论文列表
23
重置
Cross subkey side channel analysis based on small samples
发表于 2022/4/15 来源 Scientific Reports DOI 10.1038/S41598-022-10279-9
作者
Hu Fanliang Wang Huanyu Wang Junnian
单位
School of Physics and Electronic Science,Hunan University of Science and Technology,Xiangtan,China;School of EECS,KTH Royal Institute of Technology,Stockholm,Sw展开 School of Physics and Electronic Science,Hunan University of Science and Technology,Xiangtan,China;School of EECS,KTH Royal Institute of Technology,Stockholm,Sweden
摘要
The majority of recently demonstrated Deep-Learning Side-Channel Analysis (DLSCA) use neural networks trained on a segment of traces containing operat 更多..
Real-time instruction-level verification of remote IoT/CPS devices via side channels
发表于 2022/3/17 来源 Discover Internet of Things DOI 10.1007/S43926-022-00021-2
作者
Bai Yunkai Park Jungmin Tehranipoor Mark Forte Domenic
单位
ECE Department,University of Florida,Gainsville,USA
摘要
In recent years, with the rise of IoT technology, wireless Cyber-Physical Systems (CPS) have become widely deployed in critical infrastructure, includ 更多..
ID-Based Ring Signature against Continual Side Channel Attack
发表于 2023/1/7 来源 Symmetry DOI 10.3390/SYM15010179
作者
Yu Qihong Li Jiguo Shen Jian
单位
College of Information Engineering, Suqian University, Suqian 223800, China;College of Computer and Cyber Security, Fujian Normal University, Fuzhou 350117, Chi展开 College of Information Engineering, Suqian University, Suqian 223800, China;College of Computer and Cyber Security, Fujian Normal University, Fuzhou 350117, China;School of Computer and Software, Nanjing University of Information Science and Technology, Nanjing 210044, China
摘要
The security of the signature scheme is destroyed because its secret information of the signature system is leaked due to the side channel attack. Rin 更多..
Hierarchical and Efficient Identity-bsed Encryption Against Side Channel Attacks
发表于 2023/1/1 来源 International Journal of Advanced Computer Science and Applications (IJACSA) DOI 10.14569/IJACSA.2023.0140667
作者
Qihong Yu Jian Shen Jiguo Li Sai Ji
摘要
Hierarchical and identity-based encryption (HIBE) is very valuable and widely used in many occasions. In the Internet of Things based on cloud service 更多..
MetaEar: Imperceptible Acoustic Side Channel Continuous Authentication Based on ERTF
发表于 2022/10/20 来源 Electronics DOI 10.3390/ELECTRONICS11203401
作者
Chang Zhuo Wang Lin Li Binbin Liu Wenyuan
单位
School of Information Science and Engineering, Yanshan University, Qinhuangdao 066004, China;School of Cyber Security and Computer, Hebei University, Baoding 07展开 School of Information Science and Engineering, Yanshan University, Qinhuangdao 066004, China;School of Cyber Security and Computer, Hebei University, Baoding 071000, China;School of Economics and Management, Yanshan University, Qinhuangdao 066004, China
摘要
With the development of ubiquitous mobile devices, biometrics authentication has received much attention from researchers. For immersive experiences i 更多..
Behavicker: Eavesdropping Computer-Usage Activities through Acoustic Side Channel
发表于 2022/9/21 来源 Wireless Communications and Mobile Computing DOI 10.1155/2022/8090652
作者
Chen Mengqi Lin Jiawei Liu WeiFeng Wu Kaishun
单位
College of Computer Science and Software Engineering,Shenzhen University,China
摘要
Computers are widely used for business and entertainment purposes throughout our modern lives. Computer kits provide a variety of services such as tex 更多..
Anonymous Identity Based Broadcast Encryption against Continual Side Channel Attacks in the State Partition Model
发表于 2022/9/19 来源 Applied Sciences DOI 10.3390/APP12189395
作者
Yu Qihong Li Jiguo Ji Sai
单位
College of Information Engineering, Suqian University, Suqian 223800, China;College of Computer and Cyber Security, Fujian Normal University, Fuzhou 350117, Chi展开 College of Information Engineering, Suqian University, Suqian 223800, China;College of Computer and Cyber Security, Fujian Normal University, Fuzhou 350117, China
摘要
In the past 10 years, many side-channel attacks have been discovered and exploited one after another by attackers, which have greatly damaged the secu 更多..
A State Transition Based Cache Side Channel Attack Model
发表于 2022/8/1 来源 Journal of Physics: Conference Series DOI 10.1088/1742-6596/2333/1/012014
作者
Wang Chong Wei Shuai
单位
National Digital Switching System Engineering & Technological Research Center, Information Engineering University, St., 7th jianxue, Henan, P.R. China
摘要
Over the last decades, the Cache Side Channel Attack (CSCA) seriously threatens the security of user information, which repeatedly highlights the secu 更多..
Locating Side Channel Leakage in Time through Matched Filters
发表于 2022/5/30 来源 Cryptography DOI 10.3390/CRYPTOGRAPHY6020026
作者
Barenghi Alessandro Falcetti Gioele Pelosi Gerardo
单位
Department of Electronics, Information and Bioengineering (DEIB), Politecnico di Milano, 32, 20133 Milan, Italy
摘要
Side channel attacks provide an effective way to extract secret information from the execution of cryptographic algorithms run on a variety of computi 更多..
A Novel Power System Side Channel Attack Method Based on Machine Learning CNN-Transformer
发表于 2023/10/1 来源 Journal of Physics: Conference Series DOI 10.1088/1742-6596/2615/1/012011
作者
Zhang Xiaojuan Zhu Yayun Hu Baiji Cao Jingyi Lin Ziqing
单位
China Electric Power Research Institute Co., Ltd., Beijing 100192, China
摘要
Continuous advancements in cryptography and information technology have rendered current cryptographic algorithms highly robust against traditional cr 更多..
1 2 3