نتایج جستجو برای: side channel
تعداد نتایج: 425516 فیلتر نتایج به سال:
Side-channel attacks exploit a physical observable originating from cryptographic device in order to extract its secrets. Many practically relevant advances the field of side-channel analysis relate security evaluations functions and devices. Accordingly, many metrics have been adopted or defined express quantify security. These can one another, but also conflict terms effectiveness, assumption...
We present a new 2-ary elliptic curve point multiplication method with resistance against side-channel attacks. This method provides two advantages compared with previous similar side-channel attack countermeasures: It avoids a fixed table, thus reducing potential information leakage available to adversaries; and it is easily parallelizable on two-processor systems, where it provides much impro...
In this paper, we present a new addition operation on Hessian curves with low cost. It can be applied to resist the side channel attacks for scalar multiplication, and also can be used to compute precomputation points for window-based scalar multiplication on Hessian curves over prime fields. We propose two new precomputation schemes that are shown to achieve the lowest cost among all known met...
With the breakthrough of Deep Neural Networks, many fields benefited from its enormously increasing performance. Although there is an trend to utilize Learning (DL) for Side-Channel Analysis (SCA) attacks, previous works made specific assumptions attack work. Especially concept template attacks widely adapted while not much attention was paid other strategies. In this work, we present a new met...
In accordance with the Costa theorem, the interference which is independent of the channel input and known non-causally at the transmitter, does not affect the capacity of the Gaussian channel. In some applications, the known interference depends on the input and hence has some information. In this paper, we study the channel with input dependent interference and prove a capacity theorem that n...
The traditional model of cryptography examines the security of cryptographic primitives as mathematical functions. This approach does not account for the physical side effects of using these primitives in the real world. A more realistic model employs the concept of a side channel. A side channel is a source of information that is inherent to a physical implementation of a primitive. Research d...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید