Attacks on cryptosystems implemented via VLSI: A review
MM Sravani, SA Durai - Journal of Information Security and Applications, 2021 - Elsevier
Serious threats to the VLSI crypto devices are posed by the Side Channel Attack (SCA) that
utilizes the devices' SCI (Side Channel Information) to break the entire cryptographic …
utilizes the devices' SCI (Side Channel Information) to break the entire cryptographic …
Image encryption using value-differencing transformation and modified ZigZag transformation
Image encryption is an efficient technique to protect the contents of an image. However,
many existing image encryption algorithms have low efficiency and are weak to resist many …
many existing image encryption algorithms have low efficiency and are weak to resist many …
Buffeting chaotification model for enhancing chaos and its hardware implementation
Many shortcomings of chaos-based applications stem from the weak dynamic properties of
the chaotic maps they use. To alleviate this problem, inspired by the buffeting effect in …
the chaotic maps they use. To alleviate this problem, inspired by the buffeting effect in …
Lyapunov exponent enhancement in chaotic maps with uniform distribution modulo one transformation
G Ablay - Chaos Theory and Applications, 2022 - dergipark.org.tr
Most of the chaotic maps are not suitable for chaos-based cryptosystems due to their narrow
chaotic parameter range and lacking of strong unpredictability. This work presents a …
chaotic parameter range and lacking of strong unpredictability. This work presents a …
Visual double image encryption scheme based on multilayer complex networks and wavelet transform
S Wang, L Hong, J Jiang - Nonlinear Dynamics, 2024 - Springer
This paper explores the synchronizability within a three-layer network, which has the feature
of identical topologies across layers but with three different kinds of inner coupling patterns …
of identical topologies across layers but with three different kinds of inner coupling patterns …
Machine learning-based similarity attacks for chaos-based cryptosystems
When the chaotic block cryptographic algorithms are performed on hardware devices, the
leakages of power consumption etc. are crucial information which can be used to analyse …
leakages of power consumption etc. are crucial information which can be used to analyse …
基于欧式距离的AES 算法模板攻击.
李志明, 唐永中 - Journal of Computer Engineering & …, 2022 - search.ebscohost.com
针对AES 算法Cache 计时模板攻击时会触发大量的Cache 失效, 容易被硬件计数器检测出来的
问题, 基于Flush+ Flush 攻击模型, 提出一种基于欧氏距离的AES 算法模板攻击方法 …
问题, 基于Flush+ Flush 攻击模型, 提出一种基于欧氏距离的AES 算法模板攻击方法 …
Cryptanalyzing a Feistel Chaotic Block Cryptosystem Based on Correlation Power Analysis
D Zhang, S Zhang, Y Luo, L Cao - International Journal of …, 2022 - World Scientific
Chaos-based block encryption algorithms have been proposed for years and their securities
have been tested using conventional statistical methodologies, ie frequency analysis …
have been tested using conventional statistical methodologies, ie frequency analysis …
A Highly Efficient Profiled Power Analysis Attack Based on Power Leakage Fitting
Y Li, S Xu, Y Luo, S Qin, S Zhang… - 2021 IEEE 23rd Int Conf …, 2021 - ieeexplore.ieee.org
Power Analysis Attack (PAA) is one of the most effective Side Channel Attack (SCA)
methods with good effect. A highly efficient profiled power analysis attack method named …
methods with good effect. A highly efficient profiled power analysis attack method named …