نتایج جستجو برای: side channel

تعداد نتایج: 425516  

Journal: :CoRR 2012
Jan Wrobel

The paper demonstrates how traffic load of a shared packet queue can be exploited as a side channel through which protected information leaks to an off-path attacker. The attacker sends to a victim a sequence of identical spoofed segments. The victim responds to each segment in the sequence (the sequence is reflected by the victim) if the segments satisfy a certain condition tested by the attac...

2009
Lang Lin Markus Kasper Tim Güneysu Christof Paar Wayne P. Burleson

The general trend in semiconductor industry to separate design from fabrication leads to potential threats from untrusted integrated circuit foundries. In particular, malicious hardware components can be covertly inserted at the foundry to implement hidden backdoors for unauthorized exposure of secret information. This paper proposes a new class of hardware Trojans which intentionally induce ph...

Journal: :IACR Cryptology ePrint Archive 2016
Souvik Sonar Debapriya Basu Roy Rajat Subhra Chakraborty Debdeep Mukhopadhyay

Besides security against classical cryptanalysis, its important for cryptographic implementations to have sufficient robustness against side-channel attacks. Many countermeasures have been proposed to thwart side channel attacks, especially power trace measurement based side channel attacks. Additionally, researchers have proposed several evaluation metrics to evaluate side channel security of ...

2017
Jean-Sébastien Coron

Masking with random values is an effective countermeasure against side-channel attacks. For cryptographic algorithms combining arithmetic and Boolean masking, it is necessary to switch from arithmetic to Boolean masking and vice versa. Following a recent approach by Hutter and Tunstall, we describe a high-order Boolean to arithmetic conversion algorithm whose complexity is independent of the re...

2002
Marc Joye Jean-Jacques Quisquater Sung-Ming Yen Moti Yung

In this paper we show that, paradoxically, what looks like a “universal improvement” or a “straight-forward improvement” which enables better security and better reliability on a theoretical level, may in fact, within certain operational contexts, introduce new exposures and attacks, resulting in a weaker operational cryptosystem. We demonstrate a number of such dangerous “improvements”. This i...

Journal: :CoRR 2017
Peter Beelen Lingfei Jin

In 1964, Massey introduced a class of codes with complementary duals which are called Linear Complimentary Dual (LCD for short) codes. He showed that LCD codes have applications in communication system, side-channel attack (SCA) and so on. LCD codes have been extensively studied in literature. On the other hand, MDS codes form an optimal family of classical codes which have wide applications in...

Journal: :IACR Cryptology ePrint Archive 2012
Neil Hanley HeeSeok Kim Michael Tunstall

Public key cryptographic algorithms are typically based on group exponentiation algorithms, and many algorithms have been proposed in the literature based on addition chains. We describe attacks based on collisions of variables manipulated in group operations extending attacks described in the literature. These collisions are visible where one is able to acquire information through some suitabl...

Journal: :IACR Cryptology ePrint Archive 2006
Claire Whelan Michael Scott

We present an investigation into the security of three practical pairing algorithms; the Tate, Eta and Ate pairing, in terms of side channel vulnerability. These three algorithms have recently shown to be efficiently computable on the resource constrained smart card, yet no in depth side channel analysis has yet appeared in the literature. Since the secret parameter input to the pairing can pot...

ژورنال: علوم آب و خاک 2009
ایزدی نیا, الهام, حیدرپور, منوچهر, کبیری سامانی, عبدالرضا,

In this study, the flow characteristics have been investigated by measuring separation zone, surface and velocity profiles over the circular crested side weirs. An equation was proposed for the length of the separation zone using dimensional, statistical and regression analysis. The dimensional analysis showed that the length of separation zone depends on the upstream to the downstream water de...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید