搜索结果: 1-10 共查到“军事学 SCA”相关记录10条 . 查询时间(0.071 秒)
Many crypto-algorithms, Deep-Learning, DSP compute on words larger than 8-bit. SCA attacks can easily be done on Boolean operations like XOR, AND, OR, and substitution operations like s-box, p-box or ...
DL-LA: Deep Learning Leakage Assessment: A modern roadmap for SCA evaluations
side channel leakage assessment deep learning
2019/5/21
In recent years, deep learning has become an attractive ingredient to side-channel analysis (SCA) due to its potential to improve the success probability or enhance the performance of certain frequent...
Guards in Action: First-Order SCA Secure Implementations of Ketje without Additional Randomness
Authenticated Encryption KETJE SHA-3
2018/11/19
Recently the CAESAR competition has announced several finalists among the submitted authenticated encryption algorithms, after an open selection process during the last 5 years. Applications using the...
Yet Another Size Record for AES: A First-Order SCA Secure AES S-box Based on GF($2^8$) Multiplication
side-channel analysis Threshold Implementation AES
2018/11/12
It is well known that Canright’s tower field construction leads to a very small, unprotected AES S-box circuit by recursively embedding Galois Field operations into smaller fields. The current size re...
Polynomial direct sum masking to protect against both SCA and FIA
Masking countermeasure Error correcting codes Side channel attack
2018/6/5
Side Channel Attacks (SCA) and Fault Injection Attacks (FIA) allow an opponent to have partial access to the internal behavior of the hardware. Since the end of the nineties, many works have shown tha...
A First-Order SCA Resistant AES without Fresh Randomness
side-channel analysis threshold implementation randomness
2018/3/6
Since the advent of Differential Power Analysis (DPA) in the late 1990s protecting embedded devices against Side-Channel Analysis (SCA) attacks has been a major research effort. Even though many diffe...
Rhythmic Keccak: SCA Security and Low Latency in HW
Glitch non-completeness threshold implementation
2017/12/19
Glitches entail a great issue when securing a cryptographic implementation in hardware. Several masking schemes have been proposed in the literature that provide security even in the presence of glitc...
Profiled SCA with a New Twist: Semi-supervised Learning
Side-channel attacks Profiled scenario Machine learning
2017/11/13
Profiled side-channel attacks represent the most powerful category of side-channel attacks. In this context, the attacker gains ac- cess of a profiling device to build a precise model which is used to...
Analysis Of Variance and CPA in SCA
SCA AOV CPA
2016/1/7
This paper introduces Side-Channel Analysis results obtained on an unprotected circuit characterized by a surprisingly non-linear leakage. While in such a case, Correlation Power Analysis is not adapt...
SCA Resistance Analysis on FPGA Implementations of Sponge based MAC-PHOTON
SCA Lightweight Cryptography Sponge functions
2016/1/3
PHOTON is a lightweight hash function which was proposed
by Guo et al. in CRYPTO 2011. This is used in low-resource ubiquitous
computing devices such as RFID tags, wireless sensor nodes, smart cards...