搜索结果: 1-15 共查到“军事学 Side-channel attack”相关记录19条 . 查询时间(0.093 秒)
X-DeepSCA: Cross-Device Deep Learning Side Channel Attack
Side-channel Attacks Profiling attacks Cross-device Attack
font style='font-size:12px;'>
2019/7/17
This article, for the first time, demonstrates Cross-device Deep Learning Side-Channel Attack (X-DeepSCA), achieving an accuracy of >99.9%>99.9%, even in presence of significantly higher inter-device ...
One trace is all it takes: Machine Learning-based Side-channel Attack on EdDSA
Side-channel attacks EdDSA Machine learning
font style='font-size:12px;'>
2019/4/10
Profiling attacks, especially those based on machine learning proved as very successful techniques in recent years when considering side-channel analysis of block ciphers implementations. At the same ...
Optimizations of Side-Channel Attack on AES MixColumns Using Chosen Input
AES Advanced Encryption Standard Side-channel
font style='font-size:12px;'>
2019/4/3
Considering AES sub-steps that can be attacked with a small guess space, the most practicable is to target SubBytes of extremal rounds. For its contrast between candidates (non-linearity) and that the...
Ground-up Root-cause Analysis guided Low-Overhead Generic Countermeasure for Electro-Magnetic Side-Channel Attack
EM Side-channel attack generic countermeasure cryptographic hardware
font style='font-size:12px;'>
2018/6/25
The threat of side-channels is becoming increasingly prominent for resource-constrained internet-connected devices. While numerous power side-channel countermeasures have been proposed, a promising ap...
Countermeasures against a side-channel attack in a kernel memory
REE TEE
font style='font-size:12px;'>
2018/1/19
We proposed a zero-contention in cache lines a cache policy between REE and TEE to prevent from TruSpy attacks in a kernel memory of an embedded system. We suggested that delay time of data path of RE...
Linear Regression Side Channel Attack Applied on Constant XOR
linear regression side channel attack constant XOR
font style='font-size:12px;'>
2017/12/20
Linear regression side channel attack (LRA) used to be known as a robust attacking method as it makes use of independent bits leakage. This leakage assumption is more general than Hamming weight/ Hamm...
May the Fourth Be With You: A Microarchitectural Side Channel Attack on Several Real-World Applications of Curve25519
Side Channel Attacks Curve25519 Cache-Attacks
font style='font-size:12px;'>
2017/8/29
In recent years, applications increasingly adopt security primitives designed with better countermeasures against side channel attacks. A concrete example is Libgcrypt's implementation of ECDH encrypt...
Parallelized Side-Channel Attack Resisted Scalar Multiplication Using q-Based Addition-Subtraction k-chains
Parallel Algorithms Elliptic Curve Cryptography Scalar Multiplication
font style='font-size:12px;'>
2016/12/9
This paper presents parallel scalar multiplication techniques for elliptic curve cryptography using q-based addition-subtraction k-chain which can also effectively resist side-channel attack. Many tec...
Recovering OpenSSL ECDSA Nonces Using the FLUSH+RELOAD Cache Side-channel Attack
Side Channel Attack Cache ECDSA
font style='font-size:12px;'>
2016/1/25
We illustrate a vulnerability introduced to elliptic curve cryptographic protocols when implemented using a function of the OpenSSL cryptographic library. For the given implementation using an ellipti...
A Statistics-based Fundamental Model for Side-channel Attack Analysis
Side-channel attack maximum likelihood estimation success rate
font style='font-size:12px;'>
2016/1/25
Side-channel attacks (SCAs) exploit leakage from the physical
implementation of cryptographic algorithms to recover the otherwise
secret information. In the last decade, popular SCAs like differenti...
Two Operands of Multipliers in Side-Channel Attack
RSA Side-Channel Attack Collision Attack
font style='font-size:12px;'>
2015/12/31
The single-shot collision attack on RSA proposed by Hanley
et al. is studied focusing on the difference between two operands
of multipliers. There are two consequences. Firstly, designing order of
...
Success through confidence: Evaluating the effectiveness of a side-channel attack
Side-channel attacks divide-and-conquer strategy
font style='font-size:12px;'>
2015/12/31
Side-channel attacks usually apply a divide-and-conquer strategy,
separately recovering different parts of the secret. Their efficiency in
practice relies on the adversary ability to precisely asses...
Counting Keys in Parallel After a Side Channel Attack
key enumeration key rank side channels
font style='font-size:12px;'>
2015/12/29
Side channels provide additional information to skilled adversaries
that reduce the effort to determine an unknown key. If sufficient
side channel information is available, identification of the sec...
Characterising and Comparing the Energy Consumption of Side Channel Attack Countermeasures and Lightweight Cryptography on Embedded Devices
energy lightweight masking
font style='font-size:12px;'>
2015/12/23
This paper uses an Instruction Set Architecture (ISA) based
statistical energy model of an ARM Cortex-M4 microprocessor to evaluate
the energy consumption of an implementation of AES with different
...
Flush+Reload: a High Resolution, Low Noise, L3 Cache Side-Channel Attack
Side Channel Attack Cache
font style='font-size:12px;'>
2014/3/11
Flush+Reload is a cache side-channel attack that monitors access to data in shared pages. In this paper we demonstrate how to use the attack to extract private encryption keys from GnuPG. The high res...