搜索结果: 1-15 共查到“军事学 power analysis”相关记录43条 . 查询时间(0.14 秒)
On-Device Power Analysis Across Hardware Security Domains
side-channel power analysis cross-domain
font style='font-size:12px;'>
2019/6/12
Side-channel power analysis is a powerful method of breaking secure cryptographic algorithms, but typically power analysis is considered to require specialized measurement equipment on or near the dev...
Remote Inter-Chip Power Analysis Side-Channel Attacks at Board-Level
side-channel analysis FPGA
font style='font-size:12px;'>
2018/11/13
The current practice in board-level integration is to incorporate chips and components from numerous vendors. A fully trusted supply chain for all used components and chipsets is an important, yet ext...
Assessing the Feasibility of Single Trace Power Analysis of Frodo
Side-channel analysis LWE Frodo
font style='font-size:12px;'>
2018/7/18
Lattice-based schemes are among the most promising post-quantum schemes, yet the effect of both parameter and implementation choices on their side-channel resilience is still poorly understood. Aysu e...
Differential Power Analysis of XMSS and SPHINCS
Post-quantum cryptography Hash-based signatures DPA
font style='font-size:12px;'>
2018/7/16
Quantum computing threatens conventional public-key cryptography. In response, standards bodies such as NIST increasingly focus on post-quantum cryptography. In particular, hash-based signature scheme...
Comparison of Cost of Protection Against Differential Power Analysis of Selected Authenticated Ciphers
Cryptography authenticated cipher field programmable gate array
font style='font-size:12px;'>
2018/4/17
Authenticated ciphers, like all physical implementations of cryptography, are vulnerable to side-channel attacks, including differential power analysis (DPA). The t-test leakage detection methodology ...
An Inside Job: Remote Power Analysis Attacks on FPGAs
side-channel analysis FPGA
font style='font-size:12px;'>
2018/1/12
Hardware Trojans have gained increasing interest during the past few years. Undeniably, the detection of such malicious designs needs a deep understanding of how they can practically be built and deve...
Entropy Reduction for the Correlation-Enhanced Power Analysis Collision Attack
AES Side Channel Attacks
font style='font-size:12px;'>
2017/11/13
Side Channel Attacks are an important attack vector on secure AES implementations. The Correlation-Enhanced Power Analysis Collision Attack by Moradi et al. [13] is a powerful collision attack that ex...
Correlation Power Analysis Attack against STT-MRAM Based Cyptosystems
Correlation power analysis attack Spin-transfer torque magnetic RAM MICKEY-128 2.0 stream cipher
font style='font-size:12px;'>
2017/5/15
Emerging technologies such as Spin-transfer torque magnetic random-access memory (STT-MRAM) are considered potential candidates for implementing low-power, high density storage systems. The vulnerabil...
Evolving S-Boxes with Reduced Differential Power Analysis Susceptibility
AES block ciphers S-box
font style='font-size:12px;'>
2016/12/26
Differential power analysis targets S-boxes to break ciphers that resist cryptanalysis. We relax cryptanalytic constraints to lower S-box leakage, as quantified by the transparency order. We apply gen...
A Unified Metric for Quantifying Information Leakage of Cryptographic Devices under Power Analysis Attacks
Information leakage amount side-channel security power analysis attack
font style='font-size:12px;'>
2016/3/18
To design effective countermeasures for cryptosystems against side-channel power analysis attacks, the evaluation of the system leakage has to be lightweight and often times at the early stage like on...
Algorithmic Countermeasures Against Fault Attacks and Power Analysis for RSA-CRT
Bellcore attack RSA-CRT modular exponentiation
font style='font-size:12px;'>
2016/3/4
In this work, we analyze all existing RSA-CRT countermeasures against the Bellcore attack
that use binary self-secure exponentiation algorithms. We test their security against a powerful
adversary b...
Differential Power Analysis of a McEliece Cryptosystem
Differential Power Analysis McEliece Cryptosystem QC-MDPC Codes
font style='font-size:12px;'>
2016/1/8
This work presents the first differential power analysis of an implementation of the McEliece
cryptosystem. Target of this side-channel attack is a state-of-the-art FPGA implementation of the ef-
fi...
Power Analysis Attack on Hardware Implementation of MAC-Keccak on FPGAs
Department of Electrical and Computer Engineering, Northeastern University
font style='font-size:12px;'>
2016/1/6
Keccak is the hash function selected by NIST as the new SHA-3 standard. Keccak
is built on Sponge construction and it provides a new MAC function called MAC-Keccak. These
new algorithms have raised ...
Side-channel Power Analysis of Different Protection Schemes Against Fault Attacks on AES
AES differential fault analysis side-channel attacks
font style='font-size:12px;'>
2016/1/6
A protection circuit can be added into cryptographic systems to detect both soft errors
and injected faults required by Differential Fault Analysis (DFA) attacks. While such protection
can improve t...
Side Channel Power Analysis of an AES-256 Bootloader
side channel power analysis AES256
font style='font-size:12px;'>
2016/1/6
Side Channel Attacks (SCA) using power measurements are a known method of breaking cryptographic algorithms such as AES. Published research into attacks on AES frequently target only AES-128, and ofte...