搜索结果: 76-90 共查到“Side Channel Attacks”相关记录91条 . 查询时间(0.355 秒)
EMpowering Side-Channel Attacks.
Further Results and Considerations on Side Channel Attacks on RSA
confirmation oracle RSA-KEM RSAES-OAEP
2009/4/14
This paper contains three parts. In the first part we present a new side channel
attack on plaintext encrypted by EME-OAEP PKCS#1 v.2.1. In contrast with Manger´s
attack, we attack that part o...
Parallel scalar multiplication on general elliptic curves over Fp hedged against Non-Dierential Side-Channel Attacks
Elliptic Curves Montgomery ladder Power Analysis
2009/4/13
For speeding up elliptic curve scalar multiplication and making
it secure against side-channel attacks such as timing or power analysis,
various methods have been proposed using specifically chosen ...
Side Channel Attacks on CBC Encrypted Messages in the PKCS#7 Format
CBC symmetrical encryption padding
2009/4/9
Vaudenay has shown in [5] that a CBC encryption mode ([2], [9]) combined with the PKCS#5 padding [3]
scheme allows an attacker to invert the underlying block cipher, provided she has access to a vali...
SCA1 Model: Towards a concrete security approach to the design of cryptosystems secure against side-channel attacks
SCA1 Model cryptosystems secure side-channel attacks
2009/4/3
When implementing cryptosystems on general purpose cryptographic hardware, one takes profit of the
Application Programming Interfaces (APIs) displaced by the hardware to code the required cryptosyste...
A comb method to render ECC resistant against Side Channel Attacks
Elliptic curve cryptosystems side channel attacks scalar multiplication pre-computed table
2009/4/3
Side Channel Attacks may exploit leakage information to break
cryptosystems on smard card devices. In this paper we present a new SCAresistant
elliptic curve scalar multiplication algorithm, based o...
On security of XTR public key cryptosystems against Side Channel Attacks
XTR Public Key Cryptosystem Side Channel Attacks SPA
2009/3/27
The XTR public key system was introduced at Crypto 2000.
Application of XTR in cryptographic protocols leads to substantial sav-
ings both in communication and computational overhead without com-
p...
Unified Point Addition Formulæ and Side-Channel Attacks
elliptic-curve cryptography side-channel attacks projective coordinates
2009/3/17
The successful application to elliptic curve cryptography of
side-channel attacks, in which information about the secret key can be
recovered from the observation of side channels like power consump...
Side-Channel Attacks: Ten Years After Its Publication and the Impacts on Cryptographic Module Security Testing
information security side channel attack cryptographic module
2009/3/13
Side-channel attacks are easy-to-implement whilst powerful attacks against cryptographic implementations, and their targets range from primitives, protocols, modules, and devices to even systems. Thes...
The Program Counter Security Model: Automatic Detection and Removal of Control-Flow Side Channel Attacks
Program Counter Security Model Automatic Detection Control-Flow Side Channel Attacks
2009/3/11
We introduce new methods for detecting control-flow side channel attacks, transforming C source
code to eliminate such attacks, and checking that the transformed code is free of control-flow side cha...
What do S-boxes Say in Differential Side Channel Attacks?
side channel differential power analysis DPA DEMA
2009/3/4
Cryptographic devices are vulnerable against the now well-
known side channel leakage analysis. Secret data, such as keys, can be
revealed by attacks like DPA, DEMA, CPA. However, this kind of attac...
AES side channel attacks protection using random isomorphisms
AES block ciphers finite field
2009/1/21
General method of side-channel attacks protection, based on random cipher isomorphisms is
presented. Isomorphic ciphers produce common outputs for common inputs. Cipher isomorphisms
can be changed i...
Side Channel Attacks on Implementations of Curve-Based Cryptographic Primitives
Side Channel Attacks Curve-Based Cryptographic Primitives
2009/1/13
The present survey deals with the recent research in side channel analysis and related attacks
on implementations of cryptographic primitives. The focus is on software contermeasures for
primitives ...
Side Channel Attacks and Countermeasures on Pairing Based Cryptosystems over Binary Fields
Pairing based cryptosystems Side channel attacks Randomized projective coordinate systems
2008/12/8
Pairings on elliptic curves have been used as cryptographic
primitives for the development of new applications such as identity based
schemes. For the practical applications, it is crucial to provi...
Towards Security Limits in Side-Channel Attacks(With an Application to Block Ciphers)
Security Limits Side-Channel Attacks
2008/8/22
This paper considers a recently introduced framework for
the analysis of physically observable cryptographic devices. It exploits
a model of computation that allows quantifying the effect of practic...