搜索结果: 1-15 共查到“军事学 Countermeasure”相关记录25条 . 查询时间(0.562 秒)
A Practicable Timing Attack Against HQC and its Countermeasure
HQC BCH decoding Timing attack
2019/8/8
In this paper, we present a practicable chosen ciphertext timing attack retrieving the secret key of HQC. The attack exploits a correlation between the weight of the error to be decoded and the runnin...
Transform-and-Encode: A Countermeasure Framework for Statistical Ineffective Fault Attacks on Block Ciphers
Fault Attack Block Cipher Masking
2019/5/23
Right from its introduction by Boneh et al., fault attacks (FA) have been established to be one of the most practical threats to both public key and symmetric key based cryptosystems. Statistical Inef...
A Countermeasure Against Statistical Ineffective Fault Analysis
fault injection attacks ineffective fault analysis countermeasures
2019/5/21
Current state-of-the-art countermeasures against Fault Injection Attacks (FIA) provide good protection against analysis methods that require the faulty ciphertext to derive the secret information, suc...
Achilles' Heel: the Unbalanced Mask Sets May Destroy a Masking Countermeasure
Side Channel Analysis Masking Countermeasures DPA Contest
2018/8/20
Low Entropy Masking Scheme (LEMS) has attracted wide attention for its low-cost feature of small fixed mask sets in Side-Channel-Analysis (SCA). To achieve the expected side channel security, it is ne...
Ground-up Root-cause Analysis guided Low-Overhead Generic Countermeasure for Electro-Magnetic Side-Channel Attack
EM Side-channel attack generic countermeasure cryptographic hardware
2018/6/25
The threat of side-channels is becoming increasingly prominent for resource-constrained internet-connected devices. While numerous power side-channel countermeasures have been proposed, a promising ap...
Thwarting Fault Attacks using the Internal Redundancy Countermeasure (IRC)
IRC Physical attacks Fault attacks
2017/9/25
A growing number of connected objects, with their high performance and low-resources constraints, are embedding lightweight ciphers for protecting the confidentiality of the data they manipulate or st...
Analyzing the Shuffling Side-Channel Countermeasure for Lattice-Based Signatures
Lattice-Based Cryptography BLISS Side-Channel Analysis
2017/2/20
Implementation security for lattice-based cryptography is still a vastly unexplored field. At CHES 2016, the very first side-channel attack on a lattice-based signature scheme was presented. Later, sh...
A New Birthday-Type Algorithm for Attacking the Fresh Re-Keying Countermeasure
LPN Ring-LPN fresh re-keying
2016/3/2
The fresh re-keying scheme is a countermeasure designed to protect low-cost devices against side-channel attacks. In this paper, we present a new birthday-type attack based on a refined reduction to R...
Proposing Individualization of the design of cryptographic hardware accelerators as countermeasure against structure and side channel analysis
implementation elliptic curve cryptography individualization of cryptographic hardware architectures
2016/1/9
Side channel and fault attacks take advantage from the fact that the behavior of crypto implementations can be observed and provide hints that simplify revealing keys. These attacks are normally prepa...
Wire-Tap Codes as Side-Channel Countermeasure - an FPGA-based experiment
Side-Channel Countermeasure FPGA-based experiment
2016/1/7
In order to provide security against side-channel attacks a
masking scheme which makes use of wire-tap codes has recently been proposed.
The scheme benefits from the features of binary linear codes,...
Fault Tolerant Infective Countermeasure for AES
Infective Countermeasure AES Randomization
2015/12/30
Infective countermeasures have been a promising class of
fault attack countermeasures. However, they have been subjected to several
attacks owing to lack of formal proofs of security and improper
i...
Fault Cryptanalysis of CHES 2014 Symmetric Infective Countermeasure
Fault Attack Infective Countermeasure AES
2015/12/30
Fault injection has become over the years one of the most
dangerous threats for embedded devices such as smartcards. It is thus
mandatory for any embedded system to implement efficient protections
...
Study of a Parity Check Based Fault-Detection Countermeasure for the AES Key Schedule
side-channel analysis fault attacks parity check countermeasure
2015/12/23
In this paper we study a parity check based countermeasure proposed by Chen
et al. that thwarts their attack by detecting byte fault injection during the AES key schedule
process.
Formal verification of a software countermeasure against instruction skip attacks
instruction skip countermeasure
2014/3/6
Fault attacks against embedded circuits enabled to define many new attack paths against secure circuits. Every attack path relies on a specific fault model which defines the type of faults that the at...
Formal Analysis of CRT-RSA Vigilant's Countermeasure Against the BellCoRe Attack
fault injection BellCoRe attack
2014/3/5
In our paper at PROOFS 2013, we formally studied a few known countermeasures to protect CRT-RSA against the BellCoRe fault injection attack. However, we left Vigilant's countermeasure and its alleged ...