نتایج جستجو برای: countermeasure

تعداد نتایج: 4411  

Journal: :IACR Cryptology ePrint Archive 2017
Naina Gupta Arpan Jati Anupam Chattopadhyay Somitra Kumar Sanadhya Donghoon Chang

Threshold Implementation (TI) is one of the most widely used countermeasure for side channel attacks. Over the years several TI techniques have been proposed for randomizing cipher execution using different variations of secret-sharing and implementation techniques. For instance, Direct Sharing (4-shares) is the most straightforward implementation of the threshold countermeasure. But, its usage...

2004
Hideyo Mamiya Atsuko Miyaji Hiroaki Morimoto

In the execution on a smart card, side channel attacks such as simple power analysis (SPA) and the differential power analysis (DPA) have become serious threat [15]. Side channel attacks monitor power consumption and even exploit the leakage information related to power consumption to reveal bits of a secret key d although d is hidden inside a smart card. Almost public key cryptosystems includi...

Journal: :IEEE Access 2022

This paper identifies vulnerabilities to recently proposed countermeasures leakage power analysis attacks in FDSOI systems based on the application of a random body bias. The are analyzed and relative difficulty obtain secret key, once taken into account, compared original proposals. A new countermeasure, bias scheme, is then proposed. countermeasure equalization asymmetries static consumption ...

Journal: :Radiation and environmental biophysics 2000
N M Crout N A Beresford R W Mayes P J MacEachern C L Barnett C S Lamb B J Howard

Previously reported models for radioiodine in ruminants cannot account for the effect of variations in stable iodine intake including large countermeasure doses of stable iodine on the transfer of radioiodine to goat milk. A metabolically based model of radioiodine transfer in goats has been parameterised using new experimental data on the effect of countermeasure doses of stable iodine on radi...

Journal: :IACR Cryptology ePrint Archive 2015
Pierre-Alain Fouque Sylvain Guilley Cédric Murdica David Naccache

ecdsa is one of the most important public-key signature scheme, however it is vulnerable to lattice attack once a few bits of the nonces are leaked. To protect Elliptic Curve Cryptography (ecc) against Simple Power Analysis, many countermeasures have been proposed. Doubling and Additions of points on the given elliptic curve require several additions and multiplications in the base field and th...

Journal: :Journal of Cryptographic Engineering 2023

Abstract Deep-learning side-channel attacks, applying deep neural networks to are known that can easily attack some existing countermeasures such as masking and random jitter. While there have been many studies on profiled deep-learning a new approach involves learning non-profiled attacks was proposed in 2018. In our study, we investigate the structure of multi-layer perceptrons points interes...

Journal: :IEEE Transactions on Communications 2018

Journal: :The Journal of Digital Policy and Management 2014

Journal: :Soils and Foundations 1965

Journal: :Discrete Dynamics in Nature and Society 2015

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید