搜索结果: 1-8 共查到“Differential Power Analysis”相关记录8条 . 查询时间(0.122 秒)
Differential Power Analysis of XMSS and SPHINCS
Post-quantum cryptography Hash-based signatures DPA
2018/7/16
Quantum computing threatens conventional public-key cryptography. In response, standards bodies such as NIST increasingly focus on post-quantum cryptography. In particular, hash-based signature scheme...
Comparison of Cost of Protection Against Differential Power Analysis of Selected Authenticated Ciphers
Cryptography authenticated cipher field programmable gate array
2018/4/17
Authenticated ciphers, like all physical implementations of cryptography, are vulnerable to side-channel attacks, including differential power analysis (DPA). The t-test leakage detection methodology ...
Evolving S-Boxes with Reduced Differential Power Analysis Susceptibility
AES block ciphers S-box
2016/12/26
Differential power analysis targets S-boxes to break ciphers that resist cryptanalysis. We relax cryptanalytic constraints to lower S-box leakage, as quantified by the transparency order. We apply gen...
Differential Power Analysis of a McEliece Cryptosystem
Differential Power Analysis McEliece Cryptosystem QC-MDPC Codes
2016/1/8
This work presents the first differential power analysis of an implementation of the McEliece
cryptosystem. Target of this side-channel attack is a state-of-the-art FPGA implementation of the ef-
fi...
Statistical Analysis of Second Order Differential Power Analysis
Embedded systems security cryptographic implementations side channel analysis higher order differential power analysis
2010/12/22
Second Order Differential Power Analysis (2ODPA) is a powerful side channel attack that allows an attacker to bypass the widely used masking countermeasure. To thwart 2ODPA, higher order masking may b...
Differential power analysis resistant hardware implementation of the RSA cryptosystem
RSA montgomery modular multiplier carry save adder side-channel attacks differential power analysis attack
2010/10/12
In this paper, RSA cryptosystem was implemented on hardware, then modified to be resistant against Differential Power Analysis attacks by using the Randomized Table Window method. This is the first FP...
Differential power analysis resistant hardware implementation of the RSA cryptosystem
RSA montgomery modular multiplier carry save adder side-channel attacks differential power analysis attack randomized table window method
2010/3/17
In this paper, RSA cryptosystem was implemented on hardware, then modified to be resistant against Differential Power Analysis attacks by using the Randomized Table Window method. This is the first FP...
Charge Recycling Sense Amplifier Based Logic:Securing Low Power Security IC’s against Differential Power Analysis
Charge Recycling Sense Amplifier Based Logic Securing Low Power Security IC’s Differential Power Analysis
2009/3/24
Charge Recycling Sense Amplifier Based Logic is presented. This logic is derived from Sense Amplifier
Based Logic, which is a logic style with signal independent power consumption that is capable to ...