搜索结果: 1-12 共查到“Power Analysis Attacks”相关记录12条 . 查询时间(0.261 秒)
Hardware Trojans have gained increasing interest during the past few years. Undeniably, the detection of such malicious designs needs a deep understanding of how they can practically be built and deve...
A Unified Metric for Quantifying Information Leakage of Cryptographic Devices under Power Analysis Attacks
Information leakage amount side-channel security power analysis attack
2016/3/18
To design effective countermeasures for cryptosystems against side-channel power analysis attacks, the evaluation of the system leakage has to be lightweight and often times at the early stage like on...
First Experimental Result of Power Analysis Attacks on a FPGA Implementation of LEA
power analysis attack LEA ARX
2016/1/5
The lightweight encryption algorithm (LEA) is a 128-bit block cipher introduced in 2013. It is based on Addition, rotation, XOR operations for 32-bit words. Because of its structure,it is useful for s...
IEEE 802.15.4 is a wireless standard used by a variety of higher-level protocols, including many used in the Internet of Things (IoT). A number of system on a chip (SoC) devices that combine a radio t...
Towards Secure Cryptographic Software Implementation Against Side-Channel Power Analysis Attacks
Side-channel attacks shuffling Keccak
2015/12/24
Side-channel attacks have been a real threat against many critical embedded systems that rely on cryptographic algorithms as their security engine. A commonly used algorithmic countermeasure, random m...
Power Analysis Attacks against FPGA Implementations of KLEIN
power analysis attack KLEIN FPGA
2013/4/18
KLEIN is a family of block ciphers proposed by Zheng Gong et al. at RFIDSec 2011, and its lightweight features are suitable for resource-constrained devices. However, the original design of KLEIN does...
On the Vulnerability of FPGA Bitstream Encryption against Power Analysis Attacks – Extracting Keys from Xilinx Virtex-II FPGAs
Vulnerability FPGA Xilinx Virtex-II FPGAs
2011/7/25
Over the last two decades FPGAs have become central components for many advanced digital systems, e.g., video signal processing, network routers, data acquisition and military systems.
On the Vulnerability of FPGA Bitstream Encryption against Power Analysis Attacks – Extracting Keys from Xilinx Virtex-II FPGAs
implementation / Side-Channel Analysis
2012/3/27
Over the last two decades FPGAs have become central components for many advanced digital systems, e.g., video signal processing, network routers, data acquisition and military systems. In order to pro...
Multi-Linear cryptanalysis in Power Analysis Attacks MLPA
Power Analysis MLPA multi-linear cryptanalysis
2009/6/15
Power analysis attacks against embedded secret key cryptosystems are widely
studied since the seminal paper of Paul Kocher, Joshua Ja, and Benjamin Jun in
1998 where has been introduced the powerful...
An Improved and Efficient Countermeasure against Power Analysis Attacks
Side channel attack DPA RPA doubling attack
2009/1/13
Recently new types of differential power analysis attacks
(DPA) against elliptic curve cryptosystems (ECC) and RSA systems
have been introduced. Most existing countermeasures against classical
DPA ...
A Parallelization of ECDSA Resistant to Simple Power Analysis Attacks
Sarang Aravamuthan Viswanatha Rao
2008/12/18
The Elliptic Curve Digital Signature Algorithm admits a
natural parallelization wherein the point multiplication step can be split
in two parts and executed in parallel. Further parallelism is achie...
Proposal for a Ultra Low Voltage NAND gate to withstand Power Analysis Attacks
Differential Power Analysis (DPA) Low Voltage (LV) Ultra Low Voltage (ULV)
2010/2/2
In this paper we promote the Ultra Low Voltage (ULV)
NAND gate to replace either partly or entirely the encryption block
of a design to withstand power analysis attack.