Sciweavers

168 search results - page 3 / 34
» Side-Channel Attack Pitfalls
Sort
View
64
Voted
SACRYPT
2007
Springer
126views Cryptology» more  SACRYPT 2007»
15 years 3 months ago
Improved Side-Channel Collision Attacks on AES
Abstract. Side-channel collision attacks were proposed in [1] and applied to AES in [2]. These are based on detecting collisions in certain positions of the internal state after th...
Andrey Bogdanov
99
Voted
ACNS
2009
Springer
150views Cryptology» more  ACNS 2009»
15 years 1 months ago
How to Compare Profiled Side-Channel Attacks?
Side-channel attacks are an important class of attacks against cryptographic devices and profiled side-channel attacks are the most powerful type of side-channel attacks. In this s...
François-Xavier Standaert, François ...
CHES
2000
Springer
111views Cryptology» more  CHES 2000»
15 years 1 months ago
How to Explain Side-Channel Leakage to Your Kids
This paper will attempt to explain some of the side-channel attack techniques in a fashion that is easily comprehensible by the layman. What follows is a presentation of three diļ¬...
David Naccache, Michael Tunstall
ESORICS
2008
Springer
14 years 11 months ago
Formally Bounding the Side-Channel Leakage in Unknown-Message Attacks
Abstract. We propose a novel approach for quantifying a system's resistance to unknown-message side-channel attacks. The approach is based on a measure of the secret informati...
Michael Backes, Boris Köpf
62
Voted
IFIP
2009
Springer
14 years 7 months ago
Specification and Verification of Side Channel Declassification
Side channel attacks have emerged as a serious threat to the security of both networked and embedded systems
Josef Svenningsson, David Sands