observatory 发表于 2025-3-30 09:39:21
http://reply.papertrans.cn/25/2406/240549/240549_51.png强所 发表于 2025-3-30 13:19:06
Algebraic Side-Channel Attacks Beyond the Hamming Weight Leakage Modelhe side-channel leaks of a device under test (DUT) are represented as a system of equations, and a machine solver is used to find a key which satisfies these equations. A primary limitation of the ASCA method is the way it tolerates errors. If the correct key is excluded from the system of equationsBreach 发表于 2025-3-30 17:39:49
http://reply.papertrans.cn/25/2406/240549/240549_53.pngCOMA 发表于 2025-3-30 22:42:53
Unified and Optimized Linear Collision Attacks and Their Application in a Non-profiled Settings paper, we discuss their relevance in the security evaluation of leaking devices with two main contributions. On the one hand, we suggest that the exploitation of linear collisions in block ciphers can be naturally re-written as a Low Density Parity Check Code decoding problem. By combining this rePAC 发表于 2025-3-31 03:05:52
Towards Super-Exponential Side-Channel Security with Efficient Leakage-Resilient PRFsmost important such primitives, because they are stateless and do not require a secure initialization as, e.g. stream ciphers. However, their deployment in actual applications is still limited by security and efficiency concerns. This paper contributes to solve these issues in two directions. On the同谋 发表于 2025-3-31 08:04:18
Practical Leakage-Resilient Symmetric Cryptographyre provably secure within it. Informally, a scheme is . if it remains secure even if an adversary learns a bounded amount of arbitrary information about the schemes internal state. Unfortunately, most leakage resilient schemes are unnecessarily complicated in order to achieve strong provable securit按等级 发表于 2025-3-31 11:08:08
A Statistical Model for DPA with Novel Algorithmic Confusion Analysisy critical embedded systems. However, no theoretical model for the widely used differential power analysis (DPA) has revealed exactly what the success rate of DPA depends on and how. This paper proposes a statistical model for DPA that takes characteristics of both the physical implementation and crAnkylo- 发表于 2025-3-31 15:08:53
http://reply.papertrans.cn/25/2406/240549/240549_58.png琐事 发表于 2025-3-31 20:12:12
Soft Decision Error Correction for Compact Memory-Based PUFs Using a Single Enrollmently Unclonable Functions (PUFs) based on uninitialized SRAM are an effective way to securely store a key based on the unique physical characteristics of an Integrated Circuit (IC). The start-up state of an SRAM memory is unpredictable but not truly random as well as noisy, hence privacy amplification虚假 发表于 2025-4-1 00:48:31
PUFs: Myth, Fact or Busted? A Security Evaluation of Physically Unclonable Functions (PUFs) Cast in ocols and security architectures. However, the security features of PUFs are still under investigation: Evaluation results in the literature are difficult to compare due to varying test conditions, different analysis methods and the fact that representative data sets are publicly unavailable..In thi