نتایج جستجو برای: side channel attack

تعداد نتایج: 499991  

2004
Jean-Claude Bajard Laurent Imbert Pierre-Yvan Liardet Yannick Teglia

In this paper we show how the usage of Residue Number Systems (RNS) can easily be turned into a natural defense against many side-channel attacks (SCA). We introduce a Leak Resistant Arithmetic (LRA), and present its capacities to defeat timing, power (SPA, DPA) and electromagnetic (EMA) attacks. keywords: Side Channel Attacks, Residue Number Systems, RNS Montgomery multiplication

Journal: :IACR Cryptology ePrint Archive 2011
Rodolphe Lampe Jacques Patarin

In 1989, (Shamir, 1989) proposed a new zero-knowledge identification scheme based on a NP-complete problem called PKP for Permuted Kernel Problem. For a given prime p, a given matrix A and a given vector V , the problem is to find a permutation π such that the permuted vector Vπ verifies A ·Vπ = 0 mod p. This scheme is still in 2011 known as one of the most efficient identification scheme based...

2010
Nicolas Veyrat-Charvillon François-Xavier Standaert

Most side-channel attacks that have been published in the open literature assume knownor chosen-message adversarial scenarios. In this paper, we analyze the increase of the attacks’ efficiencies that can be obtained by adaptively selecting the messages. For this purpose, we first describe a generic strategy that allows an adversary to take advantage of this capability. We show that it can be ap...

2015
Pardeep Kumar Jagdeep Kaur

Cloud computing is one of the most important technology of networking which is widely used in these days. Cloud computing has some security issue also. There are several types of attacks which can be launch on cloud very easily and has many serious effects on the network. This paper discussed the proposed scheme to overcome the adversary effects of virtual side channel effects. Keywords— Privat...

2009
Frederik Armknecht Roel Maes Ahmad-Reza Sadeghi Berk Sunar Pim Tuyls

Physical attacks on cryptographic implementations and devices have become crucial. In this context a recent line of research on a new class of side-channel attacks, called memory attacks, has received increasingly more attention. These attacks allow an adversary to measure a significant fraction of secret key bits directly from memory, independent of any computational side-channels. Physically ...

2001
Christophe Clavier Marc Joye

Very few countermeasures are known to protect an exponentiation against simple side-channel analyses. Moreover, all of them are heuristic. This paper presents a universal exponentiation algorithm. By tying the exponent to a corresponding addition chain, our algorithm can virtually execute any exponentiation method. Our aim is to transfer the security of the exponentiation method being implement...

2005
Kris Tiri David D. Hwang Alireza Hodjat Bo-Cheng Lai Shenglin Yang Patrick Schaumont Ingrid Verbauwhede

Wave dynamic differential logic combined with differential routing is a working, practical technique to thwart side-channel power attacks. Measurement-based experimental results show that a differential power analysis attack on a prototype IC, fabricated in 0.18μm CMOS, does not disclose the entire secret key of the AES algorithm at 1,500,000 measurement acquisitions. This makes the attack de f...

2013
Carolyn Whitnall Elisabeth Oswald

Linear regression-based methods have been proposed as efficient means of characterising device leakage in the training phases of profiled side-channel attacks. Empirical comparisons between these and the ‘classical’ approach to template building have confirmed the reduction in profiling complexity to achieve the same attack-phase success, but have focused on a narrow range of leakage scenarios ...

2012
Josep Balasch Sebastian Faust Benedikt Gierlichs Ingrid Verbauwhede

A recent trend in cryptography is to formally prove the leakage resilience of cryptographic implementations – that is, one formally shows that a scheme remains provably secure even in the presence of side channel leakage. Although many of the proposed schemes are secure in a surprisingly strong model, most of them are unfortunately rather inefficient and come without practical security evaluati...

Journal: :IACR Cryptology ePrint Archive 2012
Jeyavijayan Rajendran Ramesh Karri James Bradley Wendt Miodrag Potkonjak Nathan R. McDonald Garrett S. Rose Bryant T. Wysocki

Information security has emerged as an important system and application metric. Classical security solutions use algorithmic mechanisms that address a small subset of emerging security requirements, often at high energy and performance overhead. Further, emerging side channel and physical attacks can compromise classical security solutions. Hardware based security solutions overcome many of the...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید