Academic literature on the topic 'Differential power analysis attacks'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Differential power analysis attacks.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Differential power analysis attacks"
Liu, Hongming, Yujie Zhou, and Nianhao Zhu. "A Novel Elliptic Curve Scalar Multiplication Algorithm against Power Analysis." Mathematical Problems in Engineering 2013 (2013): 1–7. http://dx.doi.org/10.1155/2013/862508.
Full textSoares, Rafael I., Ney L. V. Calazans, Victor Lomné, Amine Dehbaoui, Philippe Maurine, and Lionel Torres. "A GALS Pipeline DES Architecture to Increase Robustness against CPA and CEMA Attacks." Journal of Integrated Circuits and Systems 6, no. 1 (December 27, 2011): 25–34. http://dx.doi.org/10.29292/jics.v6i1.335.
Full textWang, An, Liji Wu, Zongyue Wang, Xuexin Zheng, Man Chen, and Jing Ma. "Two Improved Multiple-Differential Collision Attacks." Mathematical Problems in Engineering 2014 (2014): 1–11. http://dx.doi.org/10.1155/2014/209692.
Full textGhellar, Felipe, and Marcelo Lubaszewski. "A Novel AES Cryptographic Core Highly Resistant to Differential Power Analysis Attacks." Journal of Integrated Circuits and Systems 4, no. 1 (November 21, 2009): 29–35. http://dx.doi.org/10.29292/jics.v4i1.294.
Full textMuresan, Radu, and Stefano Gregori. "Protection Circuit against Differential Power Analysis Attacks for Smart Cards." IEEE Transactions on Computers 57, no. 11 (November 2008): 1540–49. http://dx.doi.org/10.1109/tc.2008.107.
Full textAlioto, Massimo, Massimo Poli, and Santina Rocchi. "A General Power Model of Differential Power Analysis Attacks to Static Logic Circuits." IEEE Transactions on Very Large Scale Integration (VLSI) Systems 18, no. 5 (May 2010): 711–24. http://dx.doi.org/10.1109/tvlsi.2009.2015327.
Full textLomné, V., A. Dehbaoui, T. Ordas, P. Maurine, L. Torres, M. Robert, R. Soares, N. Calazans, and F. Moraes. "Secure Triple Track Logic Robustness Against Differential Power and Electromagnetic Analyses." Journal of Integrated Circuits and Systems 4, no. 1 (November 21, 2009): 20–28. http://dx.doi.org/10.29292/jics.v4i1.293.
Full textMahanta, Hridoy Jyoti, and Ajoy Kumar Khan. "Improving Power Analysis Peak Distribution Using Canberra Distance to Address Ghost Peak Problem." International Journal of Information Security and Privacy 12, no. 3 (July 2018): 27–41. http://dx.doi.org/10.4018/ijisp.2018070103.
Full textYuan, Yanling, Zuyi Li, and Kui Ren. "Modeling Load Redistribution Attacks in Power Systems." IEEE Transactions on Smart Grid 2, no. 2 (June 2011): 382–90. http://dx.doi.org/10.1109/tsg.2011.2123925.
Full textJeongChoon Ryoo, Dong-Guk Han, Sung-Kyoung Kim, and Sangjin Lee. "Performance Enhancement of Differential Power Analysis Attacks With Signal Companding Methods." IEEE Signal Processing Letters 15 (2008): 625–28. http://dx.doi.org/10.1109/lsp.2008.2002930.
Full textDissertations / Theses on the topic "Differential power analysis attacks"
McDaniel, Larry T. III. "An Investigation of Differential Power Analysis Attacks on FPGA-based Encryption Systems." Thesis, Virginia Tech, 2003. http://hdl.handle.net/10919/33451.
Full textMaster of Science
Manchanda, Antarpreet Singh. "Design Methodology for Differential Power Analysis Resistant Circuits." University of Cincinnati / OhioLINK, 2013. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1377866652.
Full textBelaïd, Sonia. "Security of cryptosystems against power-analysis attacks." Thesis, Paris, Ecole normale supérieure, 2015. http://www.theses.fr/2015ENSU0032/document.
Full textSide-channel attacks are the most efficient attacks against cryptosystems. While the classical blackbox attacks only exploit the inputs and outputs of cryptographic algorithms, side-channel attacks also get use of the physical leakage released by the underlying device during algorithms executions. In this thesis, we focus on one kind of side-channel attacks which exploits the power consumption of the underlying device to recover the algorithms secret keys. They are gathered under the term power-analysis attacks. Most of the existing power-analysis attacks rely on the observations of variables which only depend on a few secret bits using a divide-and-conquer strategy. In this thesis, we exhibit new kinds of attacks which exploit the observation of intermediate variables highly dependent on huge secrets. In particular, we show how to recover a 128-bit key by only recording the leakage of the Galois multiplication’s results between several known messages and this secret key. We also study two commonly used algorithmic countermeasures against side-channel attacks: leakage resilience and masking. On the one hand, we define a leakage-resilient encryption scheme based on a regular update of the secret key and we prove its security. On the other hand, we build, using formal methods, a tool to automatically verify the security of masked algorithms. We also exhibit new security and compositional properties which can be used to generate masked algorithms at any security order from their unprotected versions. Finally, we propose a comparison between these two countermeasures in order to help industrial experts to determine the best protection to integrate in their products, according to their constraints in terms of security and performances
Lomne, Victor. "Power and Electro-Magnetic Side-Channel Attacks : threats and countermeasures." Thesis, Montpellier 2, 2010. http://www.theses.fr/2010MON20220.
Full textIn cryptography, a cipher is considered as a black-box, and an attacker has only access to plaintexts and ciphertexts. But a real world cryptographic device leaks additionnal sensitive informations during a cryptographic operation, such as power consumption or electro-magnetic radiations. As a result, several techniques, called Side-Channel Attacks, allow exploiting these physical leakages to break ciphers with a very low complexity in comparison with methods of classical cryptanalysis. In this work, power and electro-magnetic Side-Channel Attacks are firstly studied from an algorithmic point-of-view, and some improvements are proposed. Then, a particular attention is given on the exploitation of the electro-magnetic side-channel, and a simulation flow predicting magnetic radiations of ICs is proposed and validated on two microcontrollers. Finally, some countermeasures allowing to protect ciphers against these threats, based on balanced logic styles, are presented and evaluated
Carmona, Manuel Bejarano. "A simple and low cost platform to perform Power Analysis Attacks." Thesis, Blekinge Tekniska Högskola, Sektionen för ingenjörsvetenskap, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-5811.
Full textRAMMOHAN, SRIVIDHYA. "REDUCED COMPLEMENTARY DYNAMIC AND DIFFERENTIAL CMOS LOGIC: A DESIGN METHODOLOGY FOR DPA RESISTANT CRYPTOGRAPHIC CIRCUITS." University of Cincinnati / OhioLINK, 2007. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1179459225.
Full textPerera, Kevin. "An Automatable Workflow to Analyze and Secure Integrated Circuits Against Power Analysis Attacks." Case Western Reserve University School of Graduate Studies / OhioLINK, 2017. http://rave.ohiolink.edu/etdc/view?acc_num=case1491319301653169.
Full textYu, Weize. "Exploiting On-Chip Voltage Regulators as a Countermeasure Against Power Analysis Attacks." Scholar Commons, 2017. http://scholarcommons.usf.edu/etd/6986.
Full textRathnala, Prasanthi. "Power efficient and power attacks resistant system design and analysis using aggressive scaling with timing speculation." Thesis, University of Derby, 2017. http://hdl.handle.net/10545/621716.
Full textHoussain, Hilal. "Elliptic curve cryptography algorithms resistant against power analysis attacks on resource constrained devices." Thesis, Clermont-Ferrand 2, 2012. http://www.theses.fr/2012CLF22286/document.
Full textElliptic Curve Cryptosystems (ECC) have been adopted as a standardized Public Key Cryptosystems (PKC) by IEEE, ANSI, NIST, SEC and WTLS. In comparison to traditional PKC like RSA and ElGamal, ECC offer equivalent security with smaller key sizes, in less computation time, with lower power consumption, as well as memory and bandwidth savings. Therefore, ECC have become a vital technology, more popular and considered to be particularly suitable for implementation on resource constrained devices such as the Wireless Sensor Networks (WSN). Major problem with the sensor nodes in WSN as soon as it comes to cryptographic operations is their extreme constrained resources in terms of power, space, and time delay, which limit the sensor capability to handle the additional computations required by cryptographic operations. Moreover, the current ECC implementations in WSN are particularly vulnerable to Side Channel Analysis (SCA) attacks; in particularly to the Power Analysis Attacks (PAA), due to the lack of secure physical shielding, their deployment in remote regions and it is left unattended. Thus designers of ECC cryptoprocessors on WSN strive to introduce algorithms and architectures that are not only PAA resistant, but also efficient with no any extra cost in terms of power, time delay, and area. The contributions of this thesis to the domain of PAA aware elliptic curve cryptoprocessor for resource constrained devices are numerous. Firstly, we propose two robust and high efficient PAA aware elliptic curve cryptoprocessors architectures based on innovative algorithms for ECC core operation and envisioned at securing the elliptic curve cryptoprocessors against Simple Power Analysis (SPA) attacks on resource constrained devices such as the WSN. Secondly, we propose two additional architectures that are envisioned at securing the elliptic curve cryptoprocessors against Differential Power Analysis (DPA) attacks. Thirdly, a total of eight architectures which includes, in addition to the two SPA aware with the other two DPA awareproposed architectures, two more architectures derived from our DPA aware proposed once, along with two other similar PAA aware architectures. The eight proposed architectures are synthesized using Field Programmable Gate Array (FPGA) technology. Fourthly, the eight proposed architectures are analyzed and evaluated by comparing their performance results. In addition, a more advanced comparison, which is done on the cost complexity level (Area, Delay, and Power), provides a framework for the architecture designers to select the appropriate design. Our results show a significant advantage of our proposed architectures for cost complexity in comparison to the other latest proposed in the research field
Books on the topic "Differential power analysis attacks"
Zhukova, Galina, and Margarita Rushaylo. The mathematical analysis. Volume 2. ru: INFRA-M Academic Publishing LLC., 2020. http://dx.doi.org/10.12737/1072172.
