搜索结果: 1-15 共查到“军事学 DPA”相关记录37条 . 查询时间(0.07 秒)
A Comparison of Single-Bit and Multi-Bit DPA for Attacking AES128 on an ATmega328P
AES DPA multi-bit DPA
font style='font-size:12px;'>
2019/8/8
Side channel attacks have demonstrated in the past that it is possible to break cryptographic algorithms by attacking the implementation rather than the algorithm. This paper compares an adaptation of...
A remark on a success rate model fpr DPA and CPA
Side-channel attacks evaluation metric success rate
font style='font-size:12px;'>
2018/11/16
The success rate is the most common evaluation metric for measuring the performance of a particular side channel attack scenario. We improve on an analytic formula for the success rate.
A first-order chosen-plaintext DPA attack on the third round of DES
side-channel attack DPA countermeasure
font style='font-size:12px;'>
2018/1/2
DPA attacks usually exhibit a "divide-and-conquer" property: the adversary needs to enumerate only a small space of the key (a key sub-space) when performing the DPA attack. This is achieved trivially...
Categorising and Comparing Cluster-Based DPA Distinguishers
side-channel analysis, DPA, machine learning
font style='font-size:12px;'>
2017/8/10
Side-channel distinguishers play an important role in differential power analysis, where real world leakage information is compared against hypothetical predictions in order to guess at the underlying...
Decomposed S-Boxes and DPA Attacks: A Quantitative Case Study using PRINCE
Threshold Implementation Transparency Order S-box decomposition
font style='font-size:12px;'>
2016/6/20
Lightweight ciphers become indispensable and inevitable in the ubiquitous smart devices. However, the security of ciphers is often subverted by various types of attacks, especially, implementation att...
Evaluation and Improvement of Generic-Emulating DPA Attacks
generic side-channel attack linear regression cross-validation
font style='font-size:12px;'>
2016/3/18
At CT-RSA 2014, Whitnall, Oswald and Standaert gave the
impossibility result that no generic DPA strategies (i.e., without any a
priori knowledge about the leakage characteristics) can recover secre...
Multi-target DPA attacks: Pushing DPA beyond the limits of a desktop computer
implementation differential power analysis
font style='font-size:12px;'>
2016/1/9
Following the pioneering CRYPTO ’99 paper by Kocher et
al. differential power analysis (DPA) was initially geared around lowcost
computations performed using standard desktop equipment with
minimal...
MuR-DPA: Top-down Levelled Multi-replica Merkle Hash Tree Based Secure Public Auditing for Dynamic Big Data Storage on Cloud
public auditing integrity verification cloud computing
font style='font-size:12px;'>
2016/1/9
Big data and its applications are attracting more and more research interests in recent years. As the new generation distributed computing platform, cloud computing is believed to be the most potent p...
Moments-Correlating DPA
font style='font-size:12px;'>
2016/1/9
We generalize correlation-enhanced power analysis collision
attacks into moments-correlating DPA. The resulting distinguisher is applicable
to the profiled and non-profiled (collision) settings and ...
Efficient Selection of Time Samples for Higher-Order DPA with Projection Pursuits
Higher-Order DPA Projection Pursuits
font style='font-size:12px;'>
2016/1/9
The selection of points-of-interest in leakage traces is a frequently
neglected problem in the side-channel literature. However, it can
become the bottleneck of practical adversaries/evaluators as t...
A Statistical Model for Higher Order DPA on Masked Devices
Side-channel attack differential power analysis statistical model
font style='font-size:12px;'>
2016/1/9
A popular effective countermeasure to protect block cipher implementations against
differential power analysis (DPA) attacks is to mask the internal operations of the cryptographic
algorithm with ra...
RSA meets DPA: Recovering RSA Secret Keys from Noisy Analog Data
RSA Key-Recovery Cold Boot Attack Side Channel Attack
font style='font-size:12px;'>
2016/1/8
We discuss how to recover RSA secret keys from noisy analog data obtained through physical attacks such as cold boot and side channel attacks. Many studies have focused on recovering correct secret ke...
Side Channel Attacks: Vulnerability Analysis of PRINCE and RECTANGLE using DPA
Lightweight block cipher power characteristic FPGA implementation
font style='font-size:12px;'>
2016/1/7
Over a decade, cryptographers are more attentive on designing
lightweight ciphers in focus to compact cryptographic devices. More
often, the security of these algorithms are defined in terms of its ...
Robust Profiling for DPA-Style Attacks
side-channel analysis differential power analysis machine learning
font style='font-size:12px;'>
2015/12/30
Profiled side-channel attacks are understood to be powerful when applicable: in
the best case when an adversary can comprehensively characterise the leakage, the resulting
model leads to attacks req...
ASCA, SASCA and DPA with Enumeration: Which One Beats the Other and When?
ASCA SASCA
font style='font-size:12px;'>
2015/12/30
We describe three contributions regarding the Soft Analytical
Side-Channel Attacks (SASCA) introduced at Asiacrypt 2014. First,
we compare them with Algebraic Side-Channel Attacks (ASCA) in a
noise...