نتایج جستجو برای: side channel attack

تعداد نتایج: 499991  

Journal: :IACR Cryptology ePrint Archive 2012
Sébastien Tiran Philippe Maurine

Magnitude Squared Coherence is a signal processing tool that indicates how well two time domain signals match one with the other by tracking linear dependencies in their spectral decomposition. This paper introduces different ways of using the Magnitude Squared Coherence for Side Channel Analysis. This distinguisher has several advantages over well-known distinguishers.

2013
V. B. Litovski P. M. Petković

New developments and the future of electrical energy production and distribution system are investigated first. Use of alternative energy resources, synergy with the existing large energy generation facilities, control of the distribution, integrated billing and control, information distribution via the grid and many others are the facts that are to be considered while conceiving the system in ...

2008
Pierre-Louis Cayrel Philippe Gaborit Emmanuel Prouff

In this paper we describe the first implementation on smartcard of the code-based authentication protocol proposed by Stern at Crypto’93 and we give a securization of the scheme against side channel attacks. On the whole, this provides a secure implementation of a very practical authentication (and possibly signature) scheme which is mostly attractive for light-weight cryptography.

2013
Hassan Aly Mohammed ElGayyar

The Advanced Encryption Standard (AES) was selected by NIST due to its heavy resistance against classical cryptanalysis like differential and linear cryptanalysis. Even after the appearance of the modern side-channel attacks like timing and power consumption side-channel attacks, NIST claimed that AES is not vulnerable to timing attacks. In 2005, Bernstein [6] has successfully attacked the Open...

Journal: :IACR Cryptology ePrint Archive 2014
Vikram Singh

We improve the timing attack on ECDSA in [1] by Brumley and Tuveri. We use the Gaussian heuristic to analyse the length of error vectors in the lattice Close Vector Problem in order to determine the problems which are theoretically solvable. Then we cost each solution using a strengthened lattice reduction algorithm and Schnorr-Euchner enumeration to determine which problems are practically sol...

Journal: :IACR Cryptology ePrint Archive 2008
Matthieu Rivain Emmanuelle Dottax Emmanuel Prouff

In the recent years, side channel analysis has received a lot of attention, and attack techniques have been improved. Side channel analysis of second order is now successful in breaking implementations of block ciphers supposed to be effectively protected. This progress shows not only the practicability of second order attacks, but also the need for provably secure countermeasures. Surprisingly...

Journal: :IACR Cryptology ePrint Archive 2016
Ali Can Atici Cemal Yilmaz Erkay Savas

Theoretically secure cryptographic algorithms can be vulnerable to attacks due to their implementation flaws, which disclose side-channel information about the secret key. Bernstein’s attack is a well known cache-timing attack which uses execution time as the side-channel. The major drawback of this attack is that it needs an identical target machine to perform its learning phase where the atta...

2015
Kazuo Sakiyama Takanori Machida Arisa Matsubara Yunfeng Kuai Yu-ichi Hayashi Takaaki Mizuki Noriyuki Miura Makoto Nagata

Authentication based on cryptographic protocols is a key technology for recent security systems. However, the so-called relay attack where a malicious attacker tries to assume the role of the prover, is known to be a serious threat even for the cryptographically-secure authentication systems. This paper proposes a new authentication method that utilizes the side channel that already exists in m...

2011
Donghai Tian Xi Xiong Changzhen Hu Peng Liu

Security Applications Privacy Enhanced Access Control by Means of Policy Blinding p. 108 PolicyBased Authentication for Mobile Agents p. 123 Lightweight Delegated Subset Test with Privacy Protection p. 138 Post-quantum Cryptography and Side-Channel Attack Improving BDD Cryptosystems in General Lattices p. 152 Kipnis-Shamir Attack on Unbalanced Oil-Vinegar Scheme p. 168 A Novel Group Signature S...

Journal: :IACR Cryptology ePrint Archive 2014
Benoit Feix Hugues Thiebeauld

Side-channel analysis is a well-known and efficient hardware technique to recover embedded secrets in microprocessors. Over the past years, the state-of-the-art side-channel attacks has significantly increased, leading to a myriad of vulnerability paths that secure codes must withstand. Nowadays most of the attacks target the cryptographic algorithms, but very few exploit the cryptographic prot...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید