Side-channel attacks

Results: 102



#Item
71Multivariate statistics / Singular value decomposition / Data analysis / Algebra of random variables / Covariance and correlation / Principal component analysis / Multivariate normal distribution / Linear discriminant analysis / Covariance / Statistics / Algebra / Linear algebra

Efficient Template Attacks Omar Choudary and Markus G. Kuhn Computer Laboratory, University of Cambridge Abstract. Template attacks remain a powerful side-channel technique

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2014-08-04 11:23:40
72Power analysis / Side channel attack / Timing attack / Tamper resistance / RSA / Differential fault analysis / KeeLoq / Computer security compromised by hardware failure / Cryptography / Espionage / Public-key cryptography

Hardware Attacks on Cryptographic Devices Implementation Attacks on Embedded Systems and Other Portable Hardware Jem Berkes University of Waterloo Prepared for ECE 628, Winter 2006

Add to Reading List

Source URL: www.berkes.ca

Language: English - Date: 2006-04-11 01:44:56
73Block ciphers / CPU cache / Ciphertext / Side channel attack / Lookup table / ICE / UES / Cryptanalysis / Cellular Message Encryption Algorithm / Cryptography / Data Encryption Standard / Advanced Encryption Standard

Efficient Cache Attacks on AES, and Countermeasures Eran Tromer1 2 , Dag Arne Osvik3 and Adi Shamir2 1 Computer Science and Artificial Intelligence Laboratory, Massachusetts Institute of Technology,

Add to Reading List

Source URL: www.cs.tau.ac.il

Language: English - Date: 2009-06-25 15:56:23
74Matrix theory / Linear algebra / Abstract algebra / Eigenvalues and eigenvectors / Principal component analysis / Matrix / Eigendecomposition of a matrix / Perron–Frobenius theorem / Algebra / Mathematics / Singular value decomposition

Template Attacks with a Power Model — Illustration on the Side-Channel Cryptanalysis of an Unprotected DES Crypto-Processor — Moulay Abdelaziz EL AABID Sylvain GUILLEY Philippe HOOGVORST

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2007-12-06 09:13:27
75Introductory physics / Mechanics / Cryptographic hash functions / Collision / AES implementations / Nonlinear system / Cryptography / Advanced Encryption Standard / Physics

Algebraic Side-Channel Collision Attacks on AES Andrey Bogdanov1 and Andrey Pyshkin2 1 Chair for Communication Security

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2007-12-20 06:12:45
76Elliptic curve cryptography / Reconfigurable computing / Power analysis / Side channel attack / Multiplication / Field-programmable gate array / Advanced Encryption Standard / Elliptic curve point multiplication / Xilinx / Cryptography / Mathematics / Espionage

Individualizing Electrical Circuits of Cryptographic Devices as a Means to Hinder Tampering Attacks Zoya Dyka, Thomas Basmer, Christian Wittke and Peter Langendoerfer System dept., IHP Frankfurt(Oder), Germany

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-05-08 10:18:14
77Cyberwarfare / Side channel attack / Power analysis / Cryptographic engineering / Timing attack / Randomness / Lecture Notes in Computer Science / Computer security / Espionage / Cryptography / Security

Formal Study of a Countermeasure Against Side-Channel Attacks Location. SEN group of the COMELEC department at Telecom ParisTech (37 rue Dareau, 75014, Paris). This internship can lead to a PhD thesis. Advisors.

Add to Reading List

Source URL: perso.telecom-paristech.fr

Language: English - Date: 2015-01-06 18:40:44
78RSA / Timing attack / Montgomery reduction / OpenSSL / Cipher / David Brumley / Multiplication algorithm / Side channel attack / Cryptography / Public-key cryptography / Electronic commerce

Remote Timing Attacks are Practical David Brumley Stanford University [removed] Abstract Timing attacks are usually used to attack weak computing devices such as smartcards. We show that timing

Add to Reading List

Source URL: users.ece.cmu.edu

Language: English - Date: 2014-05-29 15:38:01
79Security / Computer keyboard / TEMPEST / Side channel attack / Lasers / Espionage / Surveillance / National security

CanSecWest/core09 March 16-20, 2009 Sniffing Keystrokes With Lasers/Voltmeters Side Channel Attacks Using Optical Sampling Of Mechanical Energy And Power Line Leakage

Add to Reading List

Source URL: cansecwest.com

Language: English - Date: 2009-03-26 22:55:55
80Statistical classification / Ensemble learning / Support vector machine / Classifier / K-nearest neighbor algorithm / Random forest / Cross-validation / Side channel attack / Machine learning / Statistics / Artificial intelligence

Reliable Information Extraction for Single Trace Attacks Valentina Banciu, Elisabeth Oswald, Carolyn Whitnall Department of Computer Science, University of Bristol MVB, Woodland Road, Bristol BS8 1UB, UK Email: {Valentin

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-01-19 06:56:44
UPDATE