標題: Titlebook: Constructive Side-Channel Analysis and Secure Design; 5th International Wo Emmanuel Prouff Conference proceedings 2014 Springer Internation [打印本頁] 作者: 拼圖游戲 時間: 2025-3-21 17:44
書目名稱Constructive Side-Channel Analysis and Secure Design影響因子(影響力)
書目名稱Constructive Side-Channel Analysis and Secure Design影響因子(影響力)學科排名
書目名稱Constructive Side-Channel Analysis and Secure Design網(wǎng)絡公開度
書目名稱Constructive Side-Channel Analysis and Secure Design網(wǎng)絡公開度學科排名
書目名稱Constructive Side-Channel Analysis and Secure Design被引頻次
書目名稱Constructive Side-Channel Analysis and Secure Design被引頻次學科排名
書目名稱Constructive Side-Channel Analysis and Secure Design年度引用
書目名稱Constructive Side-Channel Analysis and Secure Design年度引用學科排名
書目名稱Constructive Side-Channel Analysis and Secure Design讀者反饋
書目名稱Constructive Side-Channel Analysis and Secure Design讀者反饋學科排名
作者: preservative 時間: 2025-3-21 23:42
Collision-Correlation Attack Against a First-Order Masking Scheme for MAC Based on SHA-3,t masking scheme proposed by the designers. We show that this masking scheme is vulnerable to a non-linear collision-correlation attack. Our attack advantageously needs no assumption on device-depending parameters, and hence constitutes an interesting alternative to second-order differential analysis.作者: Individual 時間: 2025-3-22 03:43 作者: opalescence 時間: 2025-3-22 06:27 作者: Fortuitous 時間: 2025-3-22 09:52
Carlos Zozaya-Gorostiza,Luis. F. EstradaA implementation which makes use of the knowledge of the public exponent. In particular, we investigate an efficient method using only 4 private key parameters out of 5 and we also propose a free message blinding method to reinforce side-channel resistance.作者: 稀釋前 時間: 2025-3-22 15:25
Satwinder Jit Singh,Anindya Chatterjeed attack combines the leakage of several samples over the segments of the exponentiation in order to recover the entire exponent. We demonstrate how to find the points of interest using trace pre-processing and clustering algorithms. This attack can recover the exponent using a single trace.作者: 稀釋前 時間: 2025-3-22 18:35 作者: 吹氣 時間: 2025-3-22 21:23 作者: GORGE 時間: 2025-3-23 02:10
Attacking Randomized Exponentiations Using Unsupervised Learning,d attack combines the leakage of several samples over the segments of the exponentiation in order to recover the entire exponent. We demonstrate how to find the points of interest using trace pre-processing and clustering algorithms. This attack can recover the exponent using a single trace.作者: Coronary-Spasm 時間: 2025-3-23 05:48
Adjusting Laser Injections for Fully Controlled Faults,zation of laser fault injections with implementations of the PMOS and NMOS areas in the silicon substrate. This illustrates to what extent laser beams can be used to monitor the bits stored within registers, with adverse consequences in terms of security evaluation of integrated circuits.作者: Incumbent 時間: 2025-3-23 10:14
0302-9743 ance, in April 2014. The 20 revised full papers presented together with two invited talks were carefully selected from 51 submissions and collect truly existing results in cryptographic engineering, from concepts to artifacts, from software to hardware, from attack to countermeasure..978-3-319-10174作者: COKE 時間: 2025-3-23 16:40 作者: 平項山 時間: 2025-3-23 22:00
,Common Points on Elliptic Curves: The Achilles’ Heel of Fault Attack Countermeasures,t well known countermeasures. After introducing the notion of ., we exhibit a new fault-injection attack that breaks state-of-the-art secured implementations. Our new attack is particularly dangerous since no control on the injected error is required and only one fault is sufficient to retrieve the secret.作者: 上釉彩 時間: 2025-3-23 22:39
Formal Support Methods in Design: Discussionn metric that might obscure the actual performance and favor one distinguisher over the other. Furthermore, we formalize the link between the confusion coefficient and differential cryptanalysis, which shows that the stronger an S-box is resistant to differential attacks the weaker it is against side-channel attacks, and ..作者: GOAD 時間: 2025-3-24 02:43
Formal Concept Analysis in Designtions. Building on a secure version of a binary addition algorithm (namely, the .-.-and-double method), we show that conversions from Boolean masking to arithmetic masking can be avoided. We present an application of the new algorithm to the XTEA block-cipher.作者: Lumbar-Spine 時間: 2025-3-24 07:04 作者: sparse 時間: 2025-3-24 14:14
Advances in Fractional Calculusd the resulting attack. We also propose a way to proceed in a noisy context using smart distances. We validate our proposition by practical results on an AES128 software implemented on a ATMega2561 and on the DPAContest v4?[.].作者: 領巾 時間: 2025-3-24 16:34