Full textZhukova, Galina, and Margarita Rushaylo. Mathematical analysis in examples and tasks. Part 2. ru: INFRA-M Academic Publishing LLC., 2020. http://dx.doi.org/10.12737/1072162.
Full textZnO bao mo zhi bei ji qi guang, dian xing neng yan jiu. Shanghai Shi: Shanghai da xue chu ban she, 2010.
Find full textPower Analysis Attacks. Boston, MA: Springer US, 2007. http://dx.doi.org/10.1007/978-0-387-38162-6.
Full textPower Analysis Attacks: Revealing the Secrets of Smart Cards (Advances in Information Security). Springer, 2007.
Find full textTsygankov, Andrei P. The Dark Double. Oxford University Press, 2019. http://dx.doi.org/10.1093/oso/9780190919337.001.0001.
Full textFuglsang-Frederiksen, Anders, Kirsten Pugdahl, and Hatice Tankisi. Quantitative electromyography. Oxford University Press, 2016. http://dx.doi.org/10.1093/med/9780199688395.003.0008.
Full textGallo, Jason. Translating Science into Policy and Legislation. Edited by Kathleen Hall Jamieson, Dan M. Kahan, and Dietram A. Scheufele. Oxford University Press, 2017. http://dx.doi.org/10.1093/oxfordhb/9780190497620.013.27.
Full textSuls, Jerry, Rebecca L. Collins, and Ladd Wheeler, eds. Social Comparison, Judgment, and Behavior. Oxford University Press, 2019. http://dx.doi.org/10.1093/oso/9780190629113.001.0001.
Full textBook chapters on the topic "Differential power analysis attacks"
Mahanta, Hridoy Jyoti, Abul Kalam Azad, and Ajoy Kumar Khan. "Differential Power Analysis: Attacks and Resisting Techniques." In Advances in Intelligent Systems and Computing, 349–58. New Delhi: Springer India, 2015. http://dx.doi.org/10.1007/978-81-322-2247-7_36.
Full textYin, Huilin, and Ruiying Zhao. "Template-Based and Second-Order Differential Power Analysis Attacks on Masking." In Communications in Computer and Information Science, 8–14. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-35211-9_2.
Full textChoudhury, Amlan Jyoti, Beum Su Park, Ndibanje Bruce, Young Sil Lee, Hyotaek Lim, and Hoon Jae Lee. "An Efficient Hardware Countermeasure against Differential Power Analysis Attack." In Convergence and Hybrid Information Technology, 153–59. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-24106-2_20.
Full textShanmugam, Dillibabu, Ravikumar Selvam, and Suganya Annadurai. "Differential Power Analysis Attack on SIMON and LED Block Ciphers." In Security, Privacy, and Applied Cryptography Engineering, 110–25. Cham: Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-12060-7_8.
Full textPark, JeaHoon, HoonJae Lee, JaeCheol Ha, YongJe Choi, HoWon Kim, and SangJae Moon. "A Differential Power Analysis Attack of Block Cipher Based on the Hamming Weight of Internal Operation Unit." In Computational Intelligence and Security, 417–26. Berlin, Heidelberg: Springer Berlin Heidelberg, 2007. http://dx.doi.org/10.1007/978-3-540-74377-4_44.
Full textKocher, Paul, Joshua Jaffe, and Benjamin Jun. "Differential Power Analysis." In Advances in Cryptology — CRYPTO’ 99, 388–97. Berlin, Heidelberg: Springer Berlin Heidelberg, 1999. http://dx.doi.org/10.1007/3-540-48405-1_25.
