Zobrazeno 1 - 10
of 2 805
pro vyhledávání: '"Side Channel Attacks"'
Publikováno v:
Transactions on Cryptographic Hardware and Embedded Systems, Vol 2025, Iss 1 (2024)
In recent years, formal verification has emerged as a crucial method for assessing security against Side-Channel attacks of masked implementations, owing to its remarkable versatility and high degree of automation. However, formal verification still
Externí odkaz:
https://doaj.org/article/dc03c25ce8c6488ca38526b5e4379d47
Publikováno v:
Transactions on Cryptographic Hardware and Embedded Systems, Vol 2025, Iss 1 (2024)
Previous studies on deep-learning-based side-channel attacks (DL-SCAs) have shown that traditional performance evaluation metrics commonly used in DL, like accuracy and F1 score, are not effective in evaluating DL-SCA performance. Therefore, some pre
Externí odkaz:
https://doaj.org/article/3fe701ace4464e51a3c3e4058369025d
Publikováno v:
Transactions on Cryptographic Hardware and Embedded Systems, Vol 2025, Iss 1 (2024)
Side-Channel Attacks target the recovery of key material in cryptographic implementations by measuring physical quantities such as power consumption during the execution of a program. Simple Power Attacks consist in deducing secret information from a
Externí odkaz:
https://doaj.org/article/a91d15238a404550b30c3329a3f8cbbb
Publikováno v:
Transactions on Cryptographic Hardware and Embedded Systems, Vol 2025, Iss 1 (2024)
Classic McEliece is one of the three code-based candidates in the fourth round of the NIST post-quantum cryptography standardization process in the Key Encapsulation Mechanism category. As such, its decapsulation algorithm is used to recover the sess
Externí odkaz:
https://doaj.org/article/d14d03b0b71b4e1a8499f46308d66b62
Publikováno v:
Transactions on Cryptographic Hardware and Embedded Systems, Vol 2025, Iss 1 (2024)
In recent years, the limits of electromagnetic side-channel attacks have been significantly expanded. However, while there is a growing literature on increasing attack distance or performance, the discovery of new phenomenons about compromising elect
Externí odkaz:
https://doaj.org/article/fd7ba410d07c4f8db4e3b9d6d9200f19
Autor:
Haiyue Dong, Qian Guo
Publikováno v:
Transactions on Cryptographic Hardware and Embedded Systems, Vol 2025, Iss 1 (2024)
In this paper, we introduce OT-PCA, a novel approach for conducting Plaintext-Checking (PC) oracle based side-channel attacks, specifically designed for Hamming Quasi-Cyclic (HQC). By calling the publicly accessible HQC decoder, we build offline temp
Externí odkaz:
https://doaj.org/article/42e61eb45cd741a8a17c22042d3748cb
Publikováno v:
High-Confidence Computing, Vol 4, Iss 4, Pp 100241- (2024)
In today’s information age, eavesdropping has been one of the most serious privacy threats in information security, such as exodus spyware (Rudie et al., 2021) and pegasus spyware (Anatolyevich, 2020). And the main one of them is acoustic eavesdrop
Externí odkaz:
https://doaj.org/article/11502d9dac004748a8913168a0a71798
Publikováno v:
Data in Brief, Vol 57, Iss , Pp 111002- (2024)
This dataset provides a comprehensive set of side channels from fused deposition modeling 3D printers in order to enable the research in the security of additive manufacturing processes against side channel attacks. These attacks exploit indirect sig
Externí odkaz:
https://doaj.org/article/64862ef4448b4687917a3d19fc79245f
Autor:
Cankun Zhao, Hang Zhao, Jiangxue Liu, Bohan Yang, Wenping Zhu, Shuying Yin, Min Zhu, Shaojun Wei, Leibo Liu
Publikováno v:
Transactions on Cryptographic Hardware and Embedded Systems, Vol 2024, Iss 4 (2024)
SHA-3, the latest hash standard from NIST, is utilized by numerous cryptographic algorithms to handle sensitive information. Consequently, SHA-3 has become a prime target for side-channel attacks, with numerous studies demonstrating successful breach
Externí odkaz:
https://doaj.org/article/9da0c9eb23e24f6fa4a8cabecdcbb1a9
Publikováno v:
In High-Confidence Computing December 2024 4(4)