论文列表
5 ·关键词:aes
重置
Research on Fault Probability Based on Hamming Weight in Fault Injection Attack
发表于 2025-09-23 来源 Computers, Materials & Continua DOI 10.32604/CMC.2025.066525
作者
Tong Wu Dawei Zhou
单位
Department of Information Security, Naval University of Engineering, Wuhan, 430000, China
摘要
Fault attacks have emerged as an increasingly effective approach for integrated circuit security attacks due to their short execution time and minimal 更多..
“S-Box” Implementation of AES Is Not Side Channel Resistant
发表于 2020-06-19 来源 Journal of Hardware and Systems Security DOI 10.1007/s41635-019-00082-w
作者
grid.417971.d, 0000 0001 2198 7527, Department of Computer Science and Technology, Indian Institute of Technology Bombay, Mumbai, India grid.417971.d, 0000 0001 2198 7527, Department of Computer Science and Technology, Indian Institute of Technology Bombay, Mumbai, India grid.417971.d, 0000 0001 2198 7527, Department of Computer Science and Technology, Indian Institute of Technology Bombay, Mumbai, India grid.417971.d, 0000 0001 2198 7527, Department of Computer Science and Technology, Indian Institute of Technology Bombay, Mumbai, India
单位
grid.417971.d, 0000 0001 2198 7527, Department of Computer Science and Technology, Indian Institute of Technology Bombay, Mumbai, India
摘要
Several successful cache-based attacks have provided strong impetus for developing side channel resistant software implementations of AES. One of the 更多..
Towards the optimal performance of integrating Warm and Delay against remote cache timing side channels on block ciphers.
发表于 2019-01-01 来源 Journal of Computer Security DOI 10.3233/JCS-191296
作者
Ziqiang Ma Quanwei Cai 0001 Jingqiang Lin Bo Luo Jiwu Jing
单位
State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, China.
摘要
Cache timing side channels allow a remote attacker to disclose the cryptographic keys, by repeatedly invoking the encryption/decryption functions and 更多..
Variety of Scalable Shuffling Countermeasures against Side Channel Attacks
发表于 2016-10-13 来源 Journal of Cyber Security and Mobility DOI 10.13052/2245-1439.532
作者
Nikita Veshchikov Stephane Fernandes Medeiros Liran Lerman
单位
Department of Computer Sciences, Universit´e libre de Bruxelles, Brussel, Belgium
摘要
IoT devices have very strong requirements on all the resources such as memory, randomness, energy and execution time. This paper proposes a number of 更多..