Zobrazeno 1 - 10
of 6 522
pro vyhledávání: '"Side Channel Attack"'
Publikováno v:
Cybersecurity, Vol 7, Iss 1, Pp 1-13 (2024)
Abstract During the standardisation process of post-quantum cryptography, NIST encourages research on side-channel analysis for candidate schemes. As the recommended lattice signature scheme, CRYSTALS-Dilithium, when implemented on hardware, has seen
Externí odkaz:
https://doaj.org/article/f5685e4f85d54b469c82c2f45106c2a9
Autor:
Morgane Guerreau, Mélissa Rossi
Publikováno v:
Transactions on Cryptographic Hardware and Embedded Systems, Vol 2024, Iss 4 (2024)
HAWK is a lattice-based signature scheme candidate to the fourth call of the NIST’s Post-Quantum standardization campaign. Considered as a cousin of Falcon (one of the future NIST post-quantum standards) one can wonder whether HAWK shares the same
Externí odkaz:
https://doaj.org/article/6ad720fd612b4a9a82b7db9d434859c9
Publikováno v:
Transactions on Cryptographic Hardware and Embedded Systems, Vol 2024, Iss 3 (2024)
Masking is one of the most investigated countermeasures against sidechannel attacks. In a nutshell, it randomly encodes each sensitive variable into a number of shares, and compiles the cryptographic implementation into a masked one that operates ove
Externí odkaz:
https://doaj.org/article/c4c3d80c0a3f4e5e88c8d53a230c5c3d
Autor:
Nahmil Koo
Publikováno v:
IEEE Access, Vol 12, Pp 175742-175751 (2024)
This article introduces a countermeasure against Side-Channel Attacks (SCA) designed for 1st-order Delta-Sigma Modulators (DSM). Initially, the operation of 1st-Order DSM is explained at both the model and circuit levels. The analysis then focuses on
Externí odkaz:
https://doaj.org/article/4e1a9add3832406ba9f98bee1d714769
Publikováno v:
IEEE Access, Vol 12, Pp 105258-105267 (2024)
Existing archive formats provide encryption to protect data, but vulnerabilities in these formats can lead to data leakage. This study proposes a novel attack to leak original data from encrypted archive files by exploiting the integrity check value
Externí odkaz:
https://doaj.org/article/065a948925a04a1b94a258bffd80d817
Autor:
Jun Ye, Zewen Yang
Publikováno v:
Journal of King Saud University: Computer and Information Sciences, Vol 36, Iss 4, Pp 102019- (2024)
As more devices are integrated into the Internet of Things (IoT) ecosystem, accurate and efficient information transmission between resource-constrained equipment has become particularly important. For data encryption, compared to traditional encrypt
Externí odkaz:
https://doaj.org/article/43594f3c99bc4cd3ac20679ec1c3bb71
Autor:
Soner Seçkiner, Selçuk Köse
Publikováno v:
Information, Vol 15, Iss 8, p 488 (2024)
Hardware masking is used to protect against side-channel attacks by splitting sensitive information into different parts, called hardware masking shares. Ideally, a side-channel attack would only work if all these parts were completely independent. B
Externí odkaz:
https://doaj.org/article/3fa0885359524501a0c632bf04b2c2c9
Autor:
Amjed Abbas Ahmed, Mohammad Kamrul Hasan, Shayla Islam, Azana Hafizah Mohd Aman, Nurhizam Safie
Publikováno v:
Elektronika ir Elektrotechnika, Vol 29, Iss 4, Pp 76-81 (2023)
Deep learning (DL) is a new option that has just been made available for side-channel analysis. DL approaches for profiled side-channel attacks (SCA) have dominated research till now. In this attack, the attacker has complete control over the profili
Externí odkaz:
https://doaj.org/article/710a0956b14c4a1789d1ac9ed4be8346
Publikováno v:
Journal of Cybersecurity and Privacy, Vol 3, Iss 3, Pp 351-363 (2023)
The control flow of a program represents valuable and sensitive information; in embedded systems, this information can take on even greater value as the resources, control flow, and execution of the system have more constraints and functional implica
Externí odkaz:
https://doaj.org/article/e7eaf1b4442f4efe91e446996c1005d9
Autor:
Ahmed Abbas Jasim Al-Hchaimi, Nasri Bin Sulaiman, Mohd Amrallah Bin Mustafa, Mohd Nazim Bin Mohtar, Siti Lailatul Binti Mohd Hassan, Yousif Raad Muhsen
Publikováno v:
Egyptian Informatics Journal, Vol 24, Iss 2, Pp 351-364 (2023)
Context: Timing side-channel attack countermeasure techniques (TSCA-CTs) evaluation is a multi-criteria decision-making (MCDM) problem based on different MPSoCs of IoT platform architectures, performance, and design overhead. Therefore, the Fermatean
Externí odkaz:
https://doaj.org/article/6b45daf76e614f4ab083d95c7966441b