An Introduction to Differential Computation Analysis (DCA) on the withe-box cryptography algorithms
Authors
Abstract:
Advances in information and communication technologies lead to use of some new devices such as smart phones. The new devices provide more advantages for the adversaries hence with respect to them, one can define with-box cryptography. In this new model of cryptography, designers try to hide the key using as a kind of implementation. The Differential Computation Analysis (DCA) is a side channel attack on the with-box cryptography. The mentioned method influenced all with-box cryptography schemes when it was introduced. This attack is based on the software implementation of cryptography algorithms and is similar to the differential power analysis (DPA). In this paper, we introduce the principles of the DCA and also describe how one can use this attack to find the key of a with-box cryptography scheme.
similar resources
ترجمه و تحقیق کتاب an introduction to the history of mysticism
پایان نامه ی ارائه شده ترجمه ی کتاب «an introduction to the history of mysticism» نوشته ی مارگارت اسمیت که وی پژوهشگر، خاورشناس و محقق برجسته ی تصوف و عرفان می باشد. موضوع اساسی و مهم این کتاب عرفان در ادیان مختلف است. نویسنده در ابتدا این کلمه را ریشه یابی کرده و سپس تعریفی از آن ارائه داده و آن را در ادیان مختلف مورد بحث قرار داده است و در هر فصل کتاب به معرفی عرفای آن دین یا عصر خاصی پرداخته...
15 صفحه اولAn introduction to the analysis of algorithms
Thank you for downloading an introduction to the analysis of algorithms. Maybe you have knowledge that, people have search hundreds times for their chosen readings like this an introduction to the analysis of algorithms, but end up in infectious downloads. Rather than reading a good book with a cup of tea in the afternoon, instead they juggled with some harmful bugs inside their desktop compute...
full textthe differential effects of debate and media analysis as relate to enhancing efl learners critical thinking ability and writing performances
critical thinking ability has an important role in education. accordingly, scholars around the world are searching for new ways for teaching and improving students critical thinking ability. in line with the studies in efl contexts supporting the positive relationship between critical thinking and writing performances, this study investigated the differential effects of halverson’s critical thi...
15 صفحه اولOn White-Box Cryptography
White-box cryptography techniques are aimed at protecting software implementations of cryptographic algorithms against key recovery. They are primarily used in DRM-like applications as a cost-effective alternative to token-based protections. This paper discusses the relevance of white-box implementations in such contexts as a series of questions
full textAn Introduction to Pairing-Based Cryptography
Bilinear pairings have been used to design ingenious protocols for such tasks as one-round three-party key agreement, identity-based encryption, and aggregate signatures. Suitable bilinear pairings can be constructed from the Tate pairing for specially chosen elliptic curves. This article gives an introduction to the protocols, Tate pairing computation, and curve selection.
full textCryptography - an introduction to computer security
Want to get experience? Want to get any ideas to create new things in your life? Read cryptography an introduction to computer security now! By reading this book as soon as possible, you can renew the situation to get the inspirations. Yeah, this way will lead you to always think more and more. In this case, this book will be always right for you. When you can observe more about the book, you w...
full textMy Resources
Journal title
volume 8 issue 2
pages 51- 62
publication date 2020-02
By following a journal you will be notified via email when a new issue of this journal is published.
No Keywords
Hosted on Doprax cloud platform doprax.com
copyright © 2015-2023