Literatura científica selecionada sobre o tema "Differential power analysis attacks"
Crie uma referência precisa em APA, MLA, Chicago, Harvard, e outros estilos
Consulte a lista de atuais artigos, livros, teses, anais de congressos e outras fontes científicas relevantes para o tema "Differential power analysis attacks".
Ao lado de cada fonte na lista de referências, há um botão "Adicionar à bibliografia". Clique e geraremos automaticamente a citação bibliográfica do trabalho escolhido no estilo de citação de que você precisa: APA, MLA, Harvard, Chicago, Vancouver, etc.
Você também pode baixar o texto completo da publicação científica em formato .pdf e ler o resumo do trabalho online se estiver presente nos metadados.
Artigos de revistas sobre o assunto "Differential power analysis attacks"
Liu, Hongming, Yujie Zhou e Nianhao Zhu. "A Novel Elliptic Curve Scalar Multiplication Algorithm against Power Analysis". Mathematical Problems in Engineering 2013 (2013): 1–7. http://dx.doi.org/10.1155/2013/862508.
Texto completo da fonteSoares, Rafael I., Ney L. V. Calazans, Victor Lomné, Amine Dehbaoui, Philippe Maurine e Lionel Torres. "A GALS Pipeline DES Architecture to Increase Robustness against CPA and CEMA Attacks". Journal of Integrated Circuits and Systems 6, n.º 1 (27 de dezembro de 2011): 25–34. http://dx.doi.org/10.29292/jics.v6i1.335.
Texto completo da fonteWang, An, Liji Wu, Zongyue Wang, Xuexin Zheng, Man Chen e Jing Ma. "Two Improved Multiple-Differential Collision Attacks". Mathematical Problems in Engineering 2014 (2014): 1–11. http://dx.doi.org/10.1155/2014/209692.
Texto completo da fonteGhellar, Felipe, e Marcelo Lubaszewski. "A Novel AES Cryptographic Core Highly Resistant to Differential Power Analysis Attacks". Journal of Integrated Circuits and Systems 4, n.º 1 (21 de novembro de 2009): 29–35. http://dx.doi.org/10.29292/jics.v4i1.294.
Texto completo da fonteMuresan, Radu, e Stefano Gregori. "Protection Circuit against Differential Power Analysis Attacks for Smart Cards". IEEE Transactions on Computers 57, n.º 11 (novembro de 2008): 1540–49. http://dx.doi.org/10.1109/tc.2008.107.
Texto completo da fonteAlioto, Massimo, Massimo Poli e Santina Rocchi. "A General Power Model of Differential Power Analysis Attacks to Static Logic Circuits". IEEE Transactions on Very Large Scale Integration (VLSI) Systems 18, n.º 5 (maio de 2010): 711–24. http://dx.doi.org/10.1109/tvlsi.2009.2015327.
Texto completo da fonteLomné, V., A. Dehbaoui, T. Ordas, P. Maurine, L. Torres, M. Robert, R. Soares, N. Calazans e F. Moraes. "Secure Triple Track Logic Robustness Against Differential Power and Electromagnetic Analyses". Journal of Integrated Circuits and Systems 4, n.º 1 (21 de novembro de 2009): 20–28. http://dx.doi.org/10.29292/jics.v4i1.293.
Texto completo da fonteMahanta, Hridoy Jyoti, e Ajoy Kumar Khan. "Improving Power Analysis Peak Distribution Using Canberra Distance to Address Ghost Peak Problem". International Journal of Information Security and Privacy 12, n.º 3 (julho de 2018): 27–41. http://dx.doi.org/10.4018/ijisp.2018070103.
Texto completo da fonteYuan, Yanling, Zuyi Li e Kui Ren. "Modeling Load Redistribution Attacks in Power Systems". IEEE Transactions on Smart Grid 2, n.º 2 (junho de 2011): 382–90. http://dx.doi.org/10.1109/tsg.2011.2123925.
Texto completo da fonteJeongChoon Ryoo, Dong-Guk Han, Sung-Kyoung Kim e Sangjin Lee. "Performance Enhancement of Differential Power Analysis Attacks With Signal Companding Methods". IEEE Signal Processing Letters 15 (2008): 625–28. http://dx.doi.org/10.1109/lsp.2008.2002930.
Texto completo da fonteTeses / dissertações sobre o assunto "Differential power analysis attacks"
McDaniel, Larry T. III. "An Investigation of Differential Power Analysis Attacks on FPGA-based Encryption Systems". Thesis, Virginia Tech, 2003. http://hdl.handle.net/10919/33451.
Texto completo da fonteMaster of Science
Manchanda, Antarpreet Singh. "Design Methodology for Differential Power Analysis Resistant Circuits". University of Cincinnati / OhioLINK, 2013. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1377866652.
Texto completo da fonteBelaïd, Sonia. "Security of cryptosystems against power-analysis attacks". Thesis, Paris, Ecole normale supérieure, 2015. http://www.theses.fr/2015ENSU0032/document.
Texto completo da fonteSide-channel attacks are the most efficient attacks against cryptosystems. While the classical blackbox attacks only exploit the inputs and outputs of cryptographic algorithms, side-channel attacks also get use of the physical leakage released by the underlying device during algorithms executions. In this thesis, we focus on one kind of side-channel attacks which exploits the power consumption of the underlying device to recover the algorithms secret keys. They are gathered under the term power-analysis attacks. Most of the existing power-analysis attacks rely on the observations of variables which only depend on a few secret bits using a divide-and-conquer strategy. In this thesis, we exhibit new kinds of attacks which exploit the observation of intermediate variables highly dependent on huge secrets. In particular, we show how to recover a 128-bit key by only recording the leakage of the Galois multiplication’s results between several known messages and this secret key. We also study two commonly used algorithmic countermeasures against side-channel attacks: leakage resilience and masking. On the one hand, we define a leakage-resilient encryption scheme based on a regular update of the secret key and we prove its security. On the other hand, we build, using formal methods, a tool to automatically verify the security of masked algorithms. We also exhibit new security and compositional properties which can be used to generate masked algorithms at any security order from their unprotected versions. Finally, we propose a comparison between these two countermeasures in order to help industrial experts to determine the best protection to integrate in their products, according to their constraints in terms of security and performances
Lomne, Victor. "Power and Electro-Magnetic Side-Channel Attacks : threats and countermeasures". Thesis, Montpellier 2, 2010. http://www.theses.fr/2010MON20220.
Texto completo da fonteIn cryptography, a cipher is considered as a black-box, and an attacker has only access to plaintexts and ciphertexts. But a real world cryptographic device leaks additionnal sensitive informations during a cryptographic operation, such as power consumption or electro-magnetic radiations. As a result, several techniques, called Side-Channel Attacks, allow exploiting these physical leakages to break ciphers with a very low complexity in comparison with methods of classical cryptanalysis. In this work, power and electro-magnetic Side-Channel Attacks are firstly studied from an algorithmic point-of-view, and some improvements are proposed. Then, a particular attention is given on the exploitation of the electro-magnetic side-channel, and a simulation flow predicting magnetic radiations of ICs is proposed and validated on two microcontrollers. Finally, some countermeasures allowing to protect ciphers against these threats, based on balanced logic styles, are presented and evaluated
Carmona, Manuel Bejarano. "A simple and low cost platform to perform Power Analysis Attacks". Thesis, Blekinge Tekniska Högskola, Sektionen för ingenjörsvetenskap, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-5811.
Texto completo da fonteRAMMOHAN, SRIVIDHYA. "REDUCED COMPLEMENTARY DYNAMIC AND DIFFERENTIAL CMOS LOGIC: A DESIGN METHODOLOGY FOR DPA RESISTANT CRYPTOGRAPHIC CIRCUITS". University of Cincinnati / OhioLINK, 2007. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1179459225.
Texto completo da fontePerera, Kevin. "An Automatable Workflow to Analyze and Secure Integrated Circuits Against Power Analysis Attacks". Case Western Reserve University School of Graduate Studies / OhioLINK, 2017. http://rave.ohiolink.edu/etdc/view?acc_num=case1491319301653169.
Texto completo da fonteYu, Weize. "Exploiting On-Chip Voltage Regulators as a Countermeasure Against Power Analysis Attacks". Scholar Commons, 2017. http://scholarcommons.usf.edu/etd/6986.
Texto completo da fonteRathnala, Prasanthi. "Power efficient and power attacks resistant system design and analysis using aggressive scaling with timing speculation". Thesis, University of Derby, 2017. http://hdl.handle.net/10545/621716.
Texto completo da fonteHoussain, Hilal. "Elliptic curve cryptography algorithms resistant against power analysis attacks on resource constrained devices". Thesis, Clermont-Ferrand 2, 2012. http://www.theses.fr/2012CLF22286/document.
Texto completo da fonteElliptic Curve Cryptosystems (ECC) have been adopted as a standardized Public Key Cryptosystems (PKC) by IEEE, ANSI, NIST, SEC and WTLS. In comparison to traditional PKC like RSA and ElGamal, ECC offer equivalent security with smaller key sizes, in less computation time, with lower power consumption, as well as memory and bandwidth savings. Therefore, ECC have become a vital technology, more popular and considered to be particularly suitable for implementation on resource constrained devices such as the Wireless Sensor Networks (WSN). Major problem with the sensor nodes in WSN as soon as it comes to cryptographic operations is their extreme constrained resources in terms of power, space, and time delay, which limit the sensor capability to handle the additional computations required by cryptographic operations. Moreover, the current ECC implementations in WSN are particularly vulnerable to Side Channel Analysis (SCA) attacks; in particularly to the Power Analysis Attacks (PAA), due to the lack of secure physical shielding, their deployment in remote regions and it is left unattended. Thus designers of ECC cryptoprocessors on WSN strive to introduce algorithms and architectures that are not only PAA resistant, but also efficient with no any extra cost in terms of power, time delay, and area. The contributions of this thesis to the domain of PAA aware elliptic curve cryptoprocessor for resource constrained devices are numerous. Firstly, we propose two robust and high efficient PAA aware elliptic curve cryptoprocessors architectures based on innovative algorithms for ECC core operation and envisioned at securing the elliptic curve cryptoprocessors against Simple Power Analysis (SPA) attacks on resource constrained devices such as the WSN. Secondly, we propose two additional architectures that are envisioned at securing the elliptic curve cryptoprocessors against Differential Power Analysis (DPA) attacks. Thirdly, a total of eight architectures which includes, in addition to the two SPA aware with the other two DPA awareproposed architectures, two more architectures derived from our DPA aware proposed once, along with two other similar PAA aware architectures. The eight proposed architectures are synthesized using Field Programmable Gate Array (FPGA) technology. Fourthly, the eight proposed architectures are analyzed and evaluated by comparing their performance results. In addition, a more advanced comparison, which is done on the cost complexity level (Area, Delay, and Power), provides a framework for the architecture designers to select the appropriate design. Our results show a significant advantage of our proposed architectures for cost complexity in comparison to the other latest proposed in the research field
Livros sobre o assunto "Differential power analysis attacks"
Zhukova, Galina, e Margarita Rushaylo. The mathematical analysis. Volume 2. ru: INFRA-M Academic Publishing LLC., 2020. http://dx.doi.org/10.12737/1072172.
Texto completo da fonteZhukova, Galina, e Margarita Rushaylo. Mathematical analysis in examples and tasks. Part 2. ru: INFRA-M Academic Publishing LLC., 2020. http://dx.doi.org/10.12737/1072162.
Texto completo da fonteZnO bao mo zhi bei ji qi guang, dian xing neng yan jiu. Shanghai Shi: Shanghai da xue chu ban she, 2010.
Encontre o texto completo da fontePower Analysis Attacks. Boston, MA: Springer US, 2007. http://dx.doi.org/10.1007/978-0-387-38162-6.
