搜索结果: 1-9 共查到“军事学 DPA attacks”相关记录9条 . 查询时间(0.125 秒)
Decomposed S-Boxes and DPA Attacks: A Quantitative Case Study using PRINCE
Threshold Implementation Transparency Order S-box decomposition
2016/6/20
Lightweight ciphers become indispensable and inevitable in the ubiquitous smart devices. However, the security of ciphers is often subverted by various types of attacks, especially, implementation att...
Evaluation and Improvement of Generic-Emulating DPA Attacks
generic side-channel attack linear regression cross-validation
2016/3/18
At CT-RSA 2014, Whitnall, Oswald and Standaert gave the
impossibility result that no generic DPA strategies (i.e., without any a
priori knowledge about the leakage characteristics) can recover secre...
Multi-target DPA attacks: Pushing DPA beyond the limits of a desktop computer
implementation differential power analysis
2016/1/9
Following the pioneering CRYPTO ’99 paper by Kocher et
al. differential power analysis (DPA) was initially geared around lowcost
computations performed using standard desktop equipment with
minimal...
One for All - All for One:Unifying Standard DPA Attacks
Unifying Standard DPA Attack side-channel attack
2009/9/27
In this paper, we examine the relationship between and the
efficiency of different approaches to standard DPA attacks. We first show
that the most popular approaches such as using a distance-of-mean...
In this paper, we examine the relationship between and the
efficiency of different approaches to standard DPA attacks. We first show
that the most popular approaches such as using a distance-of-mean...
Practical DPA Attacks on MDPL
Differential Side Channel Analysis Masked Dual-rail Pre-charge Logic MDPL
2009/6/15
MDPL is a masked logic style that unites principles of dual-rail pre-
charge as well as masked logic to achieve resistance against dierential power anal-
ysis attacks. MDPL has received much attent...
Revisiting Higher-Order DPA Attacks:Multivariate Mutual Information Analysis
Higher-Order DPA Attacks Multivariate Mutual Information Analysis MMIA
2009/6/15
Security devices are vulnerable to side-channel attacks that
perform statistical analysis on data leaked from cryptographic computa-
tions. Higher-order (HO) attacks are a powerful approach to break...
On highly nonlinear S-boxes and their inability to thwart DPA attacks
nonlinear S-boxes thwart DPA attacks
2009/3/13
Prouff has introduced recently, at FSE 2005, the notion of
transparency order of S-boxes. This new characteristic is related to the
ability of an S-box, used in a cryptosystem in which the round key...
DPA attacks on keys stored in CMOS cryptographic devices through the influence of the leakage behavior
DPA attacks CMOS cryptographic devices leakage behavior
2008/11/26
DPA attacks on keys stored in CMOS cryptographic devices through the influence of the leakage behavior.