نتایج جستجو برای: side channel

تعداد نتایج: 425516  

2002
J - J. Quisquater D. Samyde

Cryptology includes cryptography and cryptanalysis technics. Cryptography is managed by Kerckhoffs principles, so any information related to a cryptosystem can be public except the keys. The cryptanalysis is the sum of a lot of very advanced technics in order to find these keys. The controversy about the Data Encryption Standard security has highly contributed to the development of new cryptana...

Journal: :CoRR 2011
Sumanta Chaudhuri Sylvain Guilley

Side-Channel Analysis used for codebreaking could be used constructively as a probing tool for internal gates in integrated circuits. This paper outlines basic methods and mathematics for that purpose

2012
Chang-Han Jong

Title of Dissertation: PRIVATE COMMUNICATION DETECTION VIA SIDE-CHANNEL ATTACKS Chang-Han Jong Doctor of Philosophy, 2012 Directed By: Professor Virgil D. Gligor Department of Electrical and Computer Engineering Professor Gang Qu Department of Electrical and Computer Engineering Private communication detection (PCD) enables an ordinary network user to discover communication patterns (e.g., call...

Journal: :IACR Cryptology ePrint Archive 2001
Josyula R. Rao Pankaj Rohatgi

2009
Marc Joye Michael Tunstall

This paper describes methods of recoding exponents to allow for regular implementations of m-ary exponentiation algorithms. Recoding algorithms previously proposed in the literature do not lend themselves to being implemented in a regular manner, which is required if the implementation needs to resist side-channel attacks based on simple power analysis. The advantage of the algorithms proposed ...

2016
Rauf MAHMUDLU

Faculty of Science Institute for Computing and Information Sciences

2007
Jean-Sébastien Coron Emmanuel Prouff Matthieu Rivain

In the recent years, DPA attacks have been widely investigated. In particular, 2-nd order DPA have been improved and successfully applied to break many masked implementations. In this context a higher order masking scheme has been proposed by Schramm and Paar at CTRSA 2006. The authors claimed that the scheme is resistant against d-th order DPA for any arbitrary chosen order d. In this paper, w...

2014
Thomas Chabrier Lilian BOSSUET Laurent IMBERT Guy GOGNIAT William MARNANE Emmanuel CASSEAU Arnaud TISSERAND

in French 5

2010
Giacomo de Meulenaer François-Xavier Standaert

Node capture is considered as one of the most critical issues in the security of wireless sensor networks. A popular approach to thwart the problem relies on the detection of events that arise during the attack such as the removal of a node for instance. However, certain attacks, such as side-channel attacks, might be furtive and defeat this type of defense. This work clarifies this question by...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید