Results 1 - 10
of
9,183
Side Channel Attack-Survey
"... The need for security has gained more importance in this information intense society. Cryptography is the design and analysis of mathematical structures that enable secure communications in the presence of malicious adversaries. Side channel attacks are a recent class of attacks that is very powerfu ..."
Abstract
- Add to MetaCart
The need for security has gained more importance in this information intense society. Cryptography is the design and analysis of mathematical structures that enable secure communications in the presence of malicious adversaries. Side channel attacks are a recent class of attacks that is very
Overview of the Side Channel Attacks
"... The security of cryptographic algorithms such as block ciphers and public-key algorithms relies on the secrecy of the key. Traditionally, when cryptanalysists examine the security of a cryptographic algorithm, they try to recover the secret key by observing the inputs and outputs of the algorithm. A ..."
Abstract
- Add to MetaCart
of information, called side-channel information, can be exploited in side-channel attacks to retrieve secret keys. Side channel attacks have successfully broken many algorithms.
Algebraic Side-Channel Attacks
, 2009
"... In 2002, algebraic attacks using overdefined systems of equations have been proposed as a potentially very powerful cryptanalysis technique against block ciphers. However, although a number of convincing experiments have been performed against certain reduced algorithms, it is not clear wether thes ..."
Abstract
-
Cited by 16 (2 self)
- Add to MetaCart
these attacks can be successfully applied in general and to a large class of ciphers. In this paper, we show that algebraic techniques can be combined with side-channel attacks in a very effective and natural fashion. As an illustration, we apply them to the block cipher PRESENT that is a stimulating first
Kangaroos in Side-Channel Attacks
"... Abstract. Side-channel attacks are a powerful tool to discover the cryptographic secrets of a chip or other device but only too often do they require too many traces or leave too many possible keys to explore. In this paper we show that for side channel attacks on discrete-logarithm-based systems si ..."
Abstract
-
Cited by 1 (0 self)
- Add to MetaCart
Abstract. Side-channel attacks are a powerful tool to discover the cryptographic secrets of a chip or other device but only too often do they require too many traces or leave too many possible keys to explore. In this paper we show that for side channel attacks on discrete-logarithm-based systems
Side Channel Attacks on Cryptographic Software
"... When it comes to cryptographic software, side channels are an often-overlooked threat. A side channel is any observable side effect of computation that an attacker could measure and possibly influence. Crypto is especially vulnerable to side channel attacks because of its strict requirements for abs ..."
Abstract
-
Cited by 2 (0 self)
- Add to MetaCart
When it comes to cryptographic software, side channels are an often-overlooked threat. A side channel is any observable side effect of computation that an attacker could measure and possibly influence. Crypto is especially vulnerable to side channel attacks because of its strict requirements
EMpowering Side-Channel Attacks
- Technical [SA98] [Sc00] [Sc02] [Sh97] [Sh00] [SKQ01] Report
, 2001
"... In this paper, we report preliminary results obtained as a result of a systematic ..."
Abstract
-
Cited by 9 (0 self)
- Add to MetaCart
In this paper, we report preliminary results obtained as a result of a systematic
Side Channel Attacks
, 2001
"... Encryption Standard (NIST FIPS-197) has been the subject of extensive cryptanalysis research. The importance of this research has intensified since AES was named, in 2003, by NSA as a Type-1 Suite B Encryption Algorithm (CNSSP-15). As such, AES is now authorized to protect classified and unclassifie ..."
Abstract
- Add to MetaCart
Encryption Standard (NIST FIPS-197) has been the subject of extensive cryptanalysis research. The importance of this research has intensified since AES was named, in 2003, by NSA as a Type-1 Suite B Encryption Algorithm (CNSSP-15). As such, AES is now authorized to protect classified and unclassified national security systems and information. This paper provides an overview of current cryptanalysis research on the AES cryptographic algorithm. Discussion is provided on the impact by each technique to the strength of the algorithm in national security applications. The paper is concluded with an attempt at a forecast of the usable life of AES in these applications.
Soft Analytical Side-Channel Attacks
"... Abstract. In this paper, we introduce a new approach to side-channel key recovery, that combines the low time/memory complexity and noise tolerance of standard (divide and conquer) differential power analysis with the optimal data complexity of algebraic side-channel attacks. Our fundamental contrib ..."
Abstract
-
Cited by 3 (0 self)
- Add to MetaCart
Abstract. In this paper, we introduce a new approach to side-channel key recovery, that combines the low time/memory complexity and noise tolerance of standard (divide and conquer) differential power analysis with the optimal data complexity of algebraic side-channel attacks. Our fundamental
Results 1 - 10
of
9,183