نتایج جستجو برای: Side Channel Attack

تعداد نتایج: 499991  

Journal: :The Journal of The Institute of Image Information and Television Engineers 2010

Journal: :IACR transactions on cryptographic hardware and embedded systems 2023

With the breakthrough of Deep Neural Networks, many fields benefited from its enormously increasing performance. Although there is an trend to utilize Learning (DL) for Side-Channel Analysis (SCA) attacks, previous works made specific assumptions attack work. Especially concept template attacks widely adapted while not much attention was paid other strategies. In this work, we present a new met...

Journal: :isecure, the isc international journal of information security 0
e. aerabi m. kaykha m. fazeli a. patooghy a. akbari

embedded systems are becoming a suggestive target for code injection attacks in recent years. software protection mechanisms in general computers are not usually applicable in embedded systems as they come with limited resources like memory and processor. in this paper we investigate side channel characteristics of embedded systems and their usability in code injection attack detection. the arc...

Journal: :Journal of Security and Safety Technology 2018

2009
Marc Joye Michael Tunstall

This paper describes methods of recoding exponents to allow for regular implementations of m-ary exponentiation algorithms. Recoding algorithms previously proposed in the literature do not lend themselves to being implemented in a regular manner, which is required if the implementation needs to resist side-channel attacks based on simple power analysis. The advantage of the algorithms proposed ...

2016
Rauf MAHMUDLU

Faculty of Science Institute for Computing and Information Sciences

2007
Jean-Sébastien Coron Emmanuel Prouff Matthieu Rivain

In the recent years, DPA attacks have been widely investigated. In particular, 2-nd order DPA have been improved and successfully applied to break many masked implementations. In this context a higher order masking scheme has been proposed by Schramm and Paar at CTRSA 2006. The authors claimed that the scheme is resistant against d-th order DPA for any arbitrary chosen order d. In this paper, w...

Journal: :Journal of Cryptographic Engineering 2013

2014
Thomas Chabrier Lilian BOSSUET Laurent IMBERT Guy GOGNIAT William MARNANE Emmanuel CASSEAU Arnaud TISSERAND

in French 5

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید