نتایج جستجو برای: timing attacks

تعداد نتایج: 142928  

2004
Jean-Claude Bajard Laurent Imbert Pierre-Yvan Liardet Yannick Teglia

In this paper we show how the usage of Residue Number Systems (RNS) can easily be turned into a natural defense against many side-channel attacks (SCA). We introduce a Leak Resistant Arithmetic (LRA), and present its capacities to defeat timing, power (SPA, DPA) and electromagnetic (EMA) attacks. keywords: Side Channel Attacks, Residue Number Systems, RNS Montgomery multiplication

2016
Jian Mao Yue Chen Futian Shi Yaoqi Jia Zhenkai Liang

Web applications have become the foundation of many types of systems, ranging from cloud services to Internet of Things (IoT) systems. Due to the large amount of sensitive data processed by web applications, user privacy emerges as a major concern in web security. Existing protection mechanisms in modern browsers, e.g., the same origin policy, prevent the users' browsing information on one webs...

Journal: :IACR Cryptology ePrint Archive 2011
Chen Cai-Sen Wang Tao Chen Xiao-Cen Zhou Ping

The previous I-cache timing attacks on RSA which exploit the instruction path of a cipher were mostly proof-of-concept, and it is harder to put them into practice than D-cache timing attacks. We propose a new trace driven timing attack model based on spying on the whole I-cache. An improved analysis algorithm of the exponent using the characteristic of the size of the window is advanced, which ...

2011

Elliptic curve cryptosystems have become the most trusted, secure systems in widespread use today. However, the recent advent of utilizing side channel information poses an immediate and powerful threat to systems which are not prepared for this exact type of attack. Side channel analysis (SCA) attacks use some measured quantities outside the scope of the actual cryptographic algorithm, in addi...

2014
Nisha Shah

Public key cryptography is based on two keys, in which decryption key is private key. Among the different cryptanalytic attacks, timing attack is one of the possible attacks on RSA that determines bits of private key. This is done by determining time for each iteration in computing modular exponentiation. There are different mechanisms to counter such attack. Among them, blinding method and ran...

Journal: :IACR Cryptology ePrint Archive 2010
Cai-Sen Chen Tao Wang Jun-Jian Tian

Several types of timing attacks have been published, but they are either in theory or hard to be taken into practice. In order to improve the feasibility of attack, this paper proposes an advance timing attack scheme on RSA-CRT with T-test. Similar timing attacks have been presented, such as BBAttack and Shindler’s attack, however none of them applied statistical tool in their methods with such...

2015
Tiawna Cayton

Today, designing cryptographic hardware and embedded systems requires much more attention due to the wide range of practical side-channel attacksa. The processors that are responsible to perform the operations defined in cryptographic algorithms should also be resistant to these kinds of side-channel-attacks as well as being efficient in terms of area, performance and latency. To improve the ha...

Journal: :Proceedings on Privacy Enhancing Technologies 2020

Journal: :Indonesian Journal of Electrical Engineering and Computer Science 2018

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید