A Chaotic Cryptographic System against Power Analysis Attack

被引:0
|
作者
Luo, Yuling [1 ,2 ]
Li, Tianhao [1 ]
Xiao, Dingwei [1 ]
Qiu, Senhui [1 ,3 ]
机构
[1] School of Electronic Engineering, Guangxi Normal University, Guilin,541004, China
[2] Guangxi Key Lab of Multi-source Information Mining & Security, Guilin,541004, China
[3] Guangxi Key Laboratory of Wireless Wideband Communication and Signal Processing, Guilin,541004, China
关键词
D O I
10.16339/j.cnki.hdxbzkb.2022268
中图分类号
学科分类号
摘要
33
引用
收藏
页码:47 / 57
相关论文
共 50 条
  • [41] Security Analysis of DoS Attack against the LTE-A System
    Cao, Wei
    Ma, Nan
    Zhang, Ping
    [J]. PROCEEDINGS OF 2017 3RD IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATIONS (ICCC), 2017, : 1287 - 1292
  • [42] Multi-Scroll Chaotic System Model and Its Cryptographic Application
    Liu, Song
    Wei, Yaping
    Liu, Jingyi
    Chen, Shiqiang
    Zhang, Guoping
    [J]. INTERNATIONAL JOURNAL OF BIFURCATION AND CHAOS, 2020, 30 (13):
  • [43] Construction of False Sequence Attack Against PLC based Power Control System
    Xiao, Min
    Wu, Jing
    Long, Chengnian
    Li, Shaoyuan
    [J]. PROCEEDINGS OF THE 35TH CHINESE CONTROL CONFERENCE 2016, 2016, : 10090 - 10095
  • [44] Towards Secure Cryptographic Software Implementation Against Side-Channel Power Analysis Attacks
    Luo, Pei
    Zhang, Liwei
    Fei, Yunsi
    Ding, A. Adam
    [J]. PROCEEDINGS OF THE ASAP2015 2015 IEEE 26TH INTERNATIONAL CONFERENCE ON APPLICATION-SPECIFIC SYSTEMS, ARCHITECTURES AND PROCESSORS, 2015, : 144 - 148
  • [45] Research on Power Analysis Against Software-based and Hardware-based Cryptographic Circuits
    Sun, Wei
    Liu, Jun-Rong
    Gu, Da-Wu
    Guo, Zheng
    Xie, Jun
    Ma, Bo
    [J]. INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND COMMUNICATION ENGINEERING (CSCE 2015), 2015, : 10 - 18
  • [46] A novel SM4 cryptographic architecture against higher order power analysis attacks
    Sun, Nengyuan
    Liu, Wenrui
    Cheng, Jiafeng
    Peng, Zhaokang
    Wang, Chunyang
    Sun, Caiban
    Sha, Heng
    Pan, Zhiyuan
    Jin, Ming
    Zhao, Hongyang
    Wang, Jinghe
    Wen, Yiming
    Kong, Pengliang
    Zhao, Yunfeng
    Wang, Yaoqiang
    Kose, Selcuk
    Yu, Weize
    [J]. INTERNATIONAL JOURNAL OF CIRCUIT THEORY AND APPLICATIONS, 2024, 52 (08) : 4184 - 4198
  • [47] A Critical Analysis of ISO 17825 ('Testing Methods for the Mitigation of Non-invasive Attack Classes Against Cryptographic Modules')
    Whitnall, Carolyn
    Oswald, Elisabeth
    [J]. ADVANCES IN CRYPTOLOGY - ASIACRYPT 2019, PT III, 2019, 11923 : 256 - 284
  • [48] A countermeasure against side channel attack on cryptographic LSI using clock variation mechanism
    Asai, Toshiya
    Shiozaki, Mitsuru
    Kubota, Takaya
    Fujino, Takeshi
    Yoshikawa, Masaya
    [J]. IEEJ Transactions on Electronics, Information and Systems, 2013, 133 (12) : 2134 - 2142
  • [49] A Practical Cryptographic Denial of Service Attack against 802.11i TKIP and CCMP
    Eian, Martin
    [J]. CRYPTOLOGY AND NETWORK SECURITY, 2010, 6467 : 62 - 75
  • [50] System Level Protection Against Side-Channel Attack Using High Performance Virtual Secure Circuit for Cryptographic Processor
    S. Madhavapandian
    P. MaruthuPandi
    [J]. Wireless Personal Communications, 2021, 117 : 2667 - 2677