Zobrazeno 1 - 6
of 6
pro vyhledávání: '"Alia Levina"'
Publikováno v:
Proceedings of the XXth Conference of Open Innovations Association FRUCT, Vol 664, Iss 18, Pp 181-186 (2016)
Most modern devices and cryptoalgorithms are vulnerable to a new class of attack called side-channel attack. It analyses physical parameters of the system in order to get secret key. Most spread techniques are simple and differential power attacks wi
Externí odkaz:
https://doaj.org/article/67eb2c825f574cfa9ce49d253b75ff30
Autor:
Alia Levina, Sergey Taranov
Publikováno v:
Proceedings of the XXth Conference of Open Innovations Association FRUCT, Vol 664, Iss 18, Pp 187-192 (2016)
This article presents the new construction of security-oriented codes that provides protection of device against algebraic manipulations. New construction of algebraic manipulation detection codes based on wavelet decomposition. The proposed error-de
Externí odkaz:
https://doaj.org/article/422baaba0a7d42779d7789550eca6a0c
Autor:
Sergey V. Taranov, Alia Levina
Publikováno v:
Proceedings of the XXth Conference of Open Innovations Association FRUCT, Vol 664, Iss 18, Pp 187-192 (2016)
FRUCT
FRUCT
This article presents the new construction of security-oriented codes that provides protection of device against algebraic manipulations. New construction of algebraic manipulation detection codes based on wavelet decomposition. The proposed error-de
Publikováno v:
FRUCT
Proceedings of the XXth Conference of Open Innovations Association FRUCT, Vol 664, Iss 18, Pp 181-186 (2016)
Proceedings of the XXth Conference of Open Innovations Association FRUCT, Vol 664, Iss 18, Pp 181-186 (2016)
Most modern devices and cryptoalgorithms are vulnerable to a new class of attack called side-channel attack. It analyses physical parameters of the system in order to get secret key. Most spread techniques are simple and differential power attacks wi
Autor:
Taranov Sergey, Alia Levina
Publikováno v:
Proceedings of the 2015 Third International Conference on Computer, Communication, Control and Information Technology (C3IT).
Robust codes are new nonlinear systematic error detecting codes that provide uniform protection against all errors, whereas classical linear error-detection code detects only a certain class of errors. Therefore, defence by the linear codes can be in
Publikováno v:
2014 IEEE 8th International Conference on Application of Information and Communication Technologies (AICT).
Authentication in GSM networks uses COMP128, which is vulnerable to side-channel attack called partitioning attack. On the device constrained in resources, such as SIM-card, table lookups are quite unreliable, so the attack can be carried out using u