• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 11 - 20 of 1,323
Next 10 →

Evaluation of Side-Channel Preprocessing Techniques on Cryptographic-Enabled HF and UHF RFID-Tag Prototypes

by Thomas Plos, Michael Hutter, Martin Feldhofer - Workshop on RFID Security — RFIDSEC 2008 , 2008
"... Abstract. Security-enabled RFID tags become more and more impor-tant and integrated in our daily life. While the tags implement crypto-graphic algorithms that are secure in a mathematical sense, their imple-mentation is not and physical side channels leak information about the secrets. This article ..."
Abstract - Cited by 1 (0 self) - Add to MetaCart
Abstract. Security-enabled RFID tags become more and more impor-tant and integrated in our daily life. While the tags implement crypto-graphic algorithms that are secure in a mathematical sense, their imple-mentation is not and physical side channels leak information about the secrets. This article

Kangaroos in Side-Channel Attacks

by Tanja Lange, Christine Van Vredendaal, Marnix Wakker
"... Abstract. Side-channel attacks are a powerful tool to discover the cryptographic secrets of a chip or other device but only too often do they require too many traces or leave too many possible keys to explore. In this paper we show that for side channel attacks on discrete-logarithm-based systems si ..."
Abstract - Cited by 1 (0 self) - Add to MetaCart
Abstract. Side-channel attacks are a powerful tool to discover the cryptographic secrets of a chip or other device but only too often do they require too many traces or leave too many possible keys to explore. In this paper we show that for side channel attacks on discrete-logarithm-based systems

Threshold implementations against side-channel attacks and glitches

by Svetla Nikova, Christian Rechberger, Vincent Rijmen - Proceedings of Information and Communications Security, 8th International Conference, ICICS 2006, number 4307 in Lecture Notes in Computer Science , 2006
"... Abstract. Implementations of cryptographic algorithms are vulnerable to side-channel attacks. Masking techniques are employed to counter side-channel attacks that are based on multiple measurements of the same operation on different data. Most currently known techniques require new random values aft ..."
Abstract - Cited by 27 (2 self) - Add to MetaCart
Abstract. Implementations of cryptographic algorithms are vulnerable to side-channel attacks. Masking techniques are employed to counter side-channel attacks that are based on multiple measurements of the same operation on different data. Most currently known techniques require new random values

Trojan Side-Channels: Lightweight Hardware Trojans through Side-Channel Engineering

by Lang Lin, Markus Kasper, Christof Paar, Wayne Burleson - In Cryptographic Hardware and Embedded Systems - CHES 2009, volume 5747 of LNCS , 2009
"... Abstract. The general trend in semiconductor industry to separate design from fabrication leads to potential threats from untrusted integrated circuit foundries. In particular, malicious hardware components can be covertly inserted at the foundry to implement hidden backdoors for unauthorized exposu ..."
Abstract - Cited by 24 (6 self) - Add to MetaCart
small implementations of Trojan side-channels (TSC) are introduced and evaluated with respect to their feasibility on Xilinx FPGAs. Their lightweight implementations indicate a high resistance to detection by conventional test and inspection methods. Furthermore, the proposed TSCs come with a physical

Low-cost solutions for preventing simple side-channel analysis: Side-channel atomicity

by Mathieu Ciet, Marc Joye - IEEE Transactions on Computers , 2004
"... Abstract—This paper introduces simple methods to convert a cryptographic algorithm into an algorithm protected against simple side-channel attacks. Contrary to previously known solutions, the proposed techniques are not at the expense of the execution time. Moreover, they are generic and apply to vi ..."
Abstract - Cited by 69 (6 self) - Add to MetaCart
. All these algorithms share the common feature that the complexity is globally unchanged compared to the corresponding unprotected implementations. Index Terms—Cryptographic algorithms, side-channel analysis, protected implementations, atomicity, exponentiation, elliptic curves. 1

Information Theoretic Evaluation of Side-Channel Resistant Logic Styles

by Jean-jacques Quisquater
"... Abstract. We propose to apply an information theoretic metric to the evaluation of side-channel resistant logic styles. Due to the long design and development time required for the physical evaluation of such hard-ware countermeasures, our analysis is based on simulations. Although they do not aim t ..."
Abstract - Add to MetaCart
Abstract. We propose to apply an information theoretic metric to the evaluation of side-channel resistant logic styles. Due to the long design and development time required for the physical evaluation of such hard-ware countermeasures, our analysis is based on simulations. Although they do not aim

Understanding the Limitations and Improving the Relevance of SPICE Simulations in Side-Channel Security Evaluations

by Dina Kamel, Mathieu Renauld, Denis Fl, François-xavier St
"... Abstract. Simulation is a very powerful tool for hardware designers. It generally allows the preliminary evaluation of a chip's performances before its final tape out. As security against side-channel attacks is an increasingly important issue for cryptographic devices, simulation also becomes ..."
Abstract - Add to MetaCart
Abstract. Simulation is a very powerful tool for hardware designers. It generally allows the preliminary evaluation of a chip's performances before its final tape out. As security against side-channel attacks is an increasingly important issue for cryptographic devices, simulation also becomes

Automatic quantification of cache side-channels

by Boris Köpf, Laurent Mauborgne, Martín Ochoa - IN: PROC. 24TH INTERNATIONAL CONFERENCE ON COMPUTER-AIDED VERIFICATION (CAV
"... The latency gap between caches and main memory has been successfully exploited for recovering sensitive input to programs, such as cryptographic keys from implementation of AES and RSA. So far, there are no practical general-purpose countermeasures against this threat. In this paper we propose a no ..."
Abstract - Cited by 18 (2 self) - Add to MetaCart
The latency gap between caches and main memory has been successfully exploited for recovering sensitive input to programs, such as cryptographic keys from implementation of AES and RSA. So far, there are no practical general-purpose countermeasures against this threat. In this paper we propose a

A Formal Practice-Oriented Model for the Analysis of Side-Channel Attacks

by Francois-Xavier Standaert, François-xavier St, Tal G. Malkin, Moti Yung , 2006
"... Formal models that allow one to understand side-channel attacks and are also directly meaningful to practice have been an open question. Motivated by this challenge, this work proposes a practice oriented framework for the analysis of cryptographic implementations against such attacks. It is illu ..."
Abstract - Cited by 8 (1 self) - Add to MetaCart
Formal models that allow one to understand side-channel attacks and are also directly meaningful to practice have been an open question. Motivated by this challenge, this work proposes a practice oriented framework for the analysis of cryptographic implementations against such attacks

Authentication Using Side-Channel Information

by Kazuo Sakiyama, Takanori Machida, Arisa Matsubara, Yunfeng Kuai, Yu-ichi Hayashi, Takaaki Mizuki, Noriyuki Miura, Makoto Nagata
"... Abstract. Authentication based on cryptographic protocols is a key technology for recent security systems. However, the so-called relay at-tack where a malicious attacker tries to assume the role of the prover, is known to be a serious threat even for the cryptographically-secure au-thentication sys ..."
Abstract - Add to MetaCart
-thentication systems. This paper proposes a new authentication method that utilizes the side channel that already exists in many authentication systems. The side channel has been studied intensively from the attacker viewpoint, and it is best known for the key-recovery attack against cryp-tographic implementations via
Next 10 →
Results 11 - 20 of 1,323
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University