搜索结果: 46-60 共查到“军事学 side-channel attacks”相关记录91条 . 查询时间(0.132 秒)
Error-Tolerant Algebraic Side-Channel Attacks Using BEE
algebraic side-channel attack Hamming weight leakage error-tolerance
2016/1/7
Algebraic side-channel attacks are a type of side-channel analysis
which can recover the secret information with a small number of samples (e.g.,
power traces). However, this type of side-channel an...
Protecting Encrypted Cookies from Compression Side-Channel Attacks
CRIME attack BREACH attack Side-channel attacks
2016/1/7
Compression is desirable for network applications as it saves bandwidth; however, when
data is compressed before being encrypted, the amount of compression leaks information about
the amount of redu...
Near Collision Side Channel Attacks
Side channel collision attack leakage squeezing differential power analysis
2015/12/30
Side channel collision attacks are a powerful method to exploit side channel leakage.
Otherwise than a few exceptions, collision attacks usually combine leakage from distinct points in
time, making ...
SoC it to EM: electromagnetic side-channel attacks on a complex system-on-chip
side-channel electromagnetic system on chip
2015/12/29
Increased complexity in modern embedded systems has presented
various important challenges with regard to side-channel attacks.
In particular, it is common to deploy SoC-based target devices with hi...
Complementary Dual Codes for Counter-measures to Side-Channel Attacks
Counter-measures Side-Channel Attacks
2015/12/29
We recall why linear codes with complementary duals (LCD codes) play a role in counter-measures to passive and active side-channel analyses on embedded cryptosystems. The rate and the minimum distance...
Fast and Memory-Efficient Key Recovery in Side-Channel Attacks
DPA key enumeration AES-NI
2015/12/24
Side-channel attacks are powerful techniques to attack implementations of cryptographic algorithms by observing its physical parameters such as power consumption and electromagnetic radiation that are...
Real time detection of cache-based side-channel attacks using Hardware Performance Counters
hardware performance counters cache side-channel
2015/12/22
In this paper we analyze three methods to detect
cache-based side-channel attacks in real time, preventing or
limiting the amount of leaked information. Two of the three
methods are based on machin...
Since the introduction of side channel attacks in the nineties, a large amount of work has been devoted to their effectiveness and efficiency improvements. On the one side, general results and conclus...
Physical Unclonable Functions (PUFs) have established themselves in the scientific literature, and are also gaining ground in commercial applications. Recently, however, several attacks on PUF core pr...
Side Channel Attacks against Pairing over Theta Functions
pairing based cryptography Theta function
2014/3/12
In \cite{LuRo2010}, Lubicz and Robert generalized the Tate pairing over any abelian variety and more precisely over Theta functions. The security of the new algorithms is an important issue for the us...
Techniques from pairing based cryptography (PBC) are used in an in- creasing number of cryptographic schemes. With progress regarding efficient implementations, pairings also become interesting for ap...
Techniques from pairing based cryptography (PBC) are used in an in- creasing number of cryptographic schemes. With progress regarding efficient implementations, pairings also become interesting for ap...
Formal Analysis of the Entropy / Security Trade-off in First-Order Masking Countermeasures against Side-Channel Attacks
implementation
2012/3/26
Several types of countermeasures against side-channel attacks are known. The one called masking is of great interest since it can be applied to any protocol and/or algorithm, without nonetheless requi...
An optimal Key Enumeration Algorithm and its Application to Side-Channel Attacks
implementation / side-channel analysis
2012/6/14
Methods for enumerating cryptographic keys based on partial information obtained on key bytes are important tools in cryptanalysis. This paper discusses two contributions related to the practical appl...
An optimal Key Enumeration Algorithm and its Application to Side-Channel Attacks
implementation / side-channel analysis
2012/3/22
Methods for enumerating cryptographic keys based on partial information obtained on key bytes are important tools in cryptanalysis. This paper discusses two contributions related to the practical appl...