Zobrazeno 1 - 7
of 7
pro vyhledávání: '"Daria Sleptsova"'
Publikováno v:
Proceedings of the XXth Conference of Open Innovations Association FRUCT, Vol 664, Iss 18, Pp 181-186 (2016)
Most modern devices and cryptoalgorithms are vulnerable to a new class of attack called side-channel attack. It analyses physical parameters of the system in order to get secret key. Most spread techniques are simple and differential power attacks wi
Externí odkaz:
https://doaj.org/article/67eb2c825f574cfa9ce49d253b75ff30
Publikováno v:
Vestnik komp'iuternykh i informatsionnykh tekhnologii. :46-53
Currently, attacks on side channels are the main method of cryptanalysis, but despite this, these attacks have a very specific model of the attacker. As a result, the practical usage of side-channel attacks is sometimes disputable. The level of threa
Publikováno v:
Journal of Cryptographic Engineering. 9:393-400
In this paper, we present an examination of several side-channel attack scenarios on PC-based cryptosystems. Our goal was the development of a unified physical model for sensitive information leakage. The main focus of our work was electromagnetic si
Publikováno v:
Advances in Intelligent Systems and Computing ISBN: 9783030228675
On one hand, side-channel attacks are a powerful approach to cryptoanalysis, on the other hand, these attacks have a very specific attacker model. As a result, a practical application of SCA is sometimes disputable. The threat level in each case has
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::02f26633bcdfda520f25fce4ec39193b
https://doi.org/10.1007/978-3-030-22868-2_44
https://doi.org/10.1007/978-3-030-22868-2_44
Publikováno v:
FRUCT
Proceedings of the XXth Conference of Open Innovations Association FRUCT, Vol 664, Iss 18, Pp 181-186 (2016)
Proceedings of the XXth Conference of Open Innovations Association FRUCT, Vol 664, Iss 18, Pp 181-186 (2016)
Most modern devices and cryptoalgorithms are vulnerable to a new class of attack called side-channel attack. It analyses physical parameters of the system in order to get secret key. Most spread techniques are simple and differential power attacks wi
Publikováno v:
2014 IEEE 8th International Conference on Application of Information and Communication Technologies (AICT).
Plenty of devices emanate acoustic signal, which is not necessarily located in the hearing range. Attacks on this side channel develop, from distinguishing sounds of mechanical key pressing on the keyboard up to processor's instruction recognition. I
Publikováno v:
2014 IEEE 8th International Conference on Application of Information and Communication Technologies (AICT).
Authentication in GSM networks uses COMP128, which is vulnerable to side-channel attack called partitioning attack. On the device constrained in resources, such as SIM-card, table lookups are quite unreliable, so the attack can be carried out using u