Zobrazeno 1 - 10
of 17
pro vyhledávání: '"Chien-Ning Chen"'
Autor:
Chien-Ning Chen, 陳建寧
101
The wireless power transfer via strongly coupled magnetic resonances is more efficient method for transmission. We use multi-turn coils as resonators to transfer energy. Because the quality factor of resonators we use is large, the efficienc
The wireless power transfer via strongly coupled magnetic resonances is more efficient method for transmission. We use multi-turn coils as resonators to transfer energy. Because the quality factor of resonators we use is large, the efficienc
Externí odkaz:
http://ndltd.ncl.edu.tw/handle/92571258008953171452
Autor:
Chien-Ning Chen, 陳健寧
98
Smart card and other stand-alone cryptographic devices provide a secure environment to store the secret key and manipulate sensitive information. However, those devices may suffer from the threat of side-channel analysis which exploits power
Smart card and other stand-alone cryptographic devices provide a secure environment to store the secret key and manipulate sensitive information. However, those devices may suffer from the threat of side-channel analysis which exploits power
Externí odkaz:
http://ndltd.ncl.edu.tw/handle/28720927925022747572
Autor:
Hwajeong Seo, Yasuyuki Nogami, Taehwan Park, Zhe Liu, Jongseok Choi, Chien Ning Chen, Howon Kim
Publikováno v:
Discrete Applied Mathematics. 241:58-66
In Internet of Things (IoT), sensor devices should deliver the collected sensor data to the server after the data is encrypted. The encrypted data cannot be eavesdropped by adversaries but the side channel information including clock cycles and power
Publikováno v:
Fault Tolerant Architectures for Cryptography and Hardware Security ISBN: 9789811013867
Laser fault injection constitutes a powerful tool for a precise injection of faults into the device, allowing an adversary to carefully adjust timing and position on the chip. On the other hand, the cost of such equipment is high and the profiling ti
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::370d27faf6a7e97b70deddeff0035432
https://doi.org/10.1007/978-981-10-1387-4_5
https://doi.org/10.1007/978-981-10-1387-4_5
Autor:
Chien-Ning Chen, Jakub Breier
Publikováno v:
ISIC
Laser equipment has been used for a failure analysis for a long time. It is also becoming increasingly popular in fault injection attacks. Since it can be challenging to master this technique and get plausible results from experimental evaluations, i
Autor:
Howon Kim, Hwajeong Seo, Taehwan Park, Jongseok Choi, Zhe Liu, Chien-Ning Chen, Yasuyuki Nogami
Publikováno v:
Information Security Applications ISBN: 9783319318745
WISA
WISA
Binary field multiplication is the most fundamental building block of binary field Elliptic Curve Cryptography ECC and Galois/Counter Mode GCM. Both bit-wise scanning and Look-Up Table LUT based methods are commonly used for binary field multiplicati
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::ecadb57104c5ee735fc2885aa486c545
https://doi.org/10.1007/978-3-319-31875-2_14
https://doi.org/10.1007/978-3-319-31875-2_14
Publikováno v:
Journal of Cryptographic Engineering. 2:99-110
A series of algorithms for evaluation of multi-exponentiation are proposed based on the binary greatest common divisor algorithm. The proposed algorithms are inversion free and have the capability to evaluate double or multi-exponentiation with non-f
Publikováno v:
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences. :1981-1990
Power analysis can be used to attack many implementations of cryptosystems, e.g., RSA and ECC, and the doubling attack is a collision based power analysis performed on two chosen ciphertexts. In this paper, we introduced a modified doubling attack to
Publikováno v:
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences. :1806-1812
Simple power analysis (SPA) can be employed in examining the power consumption trace of elliptic curve scalar multiplioation to retrieve the computational sequence. However, SPA cannot distinguish point addition from point subtraction. The attacker s
Publikováno v:
CPSS@ASIACSS
Laser fault injection is one of the strongest fault injection techniques. It offers a precise area positioning and a precise timing, allowing a high repeatability of experiments. In our paper we examine possibilities of laser-induced faults that coul