نتایج جستجو برای: side channel

تعداد نتایج: 425516  

Journal: :IACR Cryptology ePrint Archive 2014
Vikram Singh

We improve the timing attack on ECDSA in [1] by Brumley and Tuveri. We use the Gaussian heuristic to analyse the length of error vectors in the lattice Close Vector Problem in order to determine the problems which are theoretically solvable. Then we cost each solution using a strengthened lattice reduction algorithm and Schnorr-Euchner enumeration to determine which problems are practically sol...

Journal: :IACR Cryptology ePrint Archive 2008
Matthieu Rivain Emmanuelle Dottax Emmanuel Prouff

In the recent years, side channel analysis has received a lot of attention, and attack techniques have been improved. Side channel analysis of second order is now successful in breaking implementations of block ciphers supposed to be effectively protected. This progress shows not only the practicability of second order attacks, but also the need for provably secure countermeasures. Surprisingly...

Journal: :Journal of the Korea Institute of Information Security and Cryptology 2015

Journal: :IET Circuits, Devices & Systems 2012

Journal: :Journal of the Korea Institute of Information Security and Cryptology 2015

Journal: :Journal of physics 2022

Abstract An authenticated encryption chip with novel nonce generation circuit was developed. This associates the contents and receiving time of plaintext. It will also generate overlapping power compensation for whole chip. The integrated fabricated under SMIC 180nm technology. Under 1.8V VDD, 100MHz global clock, consumption is about 14mW within 50k gates. test result exhibits more than 10 tim...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید