نتایج جستجو برای: side channel

تعداد نتایج: 425516  

Journal: :IACR Transactions on Symmetric Cryptology 2017

Journal: :IACR Transactions on Cryptographic Hardware and Embedded Systems 2018

Journal: :IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems 2018

Journal: :Journal of Computer Science and Cybernetics 2021

Profiled side-channel attacks are now considered as powerful forms of used to break the security cryptographic devices. A recent line research has investigated a new profiled attack based on deep learning and many them have convolution neural network (CNN) architecture for attack. The effectiveness is greatly influenced by CNN architecture. However, current often been image recognition fields, ...

Journal: :ACM Journal on Emerging Technologies in Computing Systems 2021

The candidates for the NIST Post-Quantum Cryptography standardization have undergone extensive studies on efficiency and theoretical security, but research their side-channel security is largely lacking. This remains a considerable obstacle real-world deployment, where can be critical requirement. work describes side-channel-resistant instance of Saber, one lattice-based candidates, using maski...

1995
Karen W. Halford

We present two detectors which allow multiuser detection without a side channel in a dynamic CDMA system where users are constantly leaving and entering the system. These detectors, the Maximum Likelihood (ML) and Generalized Maximum Likelihood (GML) detectors, optimally detect a new user given only the chip rate and the spreading factor of the new user. Each of these detectors produces maximum...

2001
Bodo Möller

For making elliptic curve point multiplication secure against side-channel attacks, various methods have been proposed using special point representations for specifically chosen elliptic curves. We show that the same goal can be achieved based on conventional elliptic curve arithmetic implementations. Our point multiplication method is much more general than the proposals requiring non-standar...

2010
Jean-Christophe Courrège Benoit Feix Mylène Roussellet

Power Analysis has been studied since 1998 when P. Kocher et al. presented the first attack. From the initial Simple Power Analysis more complex techniques have been designed and studied during the previous decade such as Differential and Correlation Power Analysis. In this paper we revisit Simple Power Analysis which is at the heart of side channel techniques. We aim at showing its true effici...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید