搜索结果: 1-6 共查到“知识库 军事学 electromagnetic”相关记录6条 . 查询时间(0.055 秒)
Side-Channel Attacks on BLISS Lattice-Based Signatures -- Exploiting Branch Tracing Against strongSwan and Electromagnetic Emanations in Microcontrollers
BLISS branch tracing SPA
2017/6/5
In this paper, we investigate the security of the BLISS lattice-based signature scheme, one of the most promising candidates for post-quantum-secure signatures, against side-channel attacks. Several w...
ECDH Key-Extraction via Low-Bandwidth Electromagnetic Attacks on PCs
side-channel attack elliptic curve cryptography electromagnetic emanations
2016/2/23
We present the first physical side-channel attack on elliptic curve cryptography running on a PC. The attack targets the ECDH public-key encryption algorithm, as implemented in the latest version of G...
Influence of Electrical Circuits of ECC Designs on Shape of Electromagnetic Traces measured on FPGA
countermeasures against side-channel attacks FPGA electromagnetic traces
2016/1/4
Side channel attacks take advantage from the fact that the behavior of crypto implementations can be observed and provides hints that simplify revealing keys. The energy consumption of the chip that p...
Stealing Keys from PCs using a Radio: Cheap Electromagnetic Attacks on Windowed Exponentiation
side channell electromagnetic analysis RSA
2016/1/3
We present new side-channel attacks on RSA and ElGamal implementations that use the
popular sliding-window or fixed-window (m-ary) modular exponentiation algorithms. The attacks
can extract decrypti...
SoC it to EM: electromagnetic side-channel attacks on a complex system-on-chip
side-channel electromagnetic system on chip
2015/12/29
Increased complexity in modern embedded systems has presented
various important challenges with regard to side-channel attacks.
In particular, it is common to deploy SoC-based target devices with hi...
Electromagnetic Side Channels of an FPGA Implementation of AES
side channel attacks DEMA FPGA
2009/3/27
We show how to attack an FPGA implementation of AES
where all bytes are processed in parallel using differential electromagnetic
analysis. We first focus on exploiting local side channels to isolate...