搜索结果: 1-15 共查到“军事学 power analysis”相关记录43条 . 查询时间(0.152 秒)
On-Device Power Analysis Across Hardware Security Domains
side-channel power analysis cross-domain
2019/6/12
Side-channel power analysis is a powerful method of breaking secure cryptographic algorithms, but typically power analysis is considered to require specialized measurement equipment on or near the dev...
Remote Inter-Chip Power Analysis Side-Channel Attacks at Board-Level
side-channel analysis FPGA
2018/11/13
The current practice in board-level integration is to incorporate chips and components from numerous vendors. A fully trusted supply chain for all used components and chipsets is an important, yet ext...
Assessing the Feasibility of Single Trace Power Analysis of Frodo
Side-channel analysis LWE Frodo
2018/7/18
Lattice-based schemes are among the most promising post-quantum schemes, yet the effect of both parameter and implementation choices on their side-channel resilience is still poorly understood. Aysu e...
Differential Power Analysis of XMSS and SPHINCS
Post-quantum cryptography Hash-based signatures DPA
2018/7/16
Quantum computing threatens conventional public-key cryptography. In response, standards bodies such as NIST increasingly focus on post-quantum cryptography. In particular, hash-based signature scheme...
Comparison of Cost of Protection Against Differential Power Analysis of Selected Authenticated Ciphers
Cryptography authenticated cipher field programmable gate array
2018/4/17
Authenticated ciphers, like all physical implementations of cryptography, are vulnerable to side-channel attacks, including differential power analysis (DPA). The t-test leakage detection methodology ...
Hardware Trojans have gained increasing interest during the past few years. Undeniably, the detection of such malicious designs needs a deep understanding of how they can practically be built and deve...
Entropy Reduction for the Correlation-Enhanced Power Analysis Collision Attack
AES Side Channel Attacks
2017/11/13
Side Channel Attacks are an important attack vector on secure AES implementations. The Correlation-Enhanced Power Analysis Collision Attack by Moradi et al. [13] is a powerful collision attack that ex...
Correlation Power Analysis Attack against STT-MRAM Based Cyptosystems
Correlation power analysis attack Spin-transfer torque magnetic RAM MICKEY-128 2.0 stream cipher
2017/5/15
Emerging technologies such as Spin-transfer torque magnetic random-access memory (STT-MRAM) are considered potential candidates for implementing low-power, high density storage systems. The vulnerabil...
Evolving S-Boxes with Reduced Differential Power Analysis Susceptibility
AES block ciphers S-box
2016/12/26
Differential power analysis targets S-boxes to break ciphers that resist cryptanalysis. We relax cryptanalytic constraints to lower S-box leakage, as quantified by the transparency order. We apply gen...
A Unified Metric for Quantifying Information Leakage of Cryptographic Devices under Power Analysis Attacks
Information leakage amount side-channel security power analysis attack
2016/3/18
To design effective countermeasures for cryptosystems against side-channel power analysis attacks, the evaluation of the system leakage has to be lightweight and often times at the early stage like on...
Algorithmic Countermeasures Against Fault Attacks and Power Analysis for RSA-CRT
Bellcore attack RSA-CRT modular exponentiation
2016/3/4
In this work, we analyze all existing RSA-CRT countermeasures against the Bellcore attack
that use binary self-secure exponentiation algorithms. We test their security against a powerful
adversary b...
Differential Power Analysis of a McEliece Cryptosystem
Differential Power Analysis McEliece Cryptosystem QC-MDPC Codes
2016/1/8
This work presents the first differential power analysis of an implementation of the McEliece
cryptosystem. Target of this side-channel attack is a state-of-the-art FPGA implementation of the ef-
fi...
Power Analysis Attack on Hardware Implementation of MAC-Keccak on FPGAs
Department of Electrical and Computer Engineering, Northeastern University
2016/1/6
Keccak is the hash function selected by NIST as the new SHA-3 standard. Keccak
is built on Sponge construction and it provides a new MAC function called MAC-Keccak. These
new algorithms have raised ...
Side-channel Power Analysis of Different Protection Schemes Against Fault Attacks on AES
AES differential fault analysis side-channel attacks
2016/1/6
A protection circuit can be added into cryptographic systems to detect both soft errors
and injected faults required by Differential Fault Analysis (DFA) attacks. While such protection
can improve t...
Side Channel Attacks (SCA) using power measurements are a known method of breaking cryptographic algorithms such as AES. Published research into attacks on AES frequently target only AES-128, and ofte...