Sciweavers

525 search results - page 11 / 105
» The Davies-Murphy Power Attack
Sort
View
CRITIS
2008
13 years 11 months ago
Testbeds for Assessing Critical Scenarios in Power Control Systems
Abstract. The paper presents a set of control system scenarios implemented in two testbeds developed in the context of the European Project CRUTIAL - CRitical UTility Infrastructur...
Giovanna Dondossola, Geert Deconinck, Fabrizio Gar...
CHES
2006
Springer
117views Cryptology» more  CHES 2006»
14 years 1 months ago
High-Resolution Side-Channel Attack Using Phase-Based Waveform Matching
This paper describes high-resolution waveform matching based on a Phase-Only Correlation (POC) technique and its application for a side-channel attack. Such attacks, such as Simple...
Naofumi Homma, Sei Nagashima, Yuichi Imai, Takafum...
INFOCOM
2012
IEEE
12 years 8 days ago
BitTrickle: Defending against broadband and high-power reactive jamming attacks
—Reactive jamming is not only cost effective, but also hard to track and remove due to its intermittent jamming behaviors. Frequency Hopping Spread Spectrum (FHSS) and Direct Seq...
Yao Liu, Peng Ning
FDTC
2006
Springer
117views Cryptology» more  FDTC 2006»
14 years 1 months ago
DPA on Faulty Cryptographic Hardware and Countermeasures
Abstract. Balanced gates are an effective countermeasure against power analysis attacks only if they can be guaranteed to maintain their power balance. Traditional testing and reli...
Konrad J. Kulikowski, Mark G. Karpovsky, Alexander...
DFT
2007
IEEE
101views VLSI» more  DFT 2007»
14 years 4 months ago
Power Attacks Resistance of Cryptographic S-Boxes with Added Error Detection Circuits
Many side-channel attacks on implementations of cryptographic algorithms have been developed in recent years demonstrating the ease of extracting the secret key. In response, vari...
Francesco Regazzoni, Thomas Eisenbarth, Johann Gro...