T. Taira,T. Ochiai,S. Goto,T. Horientire design (hardware and software) is open-source, and maintained in a publicly available repository. Several long example capture traces are provided for researchers looking to evaluate standard cryptographic implementations.作者: genesis 時間: 2025-3-24 19:23 作者: Anal-Canal 時間: 2025-3-25 01:42
A Theoretical Study of Kolmogorov-Smirnov Distinguishers,n metric that might obscure the actual performance and favor one distinguisher over the other. Furthermore, we formalize the link between the confusion coefficient and differential cryptanalysis, which shows that the stronger an S-box is resistant to differential attacks the weaker it is against side-channel attacks, and ..作者: epidermis 時間: 2025-3-25 05:58 作者: Glucocorticoids 時間: 2025-3-25 10:31 作者: HERTZ 時間: 2025-3-25 14:21 作者: 小說 時間: 2025-3-25 16:22
ChipWhisperer: An Open-Source Platform for Hardware Embedded Security Research,entire design (hardware and software) is open-source, and maintained in a publicly available repository. Several long example capture traces are provided for researchers looking to evaluate standard cryptographic implementations.作者: 胖人手藝好 時間: 2025-3-25 23:19
Studying Leakages on an Embedded Biometric System Using Side Channel Analysis,eve the reference fingerprint. On the other hand, we illustrate that reconstructing the fingerprint remains not trivial and we give some simple countermeasures to protect further the comparison algorithm.作者: Spinal-Tap 時間: 2025-3-26 01:59 作者: 凌辱 時間: 2025-3-26 06:45
Pragmatism vs. Elegance: Comparing Two Approaches to Simple Power Attacks on AES, complexity (i.e. the number of operations applied to the side-channel traces). In the specific example of Simple Power Analysis (SPA) attacks on the Advanced Encryption Standard (AES), two approaches can be found in the literature, one which is a pragmatic approach that involves basic techniques su作者: 廚房里面 時間: 2025-3-26 10:02 作者: 平躺 時間: 2025-3-26 15:15
On the Use of RSA Public Exponent to Improve Implementation Efficiency and Side-Channel Resistance,ault Injection into account. From that time, many side-channel and fault countermeasures have been proposed to reach a double goal: provide a high level of security while having the smallest impact on performance and memory consumption. In the particular case of RSA, the knowledge of the public expo作者: Wernickes-area 時間: 2025-3-26 18:02 作者: Myelin 時間: 2025-3-26 23:10
On Adaptive Bandwidth Selection for Efficient MIA, (MIA) main interest is its claimed genericity. However, it requires the estimation of various probability density functions (PDF), which is a task that involves the complicated problem of selecting tuning parameters. This problem could be the cause of the lower efficiency of MIA that has been repor作者: 全等 時間: 2025-3-27 01:52 作者: 滴注 時間: 2025-3-27 08:44
Support Vector Machines for Improved IP Detection with Soft Physical Hash Functions,tructive, i.e. key recovery attacks against cryptographic implementations. More recently, it has also been considered constructively, in the context of intellectual property protection/detection, e.g. through the use of side-channel based watermarks or soft physical hash functions. The latter soluti作者: 燈絲 時間: 2025-3-27 09:29 作者: crescendo 時間: 2025-3-27 17:25 作者: Definitive 時間: 2025-3-27 20:58
Template Attacks on Different Devices,ameters of a multivariate normal distribution from a training device and an attack step in which the parameters obtained during profiling are used to infer some secret value (e.g. cryptographic key) on a target device. Evaluations using the same device for both profiling and attack can miss practica作者: 妨礙議事 時間: 2025-3-27 23:54 作者: Type-1-Diabetes 時間: 2025-3-28 04:47
A Multiple-Fault Injection Attack by Adaptive Timing Control Under Black-Box Conditions and a Countthod can be conducted under the black-box condition that the detailed cryptographic software running on the target device is not known to attackers. In addition, the proposed method is non-invasive, without the depackaging required in previous works, since such adaptive fault injection is performed 作者: 繁榮地區(qū) 時間: 2025-3-28 09:47
Adjusting Laser Injections for Fully Controlled Faults,In this paper we describe how the fine tuning of a laser source has been used to characterize, set and reset the state of registers in a 90?nm chip. By adjusting the incident laser beam’s location, it is possible to choose to switch any register value from ‘.’ to ‘.’ or vice-versa by targeting the P作者: Ige326 時間: 2025-3-28 13:32
ChipWhisperer: An Open-Source Platform for Hardware Embedded Security Research,s software. The highly modular design allows use of the hardware and software with a variety of existing systems. The hardware uses a synchronous capture method which greatly reduces the required sample rate, while also reducing the data storage requirement, and improving synchronization of traces. 作者: impale 時間: 2025-3-28 15:32
