Side-channel attacks

Results: 102



#Item
81Differential cryptanalysis / Block cipher / Weak key / Ciphertext / Cryptanalysis / Advanced Encryption Standard / Key / Cryptographic protocols / Cryptographically secure pseudorandom number generator / Cryptography / Key management / Cryptographic nonce

On the Security of Fresh Re-keying to Counteract Side-Channel and Fault Attacks Christoph Dobraunig, Maria Eichlseder, Stefan Mangard, and Florian Mendel IAIK, Graz University of Technology, Austria Abstract. At AFRICAC

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-01-15 01:45:03
82Workstation / Cryptography / DPA / Data visualization / EMV / Science / Computer security / Power analysis / Espionage / Side channel attack / FIPS 140

PRODUCT BRIEF DPA Workstation™ Testing Platform The DPA Workstation testing platform evaluates device resistance to side-channel attacks, including SPA, DPA, HO-DPA, and EMA. Side-channel attacks are low-cost, non-inv

Add to Reading List

Source URL: www.rambus.com

Language: English - Date: 2014-09-18 17:21:58
83Public-key cryptography / RSA / Side channel attack / Laptop / GNU Privacy Guard / Personal computer / Cryptography / Classes of computers / Electronic commerce

Security event to learn about side-channel attacks on PCs

Add to Reading List

Source URL: phys.org

Language: English - Date: 2014-11-27 04:07:13
84Coding theory / Advanced Encryption Standard / Side channel attack / Block cipher / Ciphertext / Known-plaintext attack / Hamming weight / Cryptanalysis / Cube attack / Cryptography / Espionage / Cyberwarfare

Error-Tolerant Algebraic Side-Channel Attacks Using BEE Ling Song1,2 , Lei Hu1,2 , Siwei Sun1,2 , Zhang Zhang2 ,Danping Shi1,2 , Ronglin Hao1,3 1 State Key Laboratory of Information Security,

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-09-01 04:34:57
85Coding theory / Matrix theory / Matrices / Linear code / Generator matrix / Projection / Invertible matrix / Trace / Rank / Algebra / Mathematics / Linear algebra

Orthogonal Direct Sum Masking A Smartcard Friendly Computation Paradigm in a Code, with Builtin Protection against Side-Channel and Fault Attacks Julien BRINGER1 , Claude CARLET2 , Herv´e CHABANNE1,3 , Sylvain GUILLEY3,

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-08-28 19:42:22
86Summary statistics / Normal distribution / Multivariate normal distribution / Covariance matrix / Central limit theorem / Covariance / Sample mean and sample covariance / Statistics / Covariance and correlation / Matrices

How to Estimate the Success Rate of Higher-Order Side-Channel Attacks Victor Lomn´e1 , Emmanuel Prouff1 , Matthieu Rivain2 , Thomas Roche1 , and Adrian Thillard1,3 1

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-09-11 11:22:50
87Side channel attack / Advanced Encryption Standard / Espionage / Algorithm / Block cipher / Fault injection / Applied mathematics / Cryptography / Theoretical computer science / Software testing

A Unified Formalism for Physical Attacks H´el`ene Le Bouder1,2 , Ronan Lashermes1,3 , Yanis Linge4 , Bruno Robisson1,3 , and Assia Tria1,3 2 1

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-09-03 11:07:10
88Ciphertext / CPU cache / Side channel attack / AES implementations / Cryptography / Advanced Encryption Standard / Chosen-plaintext attack

Cache Attacks and Countermeasures: the Case of AES (Extended Version) revised[removed]Dag Arne Osvik1 , Adi Shamir2 and Eran Tromer2 1

Add to Reading List

Source URL: www.tau.ac.il

Language: English - Date: 2005-11-21 15:40:56
89Multivariate statistics / Singular value decomposition / Data analysis / Algebra of random variables / Covariance and correlation / Principal component analysis / Multivariate normal distribution / Linear discriminant analysis / Covariance / Statistics / Algebra / Linear algebra

Efficient Template Attacks Omar Choudary and Markus G. Kuhn Computer Laboratory, University of Cambridge [removed] Abstract. Template attacks remain a powerful side-channel technique

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2014-08-04 11:23:40
90Side channel attack / Luc / Cryptography Research / RSA / Fault injection / Cryptography / Power analysis / Institute for Applied Information Processing and Communications

The Non-Invasive Attack Testing Workshop (NIAT[removed]Accepted Papers Choosing Distinguishers for Differential Power Analysis Attacks Elisabeth Oswald, Luke Mather, and Carolyn Whitnall University of Bristol, Department o

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2011-09-13 14:29:00
UPDATE