Zobrazeno 1 - 10
of 165
pro vyhledávání: '"Jean-Pierre Seifert"'
Autor:
Tuba Kiyan, Lars Renkes, Marvin Sass, Antonio Saavedra, Norbert Herfurth, Elham Amini, Jean-Pierre Seifert
Publikováno v:
Transactions on Cryptographic Hardware and Embedded Systems, Vol 2024, Iss 4 (2024)
There is an imminent trade-off between an Integrated Circuit (IC)’s testability and its physical security. While Design for Test (DfT) techniques, such as scan chains make the circuit’s physical behavior at runtime observable and easy to control,
Externí odkaz:
https://doaj.org/article/47417edce70d4f4bbc82155ec9730836
Publikováno v:
Quantum, Vol 8, p 1398 (2024)
We introduce a new class of random Gottesman-Kitaev-Preskill (GKP) codes derived from the cryptanalysis of the so-called NTRU cryptosystem. The derived codes are $good$ in that they exhibit constant rate and average distance scaling $\Delta \propto \
Externí odkaz:
https://doaj.org/article/2e2f4e503a1a41c59d88b10e0e60246c
Autor:
Vincent Quentin Ulitzsch, Soundes Marzougui, Alexis Bagia, Mehdi Tibouchi, Jean-Pierre Seifert
Publikováno v:
Transactions on Cryptographic Hardware and Embedded Systems, Vol 2023, Iss 4 (2023)
At SAC 2016, Espitau et al. presented a loop-abort fault attack against lattice-based signature schemes following the Fiat–Shamir with aborts paradigm. Their attack recovered the signing key by injecting faults in the sampling of the commitment vec
Externí odkaz:
https://doaj.org/article/cb59a30ade1e4f2b8a025a00e32e2561
Publikováno v:
IEEE Access, Vol 7, Pp 122513-122521 (2019)
As PUFs become ubiquitous for commercial products (e.g., FPGAs from Xilinx, Altera, and Microsemi), attacks against these primitives are evolving toward more omnipresent and even advanced techniques. Machine learning (ML) attacks, among other non-inv
Externí odkaz:
https://doaj.org/article/c645ff51a68d43cc8cc0b6f6bfe30d22
Autor:
Nils Wisiol, Christopher Mühl, Niklas Pirnay, Phuong Ha Nguyen, Marian Margraf, Jean-Pierre Seifert, Marten van Dijk, Ulrich Rührmair
Publikováno v:
Transactions on Cryptographic Hardware and Embedded Systems, Vol 2020, Iss 3 (2020)
We demonstrate that the Interpose PUF proposed at CHES 2019, an Arbiter PUF-based design for so-called Strong Physical Unclonable Functions (PUFs), can be modeled by novel machine learning strategies up to very substantial sizes and complexities. Our
Externí odkaz:
https://doaj.org/article/64b42569ac8a4efe809d878757bfbfab
Autor:
Arnd Weber, Gernot Heiser, Dirk Kuhlmann, Martin Schallbruch, Anupam Chattopadhyay, Sylvain Guilley, Michael Kasper, Christoph Krauß, Philipp S. Krüger, Steffen Reith, Jean-Pierre Seifert
Publikováno v:
TATuP – Zeitschrift für Technikfolgenabschätzung in Theorie und Praxis, Vol 29, Iss 1 (2020)
Unsere zunehmende Abhängigkeit von Informationstechnik erhöht kontinuierlich die Safety- und Security-Anforderungen bei deren Einsatz. Ein zentrales Problem hierbei sind Schwachstellen von Hard- und Software. Marktkräfte konnten diese Situation bi
Externí odkaz:
https://doaj.org/article/76243e830316439bbf31344ec2e8e125
Publikováno v:
Quantum, Vol 5, p 417 (2021)
Here we study the comparative power of classical and quantum learners for generative modelling within the Probably Approximately Correct (PAC) framework. More specifically we consider the following task: Given samples from some unknown discrete proba
Externí odkaz:
https://doaj.org/article/23be12c4bdac4dd5a3ae9498f48da3df
Publikováno v:
Transactions on Cryptographic Hardware and Embedded Systems, Vol 2018, Iss 3 (2018)
Thermal laser stimulation (TLS) is a failure analysis technique, which can be deployed by an adversary to localize and read out stored secrets in the SRAM of a chip. To this date, a few proof-of-concept experiments based on TLS or similar approaches
Externí odkaz:
https://doaj.org/article/5f100a8d27914d6f847b31ff4267741c
Publikováno v:
Computers, Vol 4, Iss 2, Pp 61-86 (2015)
Embedded systems show the tendency of becoming more and more connected. This fact combined with the trend towards the Internet of Things, from which measuring instruments are not immune (e.g., smart meters), lets one assume that security in measuring
Externí odkaz:
https://doaj.org/article/62ef2d5e5abb4e6eb1b7de303f8adda9
Publikováno v:
Journal of Cryptographic Engineering.
The threat of hardware Trojans (HTs) and their detection is a widely studied field. While the effort for inserting a Trojan into an application-specific integrated circuit (ASIC) can be considered relatively high, especially when trusting the chip ma