搜索结果: 1-15 共查到“军事学 DPA”相关记录37条 . 查询时间(0.065 秒)
A Comparison of Single-Bit and Multi-Bit DPA for Attacking AES128 on an ATmega328P
AES DPA multi-bit DPA
2019/8/8
Side channel attacks have demonstrated in the past that it is possible to break cryptographic algorithms by attacking the implementation rather than the algorithm. This paper compares an adaptation of...
A remark on a success rate model fpr DPA and CPA
Side-channel attacks evaluation metric success rate
2018/11/16
The success rate is the most common evaluation metric for measuring the performance of a particular side channel attack scenario. We improve on an analytic formula for the success rate.
A first-order chosen-plaintext DPA attack on the third round of DES
side-channel attack DPA countermeasure
2018/1/2
DPA attacks usually exhibit a "divide-and-conquer" property: the adversary needs to enumerate only a small space of the key (a key sub-space) when performing the DPA attack. This is achieved trivially...
Categorising and Comparing Cluster-Based DPA Distinguishers
side-channel analysis, DPA, machine learning
2017/8/10
Side-channel distinguishers play an important role in differential power analysis, where real world leakage information is compared against hypothetical predictions in order to guess at the underlying...
Decomposed S-Boxes and DPA Attacks: A Quantitative Case Study using PRINCE
Threshold Implementation Transparency Order S-box decomposition
2016/6/20
Lightweight ciphers become indispensable and inevitable in the ubiquitous smart devices. However, the security of ciphers is often subverted by various types of attacks, especially, implementation att...
Evaluation and Improvement of Generic-Emulating DPA Attacks
generic side-channel attack linear regression cross-validation
2016/3/18
At CT-RSA 2014, Whitnall, Oswald and Standaert gave the
impossibility result that no generic DPA strategies (i.e., without any a
priori knowledge about the leakage characteristics) can recover secre...
Multi-target DPA attacks: Pushing DPA beyond the limits of a desktop computer
implementation differential power analysis
2016/1/9
Following the pioneering CRYPTO ’99 paper by Kocher et
al. differential power analysis (DPA) was initially geared around lowcost
computations performed using standard desktop equipment with
minimal...
MuR-DPA: Top-down Levelled Multi-replica Merkle Hash Tree Based Secure Public Auditing for Dynamic Big Data Storage on Cloud
public auditing integrity verification cloud computing
2016/1/9
Big data and its applications are attracting more and more research interests in recent years. As the new generation distributed computing platform, cloud computing is believed to be the most potent p...
Moments-Correlating DPA
2016/1/9
We generalize correlation-enhanced power analysis collision
attacks into moments-correlating DPA. The resulting distinguisher is applicable
to the profiled and non-profiled (collision) settings and ...
Efficient Selection of Time Samples for Higher-Order DPA with Projection Pursuits
Higher-Order DPA Projection Pursuits
2016/1/9
The selection of points-of-interest in leakage traces is a frequently
neglected problem in the side-channel literature. However, it can
become the bottleneck of practical adversaries/evaluators as t...
A Statistical Model for Higher Order DPA on Masked Devices
Side-channel attack differential power analysis statistical model
2016/1/9
A popular effective countermeasure to protect block cipher implementations against
differential power analysis (DPA) attacks is to mask the internal operations of the cryptographic
algorithm with ra...
RSA meets DPA: Recovering RSA Secret Keys from Noisy Analog Data
RSA Key-Recovery Cold Boot Attack Side Channel Attack
2016/1/8
We discuss how to recover RSA secret keys from noisy analog data obtained through physical attacks such as cold boot and side channel attacks. Many studies have focused on recovering correct secret ke...
Side Channel Attacks: Vulnerability Analysis of PRINCE and RECTANGLE using DPA
Lightweight block cipher power characteristic FPGA implementation
2016/1/7
Over a decade, cryptographers are more attentive on designing
lightweight ciphers in focus to compact cryptographic devices. More
often, the security of these algorithms are defined in terms of its ...
Robust Profiling for DPA-Style Attacks
side-channel analysis differential power analysis machine learning
2015/12/30
Profiled side-channel attacks are understood to be powerful when applicable: in
the best case when an adversary can comprehensively characterise the leakage, the resulting
model leads to attacks req...
We describe three contributions regarding the Soft Analytical
Side-Channel Attacks (SASCA) introduced at Asiacrypt 2014. First,
we compare them with Algebraic Side-Channel Attacks (ASCA) in a
noise...