Attacks on cryptosystems implemented via VLSI: A review

MM Sravani, SA Durai - Journal of Information Security and Applications, 2021 - Elsevier
Serious threats to the VLSI crypto devices are posed by the Side Channel Attack (SCA) that
utilizes the devices' SCI (Side Channel Information) to break the entire cryptographic …

Image encryption using value-differencing transformation and modified ZigZag transformation

Z Hua, J Li, Y Li, Y Chen - Nonlinear Dynamics, 2021 - Springer
Image encryption is an efficient technique to protect the contents of an image. However,
many existing image encryption algorithms have low efficiency and are weak to resist many …

Buffeting chaotification model for enhancing chaos and its hardware implementation

Z Zhang, H Zhu, P Ban, Y Wang… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Many shortcomings of chaos-based applications stem from the weak dynamic properties of
the chaotic maps they use. To alleviate this problem, inspired by the buffeting effect in …

Lyapunov exponent enhancement in chaotic maps with uniform distribution modulo one transformation

G Ablay - Chaos Theory and Applications, 2022 - dergipark.org.tr
Most of the chaotic maps are not suitable for chaos-based cryptosystems due to their narrow
chaotic parameter range and lacking of strong unpredictability. This work presents a …

Visual double image encryption scheme based on multilayer complex networks and wavelet transform

S Wang, L Hong, J Jiang - Nonlinear Dynamics, 2024 - Springer
This paper explores the synchronizability within a three-layer network, which has the feature
of identical topologies across layers but with three different kinds of inner coupling patterns …

Machine learning-based similarity attacks for chaos-based cryptosystems

J Liu, S Zhang, Y Luo, L Cao - IEEE Transactions on Emerging …, 2020 - ieeexplore.ieee.org
When the chaotic block cryptographic algorithms are performed on hardware devices, the
leakages of power consumption etc. are crucial information which can be used to analyse …

基于欧式距离的AES 算法模板攻击.

李志明, 唐永中 - Journal of Computer Engineering & …, 2022 - search.ebscohost.com
针对AES 算法Cache 计时模板攻击时会触发大量的Cache 失效, 容易被硬件计数器检测出来的
问题, 基于Flush+ Flush 攻击模型, 提出一种基于欧氏距离的AES 算法模板攻击方法 …

Cryptanalyzing a Feistel Chaotic Block Cryptosystem Based on Correlation Power Analysis

D Zhang, S Zhang, Y Luo, L Cao - International Journal of …, 2022 - World Scientific
Chaos-based block encryption algorithms have been proposed for years and their securities
have been tested using conventional statistical methodologies, ie frequency analysis …

A Highly Efficient Profiled Power Analysis Attack Based on Power Leakage Fitting

Y Li, S Xu, Y Luo, S Qin, S Zhang… - 2021 IEEE 23rd Int Conf …, 2021 - ieeexplore.ieee.org
Power Analysis Attack (PAA) is one of the most effective Side Channel Attack (SCA)
methods with good effect. A highly efficient profiled power analysis attack method named …