نتایج جستجو برای: timing attacks

تعداد نتایج: 142928  

Journal: :IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences 2023

A side channel attack is a means of security attacks that tries to restore secret information by analyzing side-information such as electromagnetic wave, heat, electric energy and running time are unintentionally emitted from computer system. The focuses on the cryptosystem specifically named “timing attack”. Timing relatively easy carry out, particularly threatening for tiny systems used in sm...

Journal: :Electronics 2022

Fault injection technologies can be utilized to steal secret information inside integrated circuits (ICs), and thus cause serious security threats. Parity check has been adopted as an efficient method against fault attacks. However, the contradiction between overhead restricts further development applications of parity in detection. This paper proposes two methods, mixed-grained word recombinat...

Journal: :Journal of hardware and systems security 2021

Cache timing channel attacks has attained a lot of attention in the last decade. These exploits created by significant time gap between cache and main memory accesses. It been successfully implemented to leak secret key various cryptography algorithms. The latest advancements also exploit other micro-architectural components such as hardware prefetchers, branch predictor, replacement engine, ad...

Journal: :IACR Cryptology ePrint Archive 2013
Daniel J. Bernstein Tung Chou Peter Schwabe

This paper presents extremely fast algorithms for code-based public-key cryptography, including full protection against timing attacks. For example, at a 2 security level, this paper achieves a reciprocal decryption throughput of just 60493 cycles (plus cipher cost etc.) on a single Ivy Bridge core. These algorithms rely on an additive FFT for fast root computation, a transposed additive FFT fo...

Journal: :IACR Cryptology ePrint Archive 2015
Mariya Georgieva Frédéric de Portzamparc

We analyse the security regarding timing attacks of implementations of the decryption in McEliece PKC with binary Goppa codes. First, we review and extend the existing attacks, both on the messages and on the keys. We show that, until now, no satisfactory countermeasure could erase all the timing leakages in the Extended Euclidean Algorithm (EEA) step. Then, we describe a version of the EEA nev...

2013
Raphael Spreitzer Thomas Plos

Cache attacks are known to be sophisticated attacks against cryptographic implementations on desktop computers. Recently, also investigations of such attacks on testbeds with processors that are employed in mobile devices have been done. In this work we investigate the applicability of Bernstein’s [4] timing attack and the cache-collision attack by Bogdanov et al. [6] in real environments on th...

2010
Sarah H. Sellke Saurabh Bagchi Ness Shroff Chih-Chun Wang Sonia Fahmy Ninghui Li

Sellke, Sarah H. Ph.D., Purdue University, May 2010. Analytical Characterization of Internet Security Attacks. Major Professors: Saurabh Bagchi and Ness B. Shroff. Internet security attacks have drawn significant attention due to their enormously adverse impact. These attacks includes Malware (Viruses, Worms, Trojan Horse), Denial of Service, Packet Sniffer, and Password Attacks. There is an in...

Journal: :Proceedings on Privacy Enhancing Technologies 2023

Named entity recognition models (NER), are widely used for identifying named entities (e.g., individuals, locations, and other information) in text documents. Machine learning based NER increasingly being applied privacy-sensitive applications that need automatic scalable identification of sensitive information to redact data sharing. In this paper, we study the setting when available as a blac...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه فردوسی مشهد - دانشکده ادبیات و علوم انسانی دکتر علی شریعتی 1393

this study aimed at examining the effects of iranian efl learners’ anxiety, ambiguity tolerance, and gender on their preferences for corrective feedback (cf, henceforth). the effects were sought with regard to the necessity, frequency, and timing of cf, types of errors that need to be treated, types of cf, and choice of correctors. seventy-five iranian efl students, twenty-eight males and forty...

Journal: :Int. Arab J. Inf. Technol. 2016
Amuthan Arjunan Praveena Narayanan Kaviarasan Ramu

Security plays an important role in many embedded systems. All security based algorithms are implemented in hardware or software, and on physical devices which interact with the systems and influenced by their environments. The attacker extracts, investigate and monitor these physical interactions and extracts side channel information which is used in cryptanalysis. This type of cryptanalysis i...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید