Sciweavers

126 search results - page 13 / 26
» Power Analysis of FPGAs: How Practical is the Attack
Sort
View
WISA
2009
Springer
14 years 1 months ago
You Cannot Hide behind the Mask: Power Analysis on a Provably Secure S-Box Implementation
Power analysis has shown to be successful in breaking symmetric cryptographic algorithms implemented on low resource devices. Prompted by the breaking of many protected implementat...
J. Pan, J. I. den Hartog, Jiqiang Lu
TC
2008
13 years 6 months ago
Cryptanalysis with COPACOBANA
Cryptanalysis of ciphers usually involves massive computations. The security parameters of cryptographic algorithms are commonly chosen so that attacks are infeasible with availabl...
Tim Güneysu, Timo Kasper, Martin Novotn&yacut...
JCS
2011
72views more  JCS 2011»
13 years 1 months ago
Automatically deriving information-theoretic bounds for adaptive side-channel attacks
We present a model of adaptive attacks which we combine with information-theoretic metrics to quantify the information revealed to an adaptive adversary. This enables us to expres...
Boris Köpf, David A. Basin
ESORICS
2007
Springer
14 years 27 days ago
SilentKnock: Practical, Provably Undetectable Authentication
Port knocking is a technique first introduced in the blackhat and trade literature to prevent attackers from discovering and exploiting potentially vulnerable services on a networ...
Eugene Y. Vasserman, Nicholas Hopper, John Laxson,...
ICC
2007
IEEE
168views Communications» more  ICC 2007»
13 years 10 months ago
Analysis and Optimization of Power Control in Multiuser Cognitive Wireless Networks
In this paper, the problem about power control in multiuser cognitive networks is addressed. The scenario we study is a heterogeneous network, where multiple cognitive (without the...
Peng Cheng, Guanding Yu, Zhaoyang Zhang, Peiliang ...