Power analysis attack against encryption devices: a comprehensive analysis of AES, DES, and BC3
Cryptography is a science of creating a secret message and it is constantly developed. The
development consists of attacking and defending the cryptography itself. Power analysis is …
development consists of attacking and defending the cryptography itself. Power analysis is …
A novel design flow for a security-driven synthesis of side-channel hardened cryptographic modules
SA Huss, O Stein - Journal of Low Power Electronics and Applications, 2017 - mdpi.com
Over the last few decades, computer-aided engineering (CAE) tools have been developed
and improved in order to ensure a short time-to-market in the chip design business. Up to …
and improved in order to ensure a short time-to-market in the chip design business. Up to …
Securing RSA against power analysis attacks through non‐uniform exponent partitioning with randomisation
HJ Mahanta, AK Khan - IET Information Security, 2018 - Wiley Online Library
This study presents an approach to compute randomised modular exponentiation through
non‐uniform exponent partitioning. The exponent has been first partitioned into multiple …
non‐uniform exponent partitioning. The exponent has been first partitioned into multiple …
Correlation power analysis distinguisher based on the correlation trace derivative
P Socha, V Miškovský, H Kubátová… - 2018 21st Euromicro …, 2018 - ieeexplore.ieee.org
Correlation power analysis (CPA) is one of the most common side channel attacks today,
posing a threat to many modern ciphers, including AES. The simplest method to extract the …
posing a threat to many modern ciphers, including AES. The simplest method to extract the …
A note on the use of margins to compare distinguishers
A Note on the Use of Margins to Compare Distinguishers | SpringerLink Skip to main content
Advertisement SpringerLink Account Menu Find a journal Publish with us Track your research …
Advertisement SpringerLink Account Menu Find a journal Publish with us Track your research …
An adaptable, modular, and autonomous side-channel vulnerability evaluator
M Zohner, M Stöttinger, SA Huss… - 2012 IEEE International …, 2012 - ieeexplore.ieee.org
Computer aided design (CAD) tools are fundamental for ensuring a short time-to-market in
nowadays chip design. However, while CAD tools support the development of efficient …
nowadays chip design. However, while CAD tools support the development of efficient …
Efficient algorithmic evaluation of correlation power analysis: Key distinguisher based on the correlation trace derivative
P Socha, V Miškovský, H Kubátová… - Microprocessors and …, 2019 - Elsevier
Correlation power analysis (CPA) is one of the most common side-channel attacks today,
posing a threat to many modern ciphers, including AES. In the final step of this attack, the …
posing a threat to many modern ciphers, including AES. In the final step of this attack, the …
Blurred Image Region Detection based on Stacked Auto-Encoder
Y Zhou, J Yang, Y Chen… - 2018 24th International …, 2018 - ieeexplore.ieee.org
In this study, we address a fundamental yet challenging problem on detection and
classification of blurred regions in partially blurred images. we propose to learn a latent …
classification of blurred regions in partially blurred images. we propose to learn a latent …
[图书][B] Improved first-order power analysis attacks on low entropy masking schemes
BG Cozzens - 2015 - search.proquest.com
Masking countermeasures are effective methods of protecting encryption algorithms from
side-channel attacks; however, a masked cipher incurs a significant overhead in …
side-channel attacks; however, a masked cipher incurs a significant overhead in …