نتایج جستجو برای: side channel attack
تعداد نتایج: 499991 فیلتر نتایج به سال:
The security of the signature scheme is destroyed because its secret information system leaked due to side channel attack. Ring has good application value, which can provide more flexibility and complete anonymity. It be used in some systems such as anonymous authentication ad hoc networks, electronic voting crypto coin based on blockchain. Because attack, private key ring may exposed, cause in...
Abstract Over the last decades, Cache Side Channel Attack (CSCA) seriously threatens security of user information, which repeatedly highlights cache. Even though secure cache design can mitigate or defend against this attack, high period and tap-out cost reduce development specific designs. Therefore, many researchers focus on proposing a model to analyse CSCA simplify design. Nowadays, be divi...
Hardware prefetching can seriously interfere with Flush+Reload cache side channel attack. This interference is not taken into consideration in previous attacks. In this paper, an improved provided which minimizes the impact of hardware prefetchers. Specifically, analyzed based on reverse engineering and result used to make evaluation model evaluate Then applied fine tune placement probes attack...
In-memory computing (IMC) systems have great potential for accelerating data-intensive tasks such as deep neural networks (DNNs). As DNN models are generally highly proprietary, the network architectures become valuable targets attacks. In IMC systems, since whole model is mapped on chip and weight memory read can be restricted, pre-mapped acts a ``black box'' users. However, localized stationa...
We describe two new techniques of side-channel cryptanalysis which we call the impossible collision attack and the multiset collision attack. These are inspired by the state-of-the-art cryptanalytic techniques of impossible differential attacks [BBS99] and partial-function collision attacks [GM00] respectively. Using these techniques on an example of the AES we show that one has to mask all the...
Classical cryptography considers attack scenarios of adversaries getting black-box access to a cryptosystem, namely to its inputs and outputs. For example, in a chosenciphertext attack, an adversary can submit ciphertexts of her choice to a decryption oracle and receives in return the corresponding plaintexts. In real life, however, an adversary may be more powerful. For example, an adversary m...
We present two detectors which allow multiuser detection without a side channel in a dynamic CDMA system where users are constantly leaving and entering the system. These detectors, the Maximum Likelihood (ML) and Generalized Maximum Likelihood (GML) detectors, optimally detect a new user given only the chip rate and the spreading factor of the new user. Each of these detectors produces maximum...
For making elliptic curve point multiplication secure against side-channel attacks, various methods have been proposed using special point representations for specifically chosen elliptic curves. We show that the same goal can be achieved based on conventional elliptic curve arithmetic implementations. Our point multiplication method is much more general than the proposals requiring non-standar...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید