نتایج جستجو برای: side channel attack

تعداد نتایج: 499991  

2010
Jean-Christophe Courrège Benoit Feix Mylène Roussellet

Power Analysis has been studied since 1998 when P. Kocher et al. presented the first attack. From the initial Simple Power Analysis more complex techniques have been designed and studied during the previous decade such as Differential and Correlation Power Analysis. In this paper we revisit Simple Power Analysis which is at the heart of side channel techniques. We aim at showing its true effici...

Journal: :CoRR 2006
Hans-Rudolf Thomann

Recently, various side-channel attacks on widely used encryption methods have been discovered. Extensive research is currently undertaken to develop new types of combined encryption and authentication mechanisms. Developers of security systems ask whether to implement methods recommended by international standards or to choose one of the new proposals. We explain the nature of the attacks and h...

2005
Yukiyasu Tsunoo Toru Hisakado Etsuko Tsujihara Tsutomu Matsumoto Shinichi Kawamura Kouichi Fujisaki

This paper presents the results of three kinds of side-channel attacks, experimentally made against software-implemented ciphers on INSTAC-8 Compliant Board. INSTAC-8 is the standard evaluation platform, newly designed by the Information Technology Research and Standardization Center (INSTAC; a division of Japan Standards Association), to test Side-channel attack against the software-implemente...

2017
Dahmun Goudarzi Matthieu Rivain Damien Vergnaud Srinivas Vivek

Masking is a widespread countermeasure to protect implementations of block-ciphers against side-channel attacks. Several masking schemes have been proposed in the literature that rely on the efficient decomposition of the underlying s-box(es). We propose a generalized decomposition method for s-boxes that encompasses several previously proposed methods while providing new trade-offs. It allows ...

2003
Ulrich Kühn

This paper describes very efficient attacks on plain RSA encryption as usually described in textbooks. These attacks exploit side channels caused by implementations that, during decryption, incorrectly make certain assumption on the size of message. We highlight different assumptions that are easily made when implementing plain RSA decryption and present corresponding attacks. These attacks mak...

Journal: :ERCIM News 2016
José Bacelar Almeida Manuel Barbosa Hugo Pacheco Vitor Pereira

cryptographic implementations, as is shown by frequent (and in some cases catastrophic) security breaches directly attributed to implementation errors in widely used cryptographic libraries [L1,L2]. One of the causes of these breaches in widely tested software is the semantic gap between theoretical cryptographic specifications and their concrete implementations. Effectively closing this gap is...

2000
David Naccache Michael Tunstall

This paper will attempt to explain some of the side-channel attack techniques in a fashion that is easily comprehensible by the layman. What follows is a presentation of three different attacks (power, timing and fault attacks) that can be carried out on cryptographic devices such as smart-cards. For each of the three attacks covered, a puzzle and it‘s solution will be given, which will act as ...

2013
Aurélie Bauer Éliane Jaulmes Emmanuel Prouff Justine Wild

Since the introduction of side-channel attacks in the nineties, RSA implementations have been a privileged target. A wide variety of countermeasures have been proposed and most of practical attacks are nowadays efficiently defeated by them. However, in a recent work published at ICICS 2010, Clavier et al. have pointed out that almost all the existing countermeasures were ineffective if the atta...

Journal: :J. Inf. Sci. Eng. 2016
Yining Liu Wei Guo Chi Cheng Chingfang Hsu Junyan Qian Changlu Lin

YI-NING LIU, WEI GUO, CHI CHENG, CHINGFANG HSU, JUN-YAN QIAN AND CHANG-LU LIN Guangxi Key Lab of Trusted Software Guilin University of Electronic Technology Guilin, 541004 P.R. China School of Computer Science China University of Geosciences Wuhan, 430074 P.R. China Computer School Central China Normal University Wuhan, 430079 P.R. China College of Mathematics and Computer Science Fujian Normal...

Journal: :CoRR 2011
Sumanta Chaudhuri Sylvain Guilley

Side-Channel Analysis used for codebreaking could be used constructively as a probing tool for internal gates in integrated circuits. This paper outlines basic methods and mathematics for that purpose

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید