Zobrazeno 1 - 3
of 3
pro vyhledávání: '"Shih-Chun You"'
Publikováno v:
Transactions on Cryptographic Hardware and Embedded Systems, Vol 2023, Iss 4 (2023)
The recently adopted Ascon standard by NIST offers a lightweight authenticated encryption algorithm for use in resource-constrained cryptographic devices. To help assess side-channel attack risks of Ascon implementations, we present the first templat
Externí odkaz:
https://doaj.org/article/ef6c29613ffa4741a10d377b9cb48c9e
Autor:
Shih-Chun You, 游世群
105
Masking countermeasures need random number generators. In this research, we study about whether it is at the same secure level to use linear congruential generators to generate masks compared to other cryptographically secure pseudo random n
Masking countermeasures need random number generators. In this research, we study about whether it is at the same secure level to use linear congruential generators to generate masks compared to other cryptographically secure pseudo random n
Externí odkaz:
http://ndltd.ncl.edu.tw/handle/29ey39
Autor:
Markus G. Kuhn, Shih-Chun You
Publikováno v:
Constructive Side-Channel Analysis and Secure Design ISBN: 9783030687724
COSADE
COSADE
We present an enumeration procedure based on a template attack to recover the complete input text of a SHA-3 implementation on an 8-bit microprocessor from a single trace of a power-analysis side channel. This attack targets 600 bytes of triple-redun
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::73207df7bec7549e1b5dbe6de7cc505f
https://doi.org/10.1007/978-3-030-68773-1_2
https://doi.org/10.1007/978-3-030-68773-1_2