搜索结果: 31-45 共查到“军事学 side-channel attacks”相关记录91条 . 查询时间(0.066 秒)
Photonic Side Channel Attacks Against RSA
public-key cryptography side-channel cryptanalysis
2017/2/20
This paper describes the first attack utilizing the photonic side channel against a public-key crypto-system. We evaluated three common implementations of RSA modular exponentiation, all using the Kar...
ISAP -- Authenticated Encryption Inherently Secure Against Passive Side-Channel Attacks
authenticated encryption fresh re-keying passive side-channel attacks
2016/12/8
Side-channel attacks and in particular differential power analysis (DPA) attacks pose a serious threat to cryptographic implementations. One approach to counteract such attacks are cryptographic schem...
Comparing Sboxes of Ciphers from the Perspective of Side-Channel Attacks
boolean functions Sbox side-channel attacks
2016/12/8
Side-channel attacks exploit physical characteristics of implementations of cryptographic algorithms in order to extract sensitive information such as the secret key. These physical attacks are among ...
Horizontal Side-Channel Attacks and Countermeasures on the ISW Masking Scheme
Side-channel attack ISW countermeasure Rivain-Prouff countermeasure
2016/6/2
A common countermeasure against side-channel attacks consists in using the masking
scheme originally introduced by Ishai, Sahai and Wagner (ISW) at Crypto 2003, and further generalized
by Rivain and...
Exploiting the Physical Disparity: Side-Channel Attacks on Memory Encryption
memory encryption side-channel attack power analysis
2016/5/18
Memory and disk encryption is a common measure to protect sensitive information in memory from adversaries with physical access. However, physical access also comes with the risk of physical attacks. ...
There is Wisdom in Harnessing the Strengths of your Enemy: Customized Encoding to Thwart Side-Channel Attacks -- Extended Version --
constant weight countermeasures stochastic characterization customized encoding function
2016/2/24
Side-channel attacks are an important concern for the security
of cryptographic algorithms. To counteract it, a recent line of
research has investigated the use of software encoding functions such a...
Robust Pseudo-Random Number Generators with Input Secure Against Side-Channel Attacks
Randomness Entropy Side-Channel countermeasures
2016/1/27
A pseudo-random number generator (PRNG) is a deterministic algorithm that produces
numbers whose distribution is indistinguishable from uniform. In this paper, we extend the formal
model of PRNG wit...
A Bounded-Space Near-Optimal Key Enumeration Algorithm for Multi-Dimensional Side-Channel Attacks
cryptanalysis near-optimal ranks
2016/1/26
Enumeration of cryptographic keys in order of likelihood based on side-channel leakages has a significant importance in cryptanalysis. Previous algorithms enumerate the keys in optimal order, however ...
Channel Equalization for Side Channel Attacks
side-channel analysis multivariate equalization
2016/1/26
This paper introduces the use of channel equalization as a
method of reducing the computational complexity of side channel analysis
(SCA), by effectively collapsing all points in a power measurement...
Active and Passive Side-Channel Attacks on Delay Based PUF Designs
Side-channel analysis machine learning Physical Unclonable Function
2016/1/23
Physical Unclonable Functions (PUFs) have emerged as a lightweight alternative to traditional cryptography. The fact that no secret key needs to be stored in non-volatile memory makes PUFs especial...
Simulation-Time Security Margin Assessment against Power-Based Side Channel Attacks
AES Side-channel analysis
2016/1/23
A sound design time evaluation of the security of a digital device is a goal which has attracted a great amount of research effort lately. Common security metrics for the attack consider either the ...
In this paper, we introduce a new approach to side-channel
key recovery, that combines the low time/memory complexity and noise
tolerance of standard (divide and conquer) differential power analysis...
Side-channel attacks are a powerful tool to discover the cryptographic secrets of a chip or other device but only too often do they require too many traces or leave too many possible keys to explore. ...
Side Channel Attacks: Vulnerability Analysis of PRINCE and RECTANGLE using DPA
Lightweight block cipher power characteristic FPGA implementation
2016/1/7
Over a decade, cryptographers are more attentive on designing
lightweight ciphers in focus to compact cryptographic devices. More
often, the security of these algorithms are defined in terms of its ...
How to Estimate the Success Rate of Higher-Order Side-Channel Attacks
Side-channels success rate
2016/1/7
The resistance of a cryptographic implementation with regards to side-channel analysis
is often quantified by measuring the success rate of a given attack. This approach cannot always be
followed in...