Zobrazeno 1 - 10
of 59
pro vyhledávání: '"Dirmanto Jap"'
Publikováno v:
Transactions on Cryptographic Hardware and Embedded Systems, Vol 2024, Iss 2 (2024)
In an effort to circumvent the high cost of standard countermeasures against side-channel attacks in post-quantum cryptography, some works have developed low-cost detection-based countermeasures. These countermeasures try to detect maliciously genera
Externí odkaz:
https://doaj.org/article/071439e967aa4c0b8a193bfb85a899e7
Publikováno v:
IEEE Access, Vol 9, Pp 22480-22492 (2021)
Over the years, deep learning algorithms have advanced a lot and any innovation in the algorithms are demonstrated and benchmarked for image classification. Several other field including side-channel analysis (SCA) have recently adopted deep learning
Externí odkaz:
https://doaj.org/article/ea2c7eee830f43839ef8133221919853
Autor:
Satyam Kumar, Vishnu Asutosh Dasu, Anubhab Baksi, Santanu Sarkar, Dirmanto Jap, Jakub Breier, Shivam Bhasin
Publikováno v:
Transactions on Cryptographic Hardware and Embedded Systems, Vol 2022, Iss 2 (2022)
Side Channel Attack (SCA) exploits the physical information leakage (such as electromagnetic emanation) from a device that performs some cryptographic operation and poses a serious threat in the present IoT era. In the last couple of decades, there h
Externí odkaz:
https://doaj.org/article/042f7fa9b7d94577b0d3bfe84b76a70a
Publikováno v:
Transactions on Cryptographic Hardware and Embedded Systems, Vol 2021, Iss 1 (2020)
Differential power analysis (DPA) is a form of side-channel analysis (SCA) that performs statistical analysis on the power traces of cryptographic computations. DPA is applicable to many cryptographic primitives, including block ciphers, stream ciphe
Externí odkaz:
https://doaj.org/article/15cd768bc1ee4646858b2da729776171
Publikováno v:
Transactions on Cryptographic Hardware and Embedded Systems, Vol 2020, Iss 1 (2019)
Side-channel analysis constitutes a powerful attack vector against cryptographic implementations. Techniques such as power and electromagnetic side-channel analysis have been extensively studied to provide an efficient way to recover the secret key u
Externí odkaz:
https://doaj.org/article/1c292a6d4cbe4a2e996089002d9bc763
Publikováno v:
IACR Transactions on Symmetric Cryptology, Pp 108-129 (2017)
To protect against side-channel attacks, many countermeasures have been proposed. A novel customized encoding countermeasure was published in FSE 2016. Customized encoding exploits knowledge of the profiled leakage of the device to construct an optim
Externí odkaz:
https://doaj.org/article/0e49b42a7b504af985e4751a5d96c4cc
Publikováno v:
IEEE Transactions on Dependable and Secure Computing. :1-12
Publikováno v:
IEEE Design & Test, 39, 4, pp. 7-14
IEEE Design & Test, 39(4)
IEEE Design & Test, 39, 7-14
IEEE Design & Test, 39(4)
IEEE Design & Test, 39, 7-14
Our previous work selected for Top Picks in Hardware and Embedded Security 2020 demonstrates that it is possible to reverse engineer neural networks by using side-channel attacks. We developed a framework that considers each part of the neural networ
Publikováno v:
IEEE Access, Vol 9, Pp 22480-22492 (2021)
Over the years, deep learning algorithms have advanced a lot and any innovation in the algorithms are demonstrated and benchmarked for image classification. Several other field including side-channel analysis (SCA) have recently adopted deep learning
Publikováno v:
IEEE Transactions on Information Forensics and Security. 16:3215-3227
Deep learning approaches have become popular for Side-Channel Analysis (SCA) in the recent years. Especially Convolutional Neural Networks (CNN) due to their natural ability to overcome jitter-based as well as masking countermeasures. Most of the rec