Texto completo da fontePower Analysis Attacks: Revealing the Secrets of Smart Cards (Advances in Information Security). Springer, 2007.
Encontre o texto completo da fonteTsygankov, Andrei P. The Dark Double. Oxford University Press, 2019. http://dx.doi.org/10.1093/oso/9780190919337.001.0001.
Texto completo da fonteFuglsang-Frederiksen, Anders, Kirsten Pugdahl e Hatice Tankisi. Quantitative electromyography. Oxford University Press, 2016. http://dx.doi.org/10.1093/med/9780199688395.003.0008.
Texto completo da fonteGallo, Jason. Translating Science into Policy and Legislation. Editado por Kathleen Hall Jamieson, Dan M. Kahan e Dietram A. Scheufele. Oxford University Press, 2017. http://dx.doi.org/10.1093/oxfordhb/9780190497620.013.27.
Texto completo da fonteSuls, Jerry, Rebecca L. Collins e Ladd Wheeler, eds. Social Comparison, Judgment, and Behavior. Oxford University Press, 2019. http://dx.doi.org/10.1093/oso/9780190629113.001.0001.
Texto completo da fonteCapítulos de livros sobre o assunto "Differential power analysis attacks"
Mahanta, Hridoy Jyoti, Abul Kalam Azad e Ajoy Kumar Khan. "Differential Power Analysis: Attacks and Resisting Techniques". In Advances in Intelligent Systems and Computing, 349–58. New Delhi: Springer India, 2015. http://dx.doi.org/10.1007/978-81-322-2247-7_36.
Texto completo da fonteYin, Huilin, e Ruiying Zhao. "Template-Based and Second-Order Differential Power Analysis Attacks on Masking". In Communications in Computer and Information Science, 8–14. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-35211-9_2.
Texto completo da fonteChoudhury, Amlan Jyoti, Beum Su Park, Ndibanje Bruce, Young Sil Lee, Hyotaek Lim e Hoon Jae Lee. "An Efficient Hardware Countermeasure against Differential Power Analysis Attack". In Convergence and Hybrid Information Technology, 153–59. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-24106-2_20.
Texto completo da fonteShanmugam, Dillibabu, Ravikumar Selvam e Suganya Annadurai. "Differential Power Analysis Attack on SIMON and LED Block Ciphers". In Security, Privacy, and Applied Cryptography Engineering, 110–25. Cham: Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-12060-7_8.
Texto completo da fontePark, JeaHoon, HoonJae Lee, JaeCheol Ha, YongJe Choi, HoWon Kim e SangJae Moon. "A Differential Power Analysis Attack of Block Cipher Based on the Hamming Weight of Internal Operation Unit". In Computational Intelligence and Security, 417–26. Berlin, Heidelberg: Springer Berlin Heidelberg, 2007. http://dx.doi.org/10.1007/978-3-540-74377-4_44.
Texto completo da fonteKocher, Paul, Joshua Jaffe e Benjamin Jun. "Differential Power Analysis". In Advances in Cryptology — CRYPTO’ 99, 388–97. Berlin, Heidelberg: Springer Berlin Heidelberg, 1999. http://dx.doi.org/10.1007/3-540-48405-1_25.
Texto completo da fonteCaddy, Tom. "Differential Power Analysis". In Encyclopedia of Cryptography and Security, 336–38. Boston, MA: Springer US, 2011. http://dx.doi.org/10.1007/978-1-4419-5906-5_196.
Texto completo da fonteGruber, Michael, e Bodo Selmke. "Differential Fault Attacks on KLEIN". In Constructive Side-Channel Analysis and Secure Design, 80–95. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-16350-1_6.
Texto completo da fonteChari, Suresh, Charanjit S. Jutla, Josyula R. Rao e Pankaj Rohatgi. "Power analysis: attacks and countermeasures". In Monographs in Computer Science, 415–39. New York, NY: Springer New York, 2003. http://dx.doi.org/10.1007/978-0-387-21798-7_19.
