observatory 发表于 2025-3-30 09:39:21

http://reply.papertrans.cn/25/2406/240549/240549_51.png

强所 发表于 2025-3-30 13:19:06

Algebraic Side-Channel Attacks Beyond the Hamming Weight Leakage Modelhe side-channel leaks of a device under test (DUT) are represented as a system of equations, and a machine solver is used to find a key which satisfies these equations. A primary limitation of the ASCA method is the way it tolerates errors. If the correct key is excluded from the system of equations

Breach 发表于 2025-3-30 17:39:49

http://reply.papertrans.cn/25/2406/240549/240549_53.png

COMA 发表于 2025-3-30 22:42:53

Unified and Optimized Linear Collision Attacks and Their Application in a Non-profiled Settings paper, we discuss their relevance in the security evaluation of leaking devices with two main contributions. On the one hand, we suggest that the exploitation of linear collisions in block ciphers can be naturally re-written as a Low Density Parity Check Code decoding problem. By combining this re

PAC 发表于 2025-3-31 03:05:52

Towards Super-Exponential Side-Channel Security with Efficient Leakage-Resilient PRFsmost important such primitives, because they are stateless and do not require a secure initialization as, e.g. stream ciphers. However, their deployment in actual applications is still limited by security and efficiency concerns. This paper contributes to solve these issues in two directions. On the

同谋 发表于 2025-3-31 08:04:18

Practical Leakage-Resilient Symmetric Cryptographyre provably secure within it. Informally, a scheme is . if it remains secure even if an adversary learns a bounded amount of arbitrary information about the schemes internal state. Unfortunately, most leakage resilient schemes are unnecessarily complicated in order to achieve strong provable securit

按等级 发表于 2025-3-31 11:08:08

A Statistical Model for DPA with Novel Algorithmic Confusion Analysisy critical embedded systems. However, no theoretical model for the widely used differential power analysis (DPA) has revealed exactly what the success rate of DPA depends on and how. This paper proposes a statistical model for DPA that takes characteristics of both the physical implementation and cr

Ankylo- 发表于 2025-3-31 15:08:53

http://reply.papertrans.cn/25/2406/240549/240549_58.png

琐事 发表于 2025-3-31 20:12:12

Soft Decision Error Correction for Compact Memory-Based PUFs Using a Single Enrollmently Unclonable Functions (PUFs) based on uninitialized SRAM are an effective way to securely store a key based on the unique physical characteristics of an Integrated Circuit (IC). The start-up state of an SRAM memory is unpredictable but not truly random as well as noisy, hence privacy amplification

虚假 发表于 2025-4-1 00:48:31

PUFs: Myth, Fact or Busted? A Security Evaluation of Physically Unclonable Functions (PUFs) Cast in ocols and security architectures. However, the security features of PUFs are still under investigation: Evaluation results in the literature are difficult to compare due to varying test conditions, different analysis methods and the fact that representative data sets are publicly unavailable..In thi
页: 1 2 3 4 5 [6] 7
查看完整版本: Titlebook: Cryptographic Hardware and Embedded Systems -- CHES 2012; 14th International W Emmanuel Prouff,Patrick Schaumont Conference proceedings 201