Zobrazeno 1 - 10
of 74
pro vyhledávání: '"HeeSeok Kim"'
Publikováno v:
IEEE Access, Vol 12, Pp 105326-105336 (2024)
Side-channel analysis is one of the vulnerabilities in IoT’s cryptographic systems. To present reliable side-channel analysis results, it is crucial to collect considerable amounts of power consumption traces. Handling large datasets in this contex
Externí odkaz:
https://doaj.org/article/9ed5554dd51443e5867050fc45d0bdb9
Autor:
Yongryeol Choi, Mingi Kim, Youngbeom Kim, Jingyo Song, Jaehwan Jin, Heeseok Kim, Seog Chung Seo
Publikováno v:
IEEE Access, Vol 12, Pp 18606-18626 (2024)
As the global migration to post-quantum cryptography (PQC) continues to progress actively, in Korea, the Post-Quantum Cryptography Research Center has been established to acquire PQC technology, leading the KpqC Competition. In February 2022, the Kpq
Externí odkaz:
https://doaj.org/article/a10fdc4f90e943899e772dadabcaeb4b
Publikováno v:
IEEE Access, Vol 11, Pp 95381-95395 (2023)
Continuous Wavelet Transform (CWT) is rarely used in the field of side-channel analysis due to problems related to parameter (wavelet scale) selection; There is no way to find the optimal wavelet scale other than an exhaustive search, and the resulti
Externí odkaz:
https://doaj.org/article/7bb3fa59d01c4ad2bfdec73c4aa8a03d
Publikováno v:
IEEE Access, Vol 11, Pp 44578-44589 (2023)
Over the past decade, decentralized cryptocurrencies have received attention in industry and academia. Hardware wallets are dedicated devices that manage cryptocurrencies safely without entrusting cryptographic keys to a third party. Side-channel att
Externí odkaz:
https://doaj.org/article/c0f19291f7734b0fb86c0fe3313fe618
Publikováno v:
IEEE Access, Vol 10, Pp 5957-5967 (2022)
The differential deep learning analysis proposed by Timon is the first non-profiled side-channel attack technique that uses deep learning. The technique recovers the secret key using the phenomenon of deep learning metrics. However, the proposed tech
Externí odkaz:
https://doaj.org/article/9c8db702dc574636a1d72641beacf47f
Publikováno v:
IEEE Access, Vol 10, Pp 60778-60789 (2022)
Recently, many studies have shown that using deep learning for side-channel attacks offers several advantages, including simplification of the attack phase and target breaking, even in protected implementations, while presenting outstanding attack pe
Externí odkaz:
https://doaj.org/article/1b2716b158a54192bad0bd4050fdc93a
Publikováno v:
ICT Express, Vol 7, Iss 1, Pp 36-40 (2021)
Although quantum mechanics guarantees the security of the quantum key distribution system, it is crucial to examine whether the implementation flaws can lead to the disclosure of sensitive information. In this paper, we propose the side-channel attac
Externí odkaz:
https://doaj.org/article/86d323c65813437baafdd9dac0d95718
Publikováno v:
IEEE Access, Vol 9, Pp 57692-57703 (2021)
In recent years, deep learning-based side-channel attacks have established their position as mainstream. However, most deep learning techniques for cryptanalysis mainly focused on classifying side-channel information in a profiled scenario where atta
Externí odkaz:
https://doaj.org/article/4ef1e3da27a5489f882d0a3bf3925e1e
Publikováno v:
ETRI Journal, Vol 42, Iss 2, Pp 292-304 (2020)
As side‐channel analysis and machine learning algorithms share the same objective of classifying data, numerous studies have been proposed for adapting machine learning to side‐channel analysis. However, a drawback of machine learning algorithms
Externí odkaz:
https://doaj.org/article/526a157537904085b74a407785ee979b
Publikováno v:
IEEE Access, Vol 8, Pp 5244-5255 (2020)
Advanced collision-based single trace attacks which can be applied on simple power analysis resistant scalar multiplications become virtual threat on elliptic curve cryptosystems recently as their practical experimental results are increasingly repor
Externí odkaz:
https://doaj.org/article/bdec3aa45a7f40baa3534a5b92128217