Results 11 - 20
of
1,323
Evaluation of Side-Channel Preprocessing Techniques on Cryptographic-Enabled HF and UHF RFID-Tag Prototypes
- Workshop on RFID Security — RFIDSEC 2008
, 2008
"... Abstract. Security-enabled RFID tags become more and more impor-tant and integrated in our daily life. While the tags implement crypto-graphic algorithms that are secure in a mathematical sense, their imple-mentation is not and physical side channels leak information about the secrets. This article ..."
Abstract
-
Cited by 1 (0 self)
- Add to MetaCart
Abstract. Security-enabled RFID tags become more and more impor-tant and integrated in our daily life. While the tags implement crypto-graphic algorithms that are secure in a mathematical sense, their imple-mentation is not and physical side channels leak information about the secrets. This article
Kangaroos in Side-Channel Attacks
"... Abstract. Side-channel attacks are a powerful tool to discover the cryptographic secrets of a chip or other device but only too often do they require too many traces or leave too many possible keys to explore. In this paper we show that for side channel attacks on discrete-logarithm-based systems si ..."
Abstract
-
Cited by 1 (0 self)
- Add to MetaCart
Abstract. Side-channel attacks are a powerful tool to discover the cryptographic secrets of a chip or other device but only too often do they require too many traces or leave too many possible keys to explore. In this paper we show that for side channel attacks on discrete-logarithm-based systems
Threshold implementations against side-channel attacks and glitches
- Proceedings of Information and Communications Security, 8th International Conference, ICICS 2006, number 4307 in Lecture Notes in Computer Science
, 2006
"... Abstract. Implementations of cryptographic algorithms are vulnerable to side-channel attacks. Masking techniques are employed to counter side-channel attacks that are based on multiple measurements of the same operation on different data. Most currently known techniques require new random values aft ..."
Abstract
-
Cited by 27 (2 self)
- Add to MetaCart
Abstract. Implementations of cryptographic algorithms are vulnerable to side-channel attacks. Masking techniques are employed to counter side-channel attacks that are based on multiple measurements of the same operation on different data. Most currently known techniques require new random values
Trojan Side-Channels: Lightweight Hardware Trojans through Side-Channel Engineering
- In Cryptographic Hardware and Embedded Systems - CHES 2009, volume 5747 of LNCS
, 2009
"... Abstract. The general trend in semiconductor industry to separate design from fabrication leads to potential threats from untrusted integrated circuit foundries. In particular, malicious hardware components can be covertly inserted at the foundry to implement hidden backdoors for unauthorized exposu ..."
Abstract
-
Cited by 24 (6 self)
- Add to MetaCart
small implementations of Trojan side-channels (TSC) are introduced and evaluated with respect to their feasibility on Xilinx FPGAs. Their lightweight implementations indicate a high resistance to detection by conventional test and inspection methods. Furthermore, the proposed TSCs come with a physical
Low-cost solutions for preventing simple side-channel analysis: Side-channel atomicity
- IEEE Transactions on Computers
, 2004
"... Abstract—This paper introduces simple methods to convert a cryptographic algorithm into an algorithm protected against simple side-channel attacks. Contrary to previously known solutions, the proposed techniques are not at the expense of the execution time. Moreover, they are generic and apply to vi ..."
Abstract
-
Cited by 69 (6 self)
- Add to MetaCart
. All these algorithms share the common feature that the complexity is globally unchanged compared to the corresponding unprotected implementations. Index Terms—Cryptographic algorithms, side-channel analysis, protected implementations, atomicity, exponentiation, elliptic curves. 1
Information Theoretic Evaluation of Side-Channel Resistant Logic Styles
"... Abstract. We propose to apply an information theoretic metric to the evaluation of side-channel resistant logic styles. Due to the long design and development time required for the physical evaluation of such hard-ware countermeasures, our analysis is based on simulations. Although they do not aim t ..."
Abstract
- Add to MetaCart
Abstract. We propose to apply an information theoretic metric to the evaluation of side-channel resistant logic styles. Due to the long design and development time required for the physical evaluation of such hard-ware countermeasures, our analysis is based on simulations. Although they do not aim
Understanding the Limitations and Improving the Relevance of SPICE Simulations in Side-Channel Security Evaluations
"... Abstract. Simulation is a very powerful tool for hardware designers. It generally allows the preliminary evaluation of a chip's performances before its final tape out. As security against side-channel attacks is an increasingly important issue for cryptographic devices, simulation also becomes ..."
Abstract
- Add to MetaCart
Abstract. Simulation is a very powerful tool for hardware designers. It generally allows the preliminary evaluation of a chip's performances before its final tape out. As security against side-channel attacks is an increasingly important issue for cryptographic devices, simulation also becomes
Automatic quantification of cache side-channels
- IN: PROC. 24TH INTERNATIONAL CONFERENCE ON COMPUTER-AIDED VERIFICATION (CAV
"... The latency gap between caches and main memory has been successfully exploited for recovering sensitive input to programs, such as cryptographic keys from implementation of AES and RSA. So far, there are no practical general-purpose countermeasures against this threat. In this paper we propose a no ..."
Abstract
-
Cited by 18 (2 self)
- Add to MetaCart
The latency gap between caches and main memory has been successfully exploited for recovering sensitive input to programs, such as cryptographic keys from implementation of AES and RSA. So far, there are no practical general-purpose countermeasures against this threat. In this paper we propose a
A Formal Practice-Oriented Model for the Analysis of Side-Channel Attacks
, 2006
"... Formal models that allow one to understand side-channel attacks and are also directly meaningful to practice have been an open question. Motivated by this challenge, this work proposes a practice oriented framework for the analysis of cryptographic implementations against such attacks. It is illu ..."
Abstract
-
Cited by 8 (1 self)
- Add to MetaCart
Formal models that allow one to understand side-channel attacks and are also directly meaningful to practice have been an open question. Motivated by this challenge, this work proposes a practice oriented framework for the analysis of cryptographic implementations against such attacks
Authentication Using Side-Channel Information
"... Abstract. Authentication based on cryptographic protocols is a key technology for recent security systems. However, the so-called relay at-tack where a malicious attacker tries to assume the role of the prover, is known to be a serious threat even for the cryptographically-secure au-thentication sys ..."
Abstract
- Add to MetaCart
-thentication systems. This paper proposes a new authentication method that utilizes the side channel that already exists in many authentication systems. The side channel has been studied intensively from the attacker viewpoint, and it is best known for the key-recovery attack against cryp-tographic implementations via
Results 11 - 20
of
1,323