搜索结果: 1-13 共查到“Template Attacks”相关记录13条 . 查询时间(0.078 秒)
Breach the Gate: Exploiting Observability for Fault Template Attacks on Block Ciphers
Fault attacks PRESEN
2019/8/19
Fault attacks (FA) are one of the potent practical threats to modern cryptographic implementations. Over the years the FA tech- niques have evolved, gradually moving towards the exploitation of device...
Deep Learning vs Template Attacks in front of fundamental targets: experimental study
Side channel deep dearning template attack
2018/12/24
This study compares the experimental results of Template Attacks (TA) and Deep Learning (DL) techniques called Multi Layer Perceptron (MLP) and Convolutional Neural Network (CNN), concurrently in fron...
Improved Brute-Force Search Strategies for Single-Trace and Few-Traces Template Attacks on the DES Round Keys
DES TDES Template Attack
2018/11/7
We present an improved search strategy for a template attack on the secret DES key of a widely-used smart card, which is based on a Common-Criteria certified chip. We use the logarithm of the probabil...
Brute–Force Search Strategies for Single–Trace and Few–Traces Template Attacks on the DES Round Keys of a Recent Smart Card
DES side-channel attack DES key schedule
2017/6/28
Recently, a new template attack on the DES key scheduling was demonstrated that allows recovery of a sufficiently large portion of the DES key of a widely deployed certified smart card chip using a si...
Comparative Study of Various Approximations to the Covariance Matrix in Template Attacks
DES TDES Template Attack
2016/12/24
Template attacks have been shown to be among the strongest attacks when it comes to side–channel attacks. An essential ingredient there is to calculate the inverse of a covariance matrix. In this pape...
How to Choose Interesting Points for Template Attacks?
Side-Channel Attacks Power Analysis Attacks Profiled Side-Channel Attacks
2016/1/9
Template attacks are widely accepted to be the most powerful
side-channel attacks from an information theoretic point of view.
For template attacks, many papers suggested a guideline for choosing
i...
Template Attacks on Different Devices
side-channel attacks template attacks multivariate analysis
2016/1/9
Template attacks remain a most powerful side-channel technique
to eavesdrop on tamper-resistant hardware. They use a profiling
step to compute the parameters of a multivariate normal distribution
f...
Template attacks are widely accepted as the strongest sidechannel
attacks from the information theoretic point of view, and they
can be used as a very powerful tool to evaluate the physical security...
How to Choose Interesting Points for Template Attacks More Effectively
Side-Channel Attacks Power Analysis Attacks Template Attacks
2016/1/6
Template attacks are widely accepted to be the most powerful
side-channel attacks from an information theoretic point of view. For
template attacks to be practical, one needs to choose some special ...
Dismantling real-world ECC with Horizontal and Vertical Template Attacks
Side-channel analysis horizontal leakage vertical leakage
2015/12/22
Recent side-channel attacks on elliptic curve algorithms have shown that the security of these cryptosystems is a matter of serious concern. The development of techniques in the area of Template Attac...
Template attacks remain a powerful side-channel technique to eavesdrop on tamper-resistant hardware. They model the probability distribution of leaking signals and noise to guide a search for secret d...
Template attacks have been considered exclusively in the
context of implementations of symmetric cryptographic algorithms on
8-bit devices. Within these scenarios, they have proven to be the most
p...
Template Attacks with a Power Model— Illustration on the Side-Channel Cryptanalysis of an Unprotected DES Crypto-Processor —
Side-Channel Cryptanalysis Unprotected DES
2008/5/21
Abstract
This article analyses some properties of the template attack. Examples come from
attacks against an unprotected ASIC implementation of DES. The principal components
analysis (PCA) is use...