搜索结果: 1-7 共查到“军事学 side-channel security”相关记录7条 . 查询时间(0.125 秒)
Towards Lightweight Side-Channel Security and the Leakage-Resilience of the Duplex Sponge
Authenticated Encryption Duplex Construction Leakage-Resilience
2019/3/1
Authenticated Encryption (AE) has become the de facto standard for encryption in modern protocols, and the ubiquitous deployment of small connected devices naturally calls for the availability of ligh...
Leakage Certification Revisited: Bounding Model Errors in Side-Channel Security Evaluations
side-channel analysis security evaluations mutual information
2019/2/27
Leakage certification aims at guaranteeing that the statistical models used in side-channel security evaluations are close to the true statistical distribution of the leakages, hence can be used to ap...
Verifiable side-channel security of cryptographic implementations: constant-time MEE-CBC
TLS MEE-CBC Timing attacks
2016/1/26
We provide further evidence that implementing software countermeasures against timing attacks
is a non-trivial task and requires domain-specific software development processes: we report an implement...
Simpler and More Efficient Rank Estimation for Side-Channel Security Assessment
side-channel analysis certification experimental cryptanalysis
2016/1/6
Rank estimation algorithms allow analyzing the computational
security of cryptographic keys for which adversaries have obtained
partial information thanks to leakage or cryptanalysis. They are parti...
Side-Channel Security Analysis of Ultra-Low-Power FRAM-based MCUs
side-channel analysis FRAM AES
2016/1/3
By shrinking the technology and reducing the energy requirements of integrated circuits, producing ultra-low-power devices has practically become possible. Texas Instruments as a pioneer in developing...
Tighter, faster, simpler side-channel security evaluations beyond computing power
symmetric cryptography side-channel attacks ranking
2016/1/3
A Eurocrypt 2013 paper 揝ecurity evaluations beyond computing
power: How to analyze side-channel attacks you cannot mount??
by Veyrat-Charvillon, G磂rard, and Standaert proposed a 揜ank Estimation
Algo...
Masking is a widely used countermeasure to protect block
cipher implementations against side-channel attacks. The principle is to
split every sensitive intermediate variable occurring in the computa...