نتایج جستجو برای: side channel
تعداد نتایج: 425516 فیلتر نتایج به سال:
Based on re-keying techniques by Abdalla, Bellare, and Borst [1, 2], we consider two black-box secure block cipher based symmetric encryption schemes, which we prove secure in the physically observable cryptography model. They are proven side-channel secure against a strong type of adversary that can adaptively choose the leakage function as long as the leaked information is bounded. It turns o...
Field Effect Diode (FED)s are interesting device in providing the higherON-state current and lower OFF–state current in comparison with SOI-MOSFETstructures with similar dimensions. The impact of channel length and band-to-bandtunneling (BTBT) on the OFF-state current of the side contacted FED (S-FED) has beeninvestigated in this paper. To find the lowest effective channel length, this device i...
Covert channels are a fundamental concept for cryptanalytic side-channel attacks. Covert timing channels use latency to carry data, and are the foundation for timing and cache-timing attacks. Covert storage channels instead utilize existing system bits to carry data, and are not historically used for cryptanalytic side-channel attacks. This paper introduces a new storage channel made available ...
This paper applies an evolutionary algorithm, the particle swarm optimization (PSO), to design the optimum open channel section. Depth, channel side slope and bottom width are considered as the variables for rectangular, triangular and trapezoidal channels, respectively. The objective function is minimizing the construction cost of the channel section. MATLAB software is used for programming an...
In cloud storage, client-side deduplication is widely used to reduce storage and communication costs. deduplication, if the server detects that user's outsourced data have been stored, then clients will not need reupload data. However, information on whether be uploaded can as a side-channel, which consequently exploited by adversaries compromise privacy. this paper, we propose new threat model...
introduction: recent studies have shown the presence of cl- channels in heart and liver mitochondrial membranes. in this work, we have characterized the functional profile of a cl- channel from rat brain mitochondria. methods: after removing and homogenizing the rat brain, the supernatant was separately centrifuged in msedigitonin, h2o and na2co3 and mitochondrial inner membrane vesicles were o...
This study presents a side-channel analysis (SCA) attack for AES-CMAC, which is used in the controller area network (CAN) protocol in-vehicle networks. It difficult to apply conventional SCAs that focus on single round of Sboxes as case AES-CMAC/CTR because AES input values are unknown attacker owing its structure. The proposed method focuses first three rounds continuously and obtains secret k...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید