搜索结果: 1-10 共查到“Differential power”相关记录10条 . 查询时间(0.125 秒)
Differential Power Analysis of XMSS and SPHINCS
Post-quantum cryptography Hash-based signatures DPA
2018/7/16
Quantum computing threatens conventional public-key cryptography. In response, standards bodies such as NIST increasingly focus on post-quantum cryptography. In particular, hash-based signature scheme...
Comparison of Cost of Protection Against Differential Power Analysis of Selected Authenticated Ciphers
Cryptography authenticated cipher field programmable gate array
2018/4/17
Authenticated ciphers, like all physical implementations of cryptography, are vulnerable to side-channel attacks, including differential power analysis (DPA). The t-test leakage detection methodology ...
Evolving S-Boxes with Reduced Differential Power Analysis Susceptibility
AES block ciphers S-box
2016/12/26
Differential power analysis targets S-boxes to break ciphers that resist cryptanalysis. We relax cryptanalytic constraints to lower S-box leakage, as quantified by the transparency order. We apply gen...
Differential Power Analysis of a McEliece Cryptosystem
Differential Power Analysis McEliece Cryptosystem QC-MDPC Codes
2016/1/8
This work presents the first differential power analysis of an implementation of the McEliece
cryptosystem. Target of this side-channel attack is a state-of-the-art FPGA implementation of the ef-
fi...
Security of Prime Field Pairing Cryptoprocessor Against Differential Power Attack
implementation / Pairing Based Cryptography Side-channel Analysis Power Analysis Attack DPA Attack Prime Fields
2012/3/28
This paper deals with the differential power attack on a pairing cryptoprocessor. The cryptoprocessor is designed for pairing computations on elliptic curves defined over finite fields with large prim...
Statistical Analysis of Second Order Differential Power Analysis
Embedded systems security cryptographic implementations side channel analysis higher order differential power analysis
2010/12/22
Second Order Differential Power Analysis (2ODPA) is a powerful side channel attack that allows an attacker to bypass the widely used masking countermeasure. To thwart 2ODPA, higher order masking may b...
Differential power analysis resistant hardware implementation of the RSA cryptosystem
RSA montgomery modular multiplier carry save adder side-channel attacks differential power analysis attack
2010/10/12
In this paper, RSA cryptosystem was implemented on hardware, then modified to be resistant against Differential Power Analysis attacks by using the Randomized Table Window method. This is the first FP...
Differential power analysis resistant hardware implementation of the RSA cryptosystem
RSA montgomery modular multiplier carry save adder side-channel attacks differential power analysis attack randomized table window method
2010/3/17
In this paper, RSA cryptosystem was implemented on hardware, then modified to be resistant against Differential Power Analysis attacks by using the Randomized Table Window method. This is the first FP...
Charge Recycling Sense Amplifier Based Logic:Securing Low Power Security IC’s against Differential Power Analysis
Charge Recycling Sense Amplifier Based Logic Securing Low Power Security IC’s Differential Power Analysis
2009/3/24
Charge Recycling Sense Amplifier Based Logic is presented. This logic is derived from Sense Amplifier
Based Logic, which is a logic style with signal independent power consumption that is capable to ...
USING PREDICTIVE DIFFERENTIAL POWER SPECTRUM AND SUBBAND MEL-SPECTRUM CENTROID FOR ROBUST SPEAKER RECOGNITION IN STATIONARY NOISES
Robust speaker recognition difference function subband
2013/6/28
In state-of-the-art speaker recognition systems, mel-sc aled freque nc y cepstr al coeff i ci ents (MFCCs) are perhaps the m ost w i dely used front-ends. One of the ma jor is sues with the M ...