Zobrazeno 1 - 10
of 69
pro vyhledávání: '"Vittorio Zaccaria"'
Publikováno v:
IET Information Security, Vol 16, Iss 2, Pp 127-132 (2022)
Abstract The overarching goal of this work is to present new theoretical and practical tools to implement robust−t−probing security. In this work, a low‐latency multiplication gadget that is secure against probing attacks that exploit logic gli
Externí odkaz:
https://doaj.org/article/24afc6ce5d34432c945b74de3520cd16
Publikováno v:
Transactions on Cryptographic Hardware and Embedded Systems, Vol 2020, Iss 4 (2020)
In this work we provide a spectral formalization of non-interference in the presence of glitches. Our goal is to present new theoretical and practical tools to reason about robust-d-probing security. We show that the current understanding of extended
Externí odkaz:
https://doaj.org/article/a6eaab39dd0c4359b73c904fe660a741
Autor:
Daniele Antonio Emanuele Carta, Vittorio Zaccaria, Gabriele Quagliarella, Maria Chiara Molteni
Publikováno v:
Constructive Side-Channel Analysis and Secure Design ISBN: 9783031294969
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::4ac74d0ea114fb20d504d51367b7a20d
https://doi.org/10.1007/978-3-031-29497-6_2
https://doi.org/10.1007/978-3-031-29497-6_2
Autor:
Zhen Li, Andrea, Pagliari, Nicolò, Pasini, Pasolini, Vittorio Zaccaria, Quartana, Chiara, Jenny, Dankelman, ELENA DE MOMI
Publikováno v:
Politecnico di Milano-IRIS
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=dedup_wf_001::33247132176684d0e2a615f26635580b
http://hdl.handle.net/11311/1148212
http://hdl.handle.net/11311/1148212
Publikováno v:
ACM Transactions on Design Automation of Electronic Systems. 23:1-17
Implementing a cryptographic circuit poses challenges not always acknowledged in the backing mathematical theory. One of them is the vulnerability against side-channel attacks . A side-channel attack is a procedure that uses information leaked by the
Publikováno v:
Lecture Notes in Computer Science ISBN: 9783030192730
ICWE
ICWE
This paper presents a framework for the design of chatbots for data exploration. With respect to conversational virtual assistants (such as Amazon Alexa or Apple Siri), this class of chatbots exploits structured input to retrieve data from known data
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::8643c7db7a77d6319122d638448b7e1f
http://hdl.handle.net/11311/1119182
http://hdl.handle.net/11311/1119182
Publikováno v:
FDTC
This paper evaluates the effectiveness of exfiltrating a key from an AES primitive by injecting double transient faults into the digital circuit using two laser lights. We present some theoretical consideration on the effectiveness of this approach a
Publikováno v:
IEEE Transactions on Computers
This brief deals with the problem of mathematically formalizing hardware circuits' vulnerability to side-channel attacks. We investigate whether spectral analysis is a useful analytical tool for this purpose by building a mathematically sound theory
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::e61740fc5c435646c76aa710894b5bbe
Publikováno v:
Advanced Information Systems Engineering-30th International Conference, CAiSE 2018, Tallinn, Estonia, June 11-15, 2018, Proceedings
Lecture Notes in Computer Science
Lecture Notes in Computer Science-Advanced Information Systems Engineering
Advanced Information Systems Engineering ISBN: 9783319915623
CAiSE
Lecture Notes in Computer Science
Lecture Notes in Computer Science-Advanced Information Systems Engineering
Advanced Information Systems Engineering ISBN: 9783319915623
CAiSE
Current scenarios for app development are characterized by rich resources that often overwhelm the final users, especially in mobile app usage situations. It is therefore important to define design methods that enable dynamic filtering of the pertine
Publikováno v:
SE4COG@ICSE
Chatbots, i.e., conversational software agents able to interact with users via instant messaging channels like Messenger, WhatsApp or SMS, have the power to substantively simplify human-computer interaction thanks to their natural language paradigm.
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::7cc87b14cc9ca87a77d1c65260c96886
http://hdl.handle.net/11311/1071751
http://hdl.handle.net/11311/1071751