论文列表
23
重置
Power-based Side Channel Analysis and Fault Injection: Hacking Techniques and Combined Countermeasure
发表于 2021/1/1 来源 International Journal of Advanced Computer Science and Applications (IJACSA) DOI 10.14569/IJACSA.2021.0120583
作者
Noura Benhadjyoussef Mouna Karmani Mohsen Machhout
摘要
Over the last years, physical attacks have been massively researched due to their capability to extract secret information from cryptographic engine. 更多..
Metis: An Integrated Morphing Engine CPU to Protect Against Side Channel Attacks
发表于 2021/1/1 来源 IEEE ACCESS DOI 10.1109/ACCESS.2021.3077977
作者
Antognazza Francesco Barenghi Alessandro Pelosi Gerardo
单位
Politecn Milan, Dept Elect Informat & Bioengn, I-20133 Milan, Italy
摘要
Power consumption and electromagnetic emissions analyses are well established attack avenues for secret values extraction in a large range of embedded 更多..
Key‐dependent side‐channel cube attack on CRAFT
发表于 2021/3/17 来源 ETRI Journal DOI 10.4218/ETRIJ.2019-0539
作者
Pang KokAn AbdulLatip Shekh Faisal
单位
INSFORNET Centre for Advanced Computing Technology (C‐ACT) Fakulti Teknologi Maklumat dan Komunikasi Universiti Teknikal Malaysia Melaka
摘要
CRAFT is a tweakable block cipher introduced in 2019 that aims to provide strong protection against differential fault analysis. In this paper, we sho 更多..
CacheHawkeye: Detecting Cache Side Channel Attacks Based on Memory Events
发表于 2022/1/8 来源 Future Internet DOI 10.3390/FI14010024
作者
Yan Hui Cui Chaoyuan
单位
Institutes of Physical Science and Information Technology, Anhui University, Hefei 230601, China;Institutes of Intelligent Machines, Hefei Institutes of Physica展开 Institutes of Physical Science and Information Technology, Anhui University, Hefei 230601, China;Institutes of Intelligent Machines, Hefei Institutes of Physical Sciences, Chinese Academy of Sciences, Hefei 230031, China
摘要
Cache side channel attacks, as a type of cryptanalysis, seriously threaten the security of the cryptosystem. These attacks continuously monitor the me 更多..
Side channel analysis based on feature fusion network.
发表于 2022/1/1 来源 PloS one DOI 10.1371/JOURNAL.PONE.0274616
作者
Ni Feng Wang Junnian Tang Jialin Yu Wenjun Xu Ruihan
单位
Hunan Provincial Key Laboratory of Intelligent Sensors and Advanced Sensor Materials, Xiangtan, Hunan, China.;School of Physics and Electronics, Hunan Universit展开 Hunan Provincial Key Laboratory of Intelligent Sensors and Advanced Sensor Materials, Xiangtan, Hunan, China.;School of Physics and Electronics, Hunan University of Science and Technology, Xiangtan, China.
摘要
Various physical information can be leaked while the encryption algorithm is running in the device. Side-channel analysis exploits these leakages to r 更多..
Unambiguous state discrimination and joint measurement attacks on passive side channel of the light source in BB84 decoy-state protocol
发表于 2021/12/1 来源 Journal of Physics: Conference Series DOI 10.1088/1742-6596/2086/1/012130
作者
Babukhin D Sych D
单位
QRate LLC, Moscow 121353, Russia; NTI Center for Quantum Communications, National University of Science and Technology MISiS, Leninsky prospekt 4, Moscow 119049展开 QRate LLC, Moscow 121353, Russia; NTI Center for Quantum Communications, National University of Science and Technology MISiS, Leninsky prospekt 4, Moscow 119049, Russia; National University of Science and Technology MISiS, 119049, Moscow, Russia; Sirius University of Science and Technology, 1 Olympic Ave, 354340, Sochi, Russia; P.N.Lebedev Physical Institute, Russian Academy of Sciences, Moscow, 119991, Russia
摘要
Quantum key distribution (QKD) has a promise of unconditionally secure communication between the remote sides. The real-world QKD implementations, how 更多..
Experimental Side Channel Analysis of BB84 QKD Source
发表于 2021/12/1 来源 IEEE JOURNAL OF QUANTUM ELECTRONICS DOI 10.1109/JQE.2021.3111332
作者
Biswas Ayan Banerji Anindya Chandravanshi Pooja Kumar Rupesh Singh Ravindra P.
单位
Quantum Technol Lab, Phys Res Lab, Ahmadabad 380009, Gujarat, India; Indian Inst Technol Gandhinagar, Ahmadabad 382355, Gujarat, India; Natl Univ Singapore, Ctr展开 Quantum Technol Lab, Phys Res Lab, Ahmadabad 380009, Gujarat, India; Indian Inst Technol Gandhinagar, Ahmadabad 382355, Gujarat, India; Natl Univ Singapore, Ctr Quantum Technol, Singapore 117543, Singapore; Univ York, Quantum Commun Hub, York YO10 5DD, N Yorkshire, England; Univ York, York Ctr Quantum Technol, Dept Phys, York YO10 5DD, N Yorkshire, England
摘要
A typical implementation of BB84 protocol for quantum communication uses four laser diodes for transmitting weak coherent pulses, which may not have t 更多..
Explicit attacks on passive side channels of the light source in the BB84 decoy state protocol
发表于 2021/7/1 来源 Journal of Physics: Conference Series DOI 10.1088/1742-6596/1984/1/012008
作者
Babukhin D Sych D
单位
QRate LLC, Novaya av. 100, Moscow 121353, Russia; NTI Center for Quantum Communications, National University of Science and Technology MISiS, Leninsky prospekt展开 QRate LLC, Novaya av. 100, Moscow 121353, Russia; NTI Center for Quantum Communications, National University of Science and Technology MISiS, Leninsky prospekt 4, Moscow 119049, Russia; Sirius University of Science and Technology, 1 Olympic Ave, 354340, Sochi, Russia; P.N.Lebedev Physical Institute, Russian Academy of Sciences, Moscow, 119991, Russia
摘要
Various imperfections of the hardware in quantum key distribution (QKD) lead to discrepancies between the theory and real-world devices. An eavesdropp 更多..
Practical security of quantum key distribution in the presence of side channels
发表于 2021/7/1 来源 Journal of Physics: Conference Series DOI 10.1088/1742-6596/1984/1/012001
作者
Sych D Duplinskiy A Babukhin D
单位
P.N.Lebedev Physical Institute, Russian Academy of Sciences, Moscow, 119991, Russia; NTI Center for Quantum Communications, National University of Science and T展开 P.N.Lebedev Physical Institute, Russian Academy of Sciences, Moscow, 119991, Russia; NTI Center for Quantum Communications, National University of Science and Technology MISiS, Moscow, 119049, Russia; Sirius University of Science and Technology, 1 Olympic Ave, 354340, Sochi, Russia
摘要
Security of quantum key distribution (QKD) is based on fundamental laws of quantum physics. However, the security of QKD implementations is at risk du 更多..
Side channel attacks for architecture extraction of neural networks
发表于 2021/3/18 来源 CAAI Transactions on Intelligence Technology DOI 10.1049/CIT2.12026
作者
Chabanne Hervé Danger JeanLuc Guiga Linda Kühne Ulrich
单位
Idemia ;Télécom Paris Institut Polytechnique de Paris
摘要
Side channel attacks (SCAs) on neural networks (NNs) are particularly efficient for retrieving secret information from NNs. We differentiate multiple 更多..
1 2 3