Full textCaddy, Tom. "Differential Power Analysis." In Encyclopedia of Cryptography and Security, 336–38. Boston, MA: Springer US, 2011. http://dx.doi.org/10.1007/978-1-4419-5906-5_196.
Full textGruber, Michael, and Bodo Selmke. "Differential Fault Attacks on KLEIN." In Constructive Side-Channel Analysis and Secure Design, 80–95. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-16350-1_6.
Full textChari, Suresh, Charanjit S. Jutla, Josyula R. Rao, and Pankaj Rohatgi. "Power analysis: attacks and countermeasures." In Monographs in Computer Science, 415–39. New York, NY: Springer New York, 2003. http://dx.doi.org/10.1007/978-0-387-21798-7_19.
Full textOswald, Elisabeth, and Stefan Mangard. "Counteracting Power Analysis Attacks by Masking." In Integrated Circuits and Systems, 159–78. Boston, MA: Springer US, 2009. http://dx.doi.org/10.1007/978-0-387-71829-3_9.
Full textConference papers on the topic "Differential power analysis attacks"
Pitu, Ciprian Leonard, Ciprian Leonard Pitu, and Radu Campeanu. "Differential power analysis: Simulated versus experimental attacks." In 2013 IEEE 19th International Symposium for Design and Technology in Electronic Packaging (SIITME). IEEE, 2013. http://dx.doi.org/10.1109/siitme.2013.6743668.
Full textKhedkar, Ganesh, and Dhireesha Kudithipudi. "RRAM Motifs for Mitigating Differential Power Analysis Attacks (DPA)." In 2012 IEEE Computer Society Annual Symposium on VLSI (ISVLSI). IEEE, 2012. http://dx.doi.org/10.1109/isvlsi.2012.68.
Full textHan, Yu, Xuecheng Zou, Zhenglin Liu, and Yicheng Chen. "Improved Differential Power Analysis Attacks on AES Hardware Implementations." In 2007 International Conference on Wireless Communications, Networking and Mobile Computing. IEEE, 2007. http://dx.doi.org/10.1109/wicom.2007.556.
Full textZhang, Fan, and Zhijie Jerry Shi. "Differential and Correlation Power Analysis Attacks on HMAC-Whirlpool." In 2011 Eighth International Conference on Information Technology: New Generations (ITNG). IEEE, 2011. http://dx.doi.org/10.1109/itng.2011.70.
Full textGrigorescu, Andrea, and Holger Boche. "Differential Power Analysis Attacks from an Information-Theoretic Perspective." In 2019 IEEE Information Theory Workshop (ITW). IEEE, 2019. http://dx.doi.org/10.1109/itw44776.2019.8989406.
Full textLi, Jiayin, Daigu Zhang, Meikang Qiu, Yongxin Zhu, and Ju Shen. "Security protection on FPGA against differential power analysis attacks." In the Seventh Annual Workshop. New York, New York, USA: ACM Press, 2011. http://dx.doi.org/10.1145/2179298.2179375.
Full textJiang, Ke, Lejla Batina, Petru Eles, and Zebo Peng. "Robustness Analysis of Real-Time Scheduling Against Differential Power Analysis Attacks." In 2014 IEEE Computer Society Annual Symposium on VLSI (ISVLSI). IEEE, 2014. http://dx.doi.org/10.1109/isvlsi.2014.11.
Full textJiang, Ke, Petru Eles, Zebo Peng, Sudipta Chattopadhyay, and Lejla Batina. "SPARTA: A scheduling policy for thwarting differential power analysis attacks." In 2016 21st Asia and South Pacific Design Automation Conference (ASP-DAC). IEEE, 2016. http://dx.doi.org/10.1109/aspdac.2016.7428088.
Full textWu, Di, Xiaoxin Cui, Wei Wei, Rui Li, Dunshan Yu, and Xiaole Cui. "Research on circuit level countermeasures for Differential Power Analysis attacks." In 2012 IEEE 11th International Conference on Solid-State and Integrated Circuit Technology (ICSICT). IEEE, 2012. http://dx.doi.org/10.1109/icsict.2012.6467785.
Full textPapadopoulos, Konstantinos, Andreas Brokalakis, and Ioannis Papaefstathiou. "Increasing resistance to differential power analysis attacks in reconfigurable systems." In MELECON 2012 - 2012 16th IEEE Mediterranean Electrotechnical Conference. IEEE, 2012. http://dx.doi.org/10.1109/melcon.2012.6196393.
Full text