Verifying Software Integrity in Embedded Systems: A Side Channel Approach,tegrity of the software is very important as it is the component that controls what the hardware does through its instructions. Although there exist a number of software integrity verification techniques, they often fail to work in embedded environment. One main reason is, the memory read protection作者: 我不明白 時間: 2025-3-28 21:25 作者: 羊欄 時間: 2025-3-29 00:48
Constructive Side-Channel Analysis and Secure Design978-3-319-10175-0Series ISSN 0302-9743 Series E-ISSN 1611-3349 作者: 新星 時間: 2025-3-29 05:44 作者: 描繪 時間: 2025-3-29 07:51 作者: reaching 時間: 2025-3-29 12:11
John S. Gero,Vladimir A. Kazakov complexity (i.e. the number of operations applied to the side-channel traces). In the specific example of Simple Power Analysis (SPA) attacks on the Advanced Encryption Standard (AES), two approaches can be found in the literature, one which is a pragmatic approach that involves basic techniques su作者: Ingredient 時間: 2025-3-29 17:56
Formal Concept Analysis in Designor symmetric cryptosystems, two techniques are commonly used: Boolean masking and arithmetic masking. Conversion methods have been proposed for switching from Boolean masking to arithmetic masking, and conversely. The way conversion is applied depends on the combination of arithmetic and Boolean/log作者: thyroid-hormone 時間: 2025-3-29 21:15 作者: phytochemicals 時間: 2025-3-30 00:33
Mary Lou Maher,Josiah Poon,Sylvie Boulangercks mined the security of such implementations. Several countermeasures have been devised to thwart these threats, so that simple attacks on state-of-the-art secured implementations seem unlikely. We took up the challenge and show that a simple fault attack using a very relaxed fault model can defea作者: Pageant 時間: 2025-3-30 06:04
https://doi.org/10.1007/978-981-32-9417-2 (MIA) main interest is its claimed genericity. However, it requires the estimation of various probability density functions (PDF), which is a task that involves the complicated problem of selecting tuning parameters. This problem could be the cause of the lower efficiency of MIA that has been repor作者: hazard 時間: 2025-3-30 09:59
Ramesh Kuppuswamy,Brett Christie-Taylorn the leakage behaviour. Previous work identified some shortcomings of generic DPA attacks when attacking injective targets (such as the AES Sbox output). In this paper, we focus on that particular property of generic DPA attacks and explain limitations, workarounds and advantages. Firstly we show t作者: 確定的事 時間: 2025-3-30 15:11 作者: olfction 時間: 2025-3-30 19:02 作者: 工作 時間: 2025-3-30 22:08 作者: acolyte 時間: 2025-3-31 02:02
Riesz Potentials as Centred Derivativesameters of a multivariate normal distribution from a training device and an attack step in which the parameters obtained during profiling are used to infer some secret value (e.g. cryptographic key) on a target device. Evaluations using the same device for both profiling and attack can miss practica作者: 建筑師 時間: 2025-3-31 08:22 作者: extinguish 時間: 2025-3-31 12:59
T. Taira,T. Ochiai,S. Goto,T. Horithod can be conducted under the black-box condition that the detailed cryptographic software running on the target device is not known to attackers. In addition, the proposed method is non-invasive, without the depackaging required in previous works, since such adaptive fault injection is performed 作者: 不適 時間: 2025-3-31 16:10
T. Taira,T. Ochiai,S. Goto,T. HoriIn this paper we describe how the fine tuning of a laser source has been used to characterize, set and reset the state of registers in a 90?nm chip. By adjusting the incident laser beam’s location, it is possible to choose to switch any register value from ‘.’ to ‘.’ or vice-versa by targeting the P作者: defray 時間: 2025-3-31 20:56 作者: deface 時間: 2025-4-1 01:24
https://doi.org/10.1007/978-1-4419-8859-1tegrity of the software is very important as it is the component that controls what the hardware does through its instructions. Although there exist a number of software integrity verification techniques, they often fail to work in embedded environment. One main reason is, the memory read protection作者: 取回 時間: 2025-4-1 04:45 作者: expository 時間: 2025-4-1 08:50 作者: jarring 時間: 2025-4-1 11:06 作者: 致命 時間: 2025-4-1 17:59
A Note on the Use of Margins to Compare Distinguishers,Relative distinguishing margins are becoming a popular measure for comparing distinguishers. This paper presents some examples that show that this measure, although informative and intuitively sound, should not be taken alone as benchmark of distinguishers.作者: anarchist 時間: 2025-4-1 21:18 作者: overshadow 時間: 2025-4-2 00:52