Zobrazeno 1 - 10
of 15
pro vyhledávání: '"Ruggero Susella"'
Autor:
Luca Frittoli, Matteo Bocchi, Silvia Mella, Diego Carrera, Beatrice Rossi, Pasqualina Fragneto, Ruggero Susella, Giacomo Boracchi
Publikováno v:
Transactions on Cryptographic Hardware and Embedded Systems, Vol 2020, Iss 3 (2020)
The sequential structure of some side-channel attacks makes them subject to error propagation, i.e. when an error occurs during the recovery of some part of a secret key, all the following guesses might as well be chosen randomly. We propose a method
Externí odkaz:
https://doaj.org/article/1d31e5f57df74b0ebf2db69bab967571
Autor:
Alessandro Barenghi, Diego Carrera, Silvia Mella, Andrea Pace, Gerardo Pelosi, Ruggero Susella
Publikováno v:
Journal of Information Security and Applications, 66, 1-14
Journal of Information Security and Applications, 66, pp. 1-14
Journal of Information Security and Applications, 66, pp. 1-14
Contains fulltext : 252260.pdf (Publisher’s version ) (Closed access)
Publikováno v:
Proceedings of the 28th Asia and South Pacific Design Automation Conference.
Publikováno v:
Proceedings of the 9th International Conference on Information Systems Security and Privacy.
Autor:
Alessandro Barenghi, Diego Carrera, Silvia Mella, Andrea Pace, Gerardo Pelosi, Ruggero Susella
Publikováno v:
Network and System Security ISBN: 9783030927073
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::a1c477a25a72e625bcc73dad51eedebc
http://hdl.handle.net/11311/1198513
http://hdl.handle.net/11311/1198513
Publikováno v:
ACM Transactions on Design Automation of Electronic Systems. 23:1-17
Implementing a cryptographic circuit poses challenges not always acknowledged in the backing mathematical theory. One of them is the vulnerability against side-channel attacks . A side-channel attack is a procedure that uses information leaked by the
Publikováno v:
BlockSys@SenSys
A major challenge in networked sensor systems and other IoT environments is addressing security. Vulnerabilities in those systems arise from poor physical security, unauthenticated devices, insecure firmware updates, insecure communication, and data
Publikováno v:
Lecture Notes in Computer Science ISBN: 9783319769523
CT-RSA
CT-RSA
Ed25519 is an instance of the Elliptic Curve based signature scheme EdDSA that was recently introduced to solve an inconvenience of the more established ECDSA. Namely, both schemes require the generation of a value (scalar of the ephemeral key pair)
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::72158d046559c67a1c2c5516ea0853ff
https://doi.org/10.1007/978-3-319-76953-0_1
https://doi.org/10.1007/978-3-319-76953-0_1
Autor:
Sofia Montrasio, Ruggero Susella
Publikováno v:
Smart Card Research and Advanced Applications ISBN: 9783319546681
CARDIS
CARDIS
The field of elliptic curve cryptography has recently experienced a deployment of new models of elliptic curves, such as Montgomery or twisted Edwards. Computations on these curves have been proven to be exception-free and easy to make constant-time.
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::3e532fb1e0557aed312b4040df469094
https://doi.org/10.1007/978-3-319-54669-8_10
https://doi.org/10.1007/978-3-319-54669-8_10
Publikováno v:
E-Business and Telecommunications ISBN: 9783319302218
ICETE (Selected Papers)
ICETE (Selected Papers)
Partial key exposure attacks, introduced by Boneh, Durfee and Frankel in 1998, aim at retrieving an RSA private key when a fraction of its bits is known. These attacks are of particular interest in the context of side-channel attacks, where the attac
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::8490f32d73be6e50be94bca29d3581ac
https://doi.org/10.1007/978-3-319-30222-5_17
https://doi.org/10.1007/978-3-319-30222-5_17