A Chaotic Cryptographic System against Power Analysis Attack

被引:0
|
作者
Luo, Yuling [1 ,2 ]
Li, Tianhao [1 ]
Xiao, Dingwei [1 ]
Qiu, Senhui [1 ,3 ]
机构
[1] School of Electronic Engineering, Guangxi Normal University, Guilin,541004, China
[2] Guangxi Key Lab of Multi-source Information Mining & Security, Guilin,541004, China
[3] Guangxi Key Laboratory of Wireless Wideband Communication and Signal Processing, Guilin,541004, China
关键词
D O I
10.16339/j.cnki.hdxbzkb.2022268
中图分类号
学科分类号
摘要
33
引用
收藏
页码:47 / 57
相关论文
共 50 条
  • [31] Dynamic Gold Code-Based Chaotic Clock for Cryptographic Designs to Counter Power Analysis Attacks
    Tran, Thai-Ha
    Le, Anh-Tien
    Hoang, Trong-Thuc
    Hoang, Van-Phuc
    Pham, Cong-Kha
    [J]. PROCEEDINGS OF THE GREAT LAKES SYMPOSIUM ON VLSI 2023, GLSVLSI 2023, 2023, : 439 - 442
  • [32] Research on elliptic curve cryptographic algorithms based on Chaotic System
    Liu, Ming-lai
    Wei, Guang-zheng
    Zhao, Geng
    Zhang, Shao-po
    [J]. 2013 INTERNATIONAL CONFERENCE ON COMPUTER SCIENCES AND APPLICATIONS (CSA), 2013, : 77 - 81
  • [33] Design of a Cryptographic System for Communication Security using Chaotic Signals
    Leu, Jai-Houng
    Sun, Jung-Kang
    Chen, Ho-Sheng
    Huang, Chong-Lin
    Qiao, Dong-Kai
    Lan, Tian-Syung
    Chen, Yu-Chih
    Su, Ay
    [J]. MATHEMATICAL PROBLEMS IN ENGINEERING, 2021, 2021
  • [34] Machine Learning Attack to Power Traces of Data Movement in Cryptographic Chip
    Zhang, Liang-Liang
    Tang, You
    Zhang, Yi-Wei
    Wang, Xin-An
    [J]. Dianzi Keji Daxue Xuebao/Journal of the University of Electronic Science and Technology of China, 2019, 48 (03): : 415 - 419
  • [35] Differential power analysis for cryptographic ICs
    Chu Jie
    Zhao Qiang
    Ding Guoliang
    Deng Gaoming
    [J]. ICEMI 2007: PROCEEDINGS OF 2007 8TH INTERNATIONAL CONFERENCE ON ELECTRONIC MEASUREMENT & INSTRUMENTS, VOL IV, 2007, : 292 - 295
  • [36] A modified chaotic cryptographic method
    Wong, WK
    Lee, LP
    Wong, KW
    [J]. COMMUNICATIONS AND MULTIMEDIA SECURITY ISSUES OF THE NEW CENTURY, 2001, 64 : 123 - 126
  • [37] A modified chaotic cryptographic method
    Wong, WK
    Lee, LP
    Wong, KW
    [J]. COMPUTER PHYSICS COMMUNICATIONS, 2001, 138 (03) : 234 - 236
  • [38] A Novel Power Analysis Attack against CRYSTALS-Dilithium Implementation
    Liu, Yong
    Liu, Yuejun
    Zhou, Yongbin
    Gao, Yiwen
    Qiao, Zehua
    Wang, Huaxin
    [J]. IEEE EUROPEAN TEST SYMPOSIUM, ETS 2024, 2024,
  • [39] Proposal of PingPong-128 Countermeasure against Power Analysis Attack
    Kang, Young-Jin
    Kim, Ki-Hwan
    Lee, Hoon Jae
    [J]. 2019 21ST INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY (ICACT): ICT FOR 4TH INDUSTRIAL REVOLUTION, 2019, : 431 - 434
  • [40] CALPAN: Countermeasure against Leakage Power Analysis Attack by Normalized DDPL
    Padmini, C.
    Ravindra, J. V. R.
    [J]. PROCEEDINGS OF IEEE INTERNATIONAL CONFERENCE ON CIRCUIT, POWER AND COMPUTING TECHNOLOGIES (ICCPCT 2016), 2016,