Enhancing cryptographic code against side channel cryptanalysis with aspects

被引:0
|
作者
Université Libre de Bruxelles, Boulevard du Triomphe, 1050, Bruxelles, Belgium [1 ]
机构
关键词
Compilation and indexing terms; Copyright 2025 Elsevier Inc;
D O I
8th International Workshop on Security in Information Systems, WOSIS 2011, in Conjunction with ICEIS 2011
中图分类号
学科分类号
摘要
Side channel attack
引用
收藏
相关论文
共 50 条
  • [41] Side-Channel Analysis of Cryptographic RFIDs with Analog Demodulation
    Kasper, Timo
    Oswald, David
    Paar, Christof
    RFID SECURITY AND PRIVACY, 2012, 7055 : 61 - 77
  • [42] Using the Joint Distributions of a Cryptographic Function in Side Channel Analysis
    Linge, Yanis
    Dumas, Cecile
    Lambert-Lacroix, Sophie
    CONSTRUCTIVE SIDE-CHANNEL ANALYSIS AND SECURE DESIGN, 2014, 8622 : 199 - 213
  • [43] Protecting cryptographic integrated circuits with side-channel information
    Nagata, Makoto
    Fujimoto, Daisuke
    Miura, Noriyuki
    Homma, Naofumi
    Hayashi, Yu-ichi
    Sakiyama, Kazuo
    IEICE ELECTRONICS EXPRESS, 2017, 14 (02): : 1 - 13
  • [44] An Improved Method of Side Channel Leak Assessment for Cryptographic Algorithm
    Lu, Fuxiang
    Li, Weijian
    Huang, Zanyu
    Chen, Chuanlu
    Chen, Peng
    WEB AND BIG DATA, PT IV, APWEB-WAIM 2023, 2024, 14334 : 328 - 342
  • [45] Model design and parameter optimization of CNN for side-channel cryptanalysis
    Liu Y.L.
    Chen Y.K.
    Li W.X.
    Zhang Y.
    PeerJ Computer Science, 2022, 7
  • [46] Model design and parameter optimization of CNN for side-channel cryptanalysis
    Liu, Yun Lin
    Chen, Yan Kai
    Li, Wei Xiong
    Zhang, Yang
    PEERJ COMPUTER SCIENCE, 2022, 8
  • [47] Leakage Prototype Learning for Profiled Differential Side-Channel Cryptanalysis
    Bartkewitz, Timo
    IEEE TRANSACTIONS ON COMPUTERS, 2016, 65 (06) : 1761 - 1774
  • [48] Cryptographic weaknesses in the round transformation used in a block cipher with provable immunity against linear cryptanalysis
    Sakurai, K
    Zheng, YL
    ALGORITHMS AND COMPUTATION, 1996, 1178 : 376 - 385
  • [49] State-of-the-Art 3DES Pipelined Cryptographic Engine Design Against Side-Channel Attacks
    Shi, Kai
    Wang, Chunyang
    Cheng, Jiafeng
    Liu, Wenrui
    Sun, Nengyuan
    Zhao, Hongyang
    Sha, Heng
    Pan, Zhiyuan
    Jin, Ming
    Wang, Jinghe
    Niu, Zhaoyi
    Li, Jianghong
    Wang, Jiaqi
    Xue, Aobo
    Wen, Yiming
    Ning, Yafei
    Kose, Selcuk
    Yu, Weize
    INTERNATIONAL JOURNAL OF CIRCUIT THEORY AND APPLICATIONS, 2024,
  • [50] Electromagnetic Information Leakage for Side-Channel Analysis of Cryptographic Modules
    Homma, Naofumi
    Aoki, Takafumi
    Satoh, Akashi
    2010 IEEE INTERNATIONAL SYMPOSIUM ON ELECTROMAGNETIC COMPATIBILITY (EMC 2010), 2010, : 97 - 102