搜索结果: 16-30 共查到“军事学 Side-channel attacks”相关记录91条 . 查询时间(0.077 秒)
Modeling Soft Analytical Side-Channel Attacks from a Coding Theory Viewpoint
Side-channel analysis belief propagation random probing model
2018/5/28
One important open question in the field of side-channel analysis is to find out whether all the leakage samples in an implementation can be exploited by an adversary, as suggested by masking security...
Non-Profiled Deep Learning-Based Side-Channel Attacks
side-channel attacks deep learning machine learning
2018/3/5
Deep Learning has recently been introduced as a new alternative to perform Side-Channel analysis. Until now, studies have been focused on applying Deep Learning techniques to perform Profiled Side-Cha...
Higher Order Side-Channel Attacks Resilient S-boxes
S-box construction Genetic algorithms Higher-order side-channel analysis
2018/1/12
Masking and hiding schemes represent a well-researched and successful option to follow when considering side-channel countermeasures. Still, such measures increase the implementation cost in term of p...
Two Sides of the Same Coin: Counting and Enumerating Keys Post Side-Channel Attacks Revisited
implementation side channels
2018/1/12
Motivated by the need to assess the concrete security of a device after a side channel attack, there has been a flurry of recent work designing both key rank and key enumeration algorithms. Two main c...
Applying Horizontal Clustering Side-Channel Attacks on Embedded ECC Implementations
side-channel attack SCA ECC
2017/12/19
Side-channel attacks are a threat to cryptographic algorithms running on embedded devices. Public-key cryptosystems, including elliptic curve cryptography (ECC), are particularly vulnerable because th...
On the Relevance of Feature Selection for Profiled Side-channel Attacks
Profiled side-channel attacks feature selection machine learning
2017/11/21
In the process of profiled side-channel analysis there is a number of steps one needs to make. One important step that is often conducted without a proper attention is selection of the points of inter...
To strengthen the resistance of countermeasures based on secret sharing, several works have suggested to use the scheme introduced by Shamir in 1978, which proposes to use the evaluation of a random d...
Design, Implementation and Performance Analysis of Highly Efficient Algorithms for AES Key Retrieval in Access-driven Cache-based Side Channel Attacks
AES access-driven cache attacks
2017/9/21
Leakage of information between two processes sharing the same processor cache has been exploited in many novel approaches targeting various cryptographic algorithms. The software implementation of AES...
Runtime Code Polymorphism as a Protection Against Side Channel Attacks
AES side-channel attacks polymorphism
2017/7/24
We present a generic framework for runtime code polymorphism, applicable to a broad range of computing platforms including embedded systems with low computing resources (e.g. microcontrollers with few...
Securing Memory Encryption and Authentication Against Side-Channel Attacks Using Unprotected Primitives
side-channel attack DPA memory
2017/7/6
Memory encryption is used in many devices to protect memory content from attackers with physical access to a device. However, many current memory encryption schemes can be broken using Differential Po...
Single-Trace Side-Channel Attacks on Masked Lattice-Based Encryption
Lattice-Based Cryptography Side-Channel Analysis Single-Trace Attack
2017/6/22
Although lattice-based cryptography has proven to be a particularly efficient approach to post-quantum cryptography, its security against side-channel attacks is still a very open topic. There already...
Performance Counters to Rescue: A Machine Learning based safeguard against Micro-architectural Side-Channel-Attacks
Micro-Architectural Side-Channel-Attack Hardware Performance Counters Machine Learning
2017/6/15
Micro-architectural side-channel-attacks are presently daunting threats to most mathematically elegant encryption algorithms. Even though there exist various defense mechanisms, most of them come with...
Side-Channel Attacks on BLISS Lattice-Based Signatures -- Exploiting Branch Tracing Against strongSwan and Electromagnetic Emanations in Microcontrollers
BLISS branch tracing SPA
2017/6/5
In this paper, we investigate the security of the BLISS lattice-based signature scheme, one of the most promising candidates for post-quantum-secure signatures, against side-channel attacks. Several w...
FourQ on embedded devices with strong countermeasures against side-channel attacks
Elliptic curves FourQ ECDH
2017/5/23
This work deals with the energy-efficient, high-speed and high-security implementation of elliptic curve scalar multiplication, elliptic curve Diffie-Hellman (ECDH) key exchange and elliptic curve dig...
Synthesis of Adaptive Side-Channel Attacks
Side-Channel Attacks Quantitative Information Flow Cryptography
2017/5/11
We present symbolic analysis techniques for detecting vulnerabilities that are due to adaptive side-channel attacks, and synthesizing inputs that exploit the identified vulnerabilities. We start with ...