channel Countermeasure using Random Tower Field Constructions [PDF]

open access: yes, 2012
International audienceMasking schemes to secure AES implementations against side-channel attacks is a topic of ongoing research. The most sensitive part of the AES is the non-linear SubBytes operation, in particular, the inversion in GF(2^8), the Galois ...
Bonnecaze, Alexis   +2 more
core   +3 more sources

Home - About - Disclaimer - Privacy