We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-20 of 10,000 results
  1. Amplitude-modulated EM side-channel attack on provably secure masked AES

    Recently a new type of side channels was discovered, called amplitude-modulated electromagnetic (EM) emanations from mixed-signal circuits. Unlike...

    Article Open access 14 March 2024
  2. Constructive Side-Channel Analysis and Secure Design 15th International Workshop, COSADE 2024, Gardanne, France, April 9–10, 2024, Proceedings

    This book constitutes the refereed proceedings of the 15th International Workshop on Constructive Side-Channel Analysis and Secure Design, COSADE...

    Romain Wacquez, Naofumi Homma in Lecture Notes in Computer Science
    Conference proceedings 2024
  3. Profiling Side-Channel Attacks on Dilithium

    We present an end-to-end (equivalent) key recovery attack on the Dilithium lattice-based signature scheme, one of the winners of the NIST postquantum...
    Vincent Quentin Ulitzsch, Soundes Marzougui, ... Jean-Pierre Seifert in Selected Areas in Cryptography
    Conference paper 2024
  4. A side-channel attack on a masked and shuffled software implementation of Saber

    In this paper, we show that a software implementation of IND-CCA-secure Saber key encapsulation mechanism protected by first-order masking and...

    Kalle Ngo, Elena Dubrova, Thomas Johansson in Journal of Cryptographic Engineering
    Article Open access 25 April 2023
  5. Time Is Money, Friend! Timing Side-Channel Attack Against Garbled Circuit Constructions

    With the advent of secure function evaluation (SFE), distrustful parties can jointly compute on their private inputs without disclosing anything...
    Mohammad Hashemi, Domenic Forte, Fatemeh Ganji in Applied Cryptography and Network Security
    Conference paper 2024
  6. A new perspective exploration of machine learning algorithms for defending Side-Channel attacks

    Machine learning algorithms are used in various real-time applications, where security is one of the major problems. Security is applied in various...

    Vedhavathy Thoguluva Ramakrishnan, Murugaanandam Seethapathy, ... Lakshmi Dhevi Balasubrahmaniam in Multimedia Tools and Applications
    Article 02 July 2024
  7. MARF: A Memory-Aware CLFLUSH-Based Intra- and Inter-CPU Side-Channel Attack

    In this work, we conduct in-depth characterization to quantify the impact of DRAM refresh, the location of the target memory object within a...
    Sowoong Kim, Myeonggyun Han, Woongki Baek in Computer Security – ESORICS 2023
    Conference paper 2024
  8. A novel non-profiled side channel attack based on multi-output regression neural network

    Differential deep learning analysis (DDLA) is the first side-channel attack (SCA) evaluation using deep learning (DL) in the non-profiled scenario....

    Ngoc-Tuan Do, Van-Phuc Hoang, Van Sang Doan in Journal of Cryptographic Engineering
    Article 31 March 2023
  9. SRISC: Open Source Soft Processor Side Channel Analysis Attack Framework Using RISC-V

    Side channel analysis (SCA) attacks on soft processor systems (such as RISC-V and LEON3) are typically performed on FPGA prototy** boards. For the...
    Darshana Jayasinghe, Sri Parameswaran in Asia Pacific Advanced Network
    Conference paper 2024
  10. Attacking and Securing the Clock Randomization and Duplication Side-Channel Attack Countermeasure

    The emergence of deep learning has revolutionized side-channel attacks, making them a serious threat to cryptographic systems. Clock randomization is...
    Martin Brisfors, Michail Moraitis, ... Truls Jilborg in Foundations and Practice of Security
    Conference paper 2024
  11. A comprehensive tolerant algebraic side-channel attack over modern ciphers using constraint programming

    Tolerant algebraic side-channel attack (TASCA) exploits side-channel information with an algebraic formulation of a cipher to exploit its weaknesses...

    Fanghui Liu, Waldemar Cruz, Laurent Michel in Journal of Cryptographic Engineering
    Article 19 January 2022
  12. Side-Channel Analysis for the Re-Keying Protocol of Bluetooth Low Energy

    In the era of the Internet of Things, Bluetooth low energy (BLE/BTLE) plays an important role as a well-known wireless communication technology....

    Pei Cao, Chi Zhang, ... Da-Wu Gu in Journal of Computer Science and Technology
    Article 30 September 2023
  13. Leaking secrets in homomorphic encryption with side-channel attacks

    Homomorphic encryption (HE) allows computing encrypted data in the ciphertext domain without knowing the encryption key. It is possible, however, to...

    Furkan Aydin, Aydin Aysu in Journal of Cryptographic Engineering
    Article 12 January 2024
  14. Creating from Noise: Trace Generations Using Diffusion Model for Side-Channel Attack

    In side-channel analysis (SCA), the success of an attack is largely dependent on the dataset sizes and the number of instances in each class. The...
    Conference paper 2024
  15. Enhancing non-profiled side-channel attacks by time-frequency analysis

    Side-channel analysis (SCA) has become an increasing important method to assess the physical security of cryptographic systems. In the process of...

    Chengbin **, Yongbin Zhou in Cybersecurity
    Article Open access 01 August 2023
  16. A Side-Channel Attack on a Higher-Order Masked CRYSTALS-Kyber Implementation

    In response to side-channel attacks on masked implementations of post-quantum cryptographic algorithms, a new bitsliced higher-order masked...
    Ruize Wang, Martin Brisfors, Elena Dubrova in Applied Cryptography and Network Security
    Conference paper 2024
  17. Research on Side-Channel Attack Method Based on LSTM

    Side channel attacks recover keys or other sensitive information by using the time, power consumption, electromagnetic radiation and fault output...
    Zhou Mao, Tong Shuai, ... Sizhao Li in Advances in Artificial Intelligence and Security
    Conference paper 2022
  18. A Side-Channel Secret Key Recovery Attack on CRYSTALS-Kyber Using k Chosen Ciphertexts

    At CHES’2021, a chosen ciphertext attack combined with belief propagation which can recover the long-term secret key of CRYSTALS-Kyber from...
    Ruize Wang, Elena Dubrova in Codes, Cryptology and Information Security
    Conference paper 2023
  19. Scoring the predictions: a way to improve profiling side-channel attacks

    Side-channel analysis is an important part of the security evaluations of hardware components and more specifically of those that include...

    Damien Robissout, Lilian Bossuet, Amaury Habrard in Journal of Cryptographic Engineering
    Article 08 April 2024
Did you find what you were looking for? Share feedback.