搜索结果: 1-12 共查到“密码学 Template Attacks”相关记录12条 . 查询时间(0.093 秒)
Breach the Gate: Exploiting Observability for Fault Template Attacks on Block Ciphers
Fault attacks PRESEN
font style='font-size:12px;'>
2019/8/19
Fault attacks (FA) are one of the potent practical threats to modern cryptographic implementations. Over the years the FA tech- niques have evolved, gradually moving towards the exploitation of device...
Deep Learning vs Template Attacks in front of fundamental targets: experimental study
Side channel deep dearning template attack
font style='font-size:12px;'>
2018/12/24
This study compares the experimental results of Template Attacks (TA) and Deep Learning (DL) techniques called Multi Layer Perceptron (MLP) and Convolutional Neural Network (CNN), concurrently in fron...
Improved Brute-Force Search Strategies for Single-Trace and Few-Traces Template Attacks on the DES Round Keys
DES TDES Template Attack
font style='font-size:12px;'>
2018/11/7
We present an improved search strategy for a template attack on the secret DES key of a widely-used smart card, which is based on a Common-Criteria certified chip. We use the logarithm of the probabil...
Brute–Force Search Strategies for Single–Trace and Few–Traces Template Attacks on the DES Round Keys of a Recent Smart Card
DES side-channel attack DES key schedule
font style='font-size:12px;'>
2017/6/28
Recently, a new template attack on the DES key scheduling was demonstrated that allows recovery of a sufficiently large portion of the DES key of a widely deployed certified smart card chip using a si...
How to Choose Interesting Points for Template Attacks?
Side-Channel Attacks Power Analysis Attacks Profiled Side-Channel Attacks
font style='font-size:12px;'>
2016/1/9
Template attacks are widely accepted to be the most powerful
side-channel attacks from an information theoretic point of view.
For template attacks, many papers suggested a guideline for choosing
i...
Template Attacks on Different Devices
side-channel attacks template attacks multivariate analysis
font style='font-size:12px;'>
2016/1/9
Template attacks remain a most powerful side-channel technique
to eavesdrop on tamper-resistant hardware. They use a profiling
step to compute the parameters of a multivariate normal distribution
f...
Template Attacks Based On Priori Knowledge
Side-Channel Attacks Power Analysis Attacks
font style='font-size:12px;'>
2016/1/8
Template attacks are widely accepted as the strongest sidechannel
attacks from the information theoretic point of view, and they
can be used as a very powerful tool to evaluate the physical security...
How to Choose Interesting Points for Template Attacks More Effectively
Side-Channel Attacks Power Analysis Attacks Template Attacks
font style='font-size:12px;'>
2016/1/6
Template attacks are widely accepted to be the most powerful
side-channel attacks from an information theoretic point of view. For
template attacks to be practical, one needs to choose some special ...
Dismantling real-world ECC with Horizontal and Vertical Template Attacks
Side-channel analysis horizontal leakage vertical leakage
font style='font-size:12px;'>
2015/12/22
Recent side-channel attacks on elliptic curve algorithms have shown that the security of these cryptosystems is a matter of serious concern. The development of techniques in the area of Template Attac...
Efficient Template Attacks
template attack fair evaluation
font style='font-size:12px;'>
2014/3/6
Template attacks remain a powerful side-channel technique to eavesdrop on tamper-resistant hardware. They model the probability distribution of leaking signals and noise to guide a search for secret d...
Template Attacks on ECDSA
Template Attacks ECDSA SPA attacks
font style='font-size:12px;'>
2009/6/3
Template attacks have been considered exclusively in the
context of implementations of symmetric cryptographic algorithms on
8-bit devices. Within these scenarios, they have proven to be the most
p...
Template Attacks with a Power Model— Illustration on the Side-Channel Cryptanalysis of an Unprotected DES Crypto-Processor —
Side-Channel Cryptanalysis Unprotected DES
font style='font-size:12px;'>
2008/5/21
Abstract
This article analyses some properties of the template attack. Examples come from
attacks against an unprotected ASIC implementation of DES. The principal components
analysis (PCA) is use...