Texto completo da fonteOswald, Elisabeth, e Stefan Mangard. "Counteracting Power Analysis Attacks by Masking". In Integrated Circuits and Systems, 159–78. Boston, MA: Springer US, 2009. http://dx.doi.org/10.1007/978-0-387-71829-3_9.
Texto completo da fonteTrabalhos de conferências sobre o assunto "Differential power analysis attacks"
Pitu, Ciprian Leonard, Ciprian Leonard Pitu e Radu Campeanu. "Differential power analysis: Simulated versus experimental attacks". In 2013 IEEE 19th International Symposium for Design and Technology in Electronic Packaging (SIITME). IEEE, 2013. http://dx.doi.org/10.1109/siitme.2013.6743668.
Texto completo da fonteKhedkar, Ganesh, e Dhireesha Kudithipudi. "RRAM Motifs for Mitigating Differential Power Analysis Attacks (DPA)". In 2012 IEEE Computer Society Annual Symposium on VLSI (ISVLSI). IEEE, 2012. http://dx.doi.org/10.1109/isvlsi.2012.68.
Texto completo da fonteHan, Yu, Xuecheng Zou, Zhenglin Liu e Yicheng Chen. "Improved Differential Power Analysis Attacks on AES Hardware Implementations". In 2007 International Conference on Wireless Communications, Networking and Mobile Computing. IEEE, 2007. http://dx.doi.org/10.1109/wicom.2007.556.
Texto completo da fonteZhang, Fan, e Zhijie Jerry Shi. "Differential and Correlation Power Analysis Attacks on HMAC-Whirlpool". In 2011 Eighth International Conference on Information Technology: New Generations (ITNG). IEEE, 2011. http://dx.doi.org/10.1109/itng.2011.70.
Texto completo da fonteGrigorescu, Andrea, e Holger Boche. "Differential Power Analysis Attacks from an Information-Theoretic Perspective". In 2019 IEEE Information Theory Workshop (ITW). IEEE, 2019. http://dx.doi.org/10.1109/itw44776.2019.8989406.
Texto completo da fonteLi, Jiayin, Daigu Zhang, Meikang Qiu, Yongxin Zhu e Ju Shen. "Security protection on FPGA against differential power analysis attacks". In the Seventh Annual Workshop. New York, New York, USA: ACM Press, 2011. http://dx.doi.org/10.1145/2179298.2179375.
Texto completo da fonteJiang, Ke, Lejla Batina, Petru Eles e Zebo Peng. "Robustness Analysis of Real-Time Scheduling Against Differential Power Analysis Attacks". In 2014 IEEE Computer Society Annual Symposium on VLSI (ISVLSI). IEEE, 2014. http://dx.doi.org/10.1109/isvlsi.2014.11.
Texto completo da fonteJiang, Ke, Petru Eles, Zebo Peng, Sudipta Chattopadhyay e Lejla Batina. "SPARTA: A scheduling policy for thwarting differential power analysis attacks". In 2016 21st Asia and South Pacific Design Automation Conference (ASP-DAC). IEEE, 2016. http://dx.doi.org/10.1109/aspdac.2016.7428088.
Texto completo da fonteWu, Di, Xiaoxin Cui, Wei Wei, Rui Li, Dunshan Yu e Xiaole Cui. "Research on circuit level countermeasures for Differential Power Analysis attacks". In 2012 IEEE 11th International Conference on Solid-State and Integrated Circuit Technology (ICSICT). IEEE, 2012. http://dx.doi.org/10.1109/icsict.2012.6467785.
Texto completo da fontePapadopoulos, Konstantinos, Andreas Brokalakis e Ioannis Papaefstathiou. "Increasing resistance to differential power analysis attacks in reconfigurable systems". In MELECON 2012 - 2012 16th IEEE Mediterranean Electrotechnical Conference. IEEE, 2012. http://dx.doi.org/10.1109/melcon.2012.6196393.
Texto completo da fonte