Sciweavers

525 search results - page 3 / 105
» The Davies-Murphy Power Attack
Sort
View
TC
2002
13 years 9 months ago
Examining Smart-Card Security under the Threat of Power Analysis Attacks
Thomas S. Messerges, Ezzy A. Dabbish, Robert H. Sl...
PQCRYPTO
2010
176views Cryptology» more  PQCRYPTO 2010»
13 years 8 months ago
Practical Power Analysis Attacks on Software Implementations of McEliece
The McEliece public-key cryptosystem is based on the fact that decoding unknown linear binary codes is an NP-complete problem. The interest on implementing post-quantum cryptograph...
Stefan Heyse, Amir Moradi, Christof Paar
MOBILIGHT
2010
13 years 4 months ago
Stealthy Compromise of Wireless Sensor Nodes with Power Analysis Attacks
Node capture is considered as one of the most critical issues in the security of wireless sensor networks. A popular approach to thwart the problem relies on the detection of event...
Giacomo de Meulenaer, François-Xavier Stand...
CISS
2010
IEEE
13 years 1 months ago
Limiting false data attacks on power system state estimation
Abstract-Malicious attacks against power system state estimation are considered. It has been recently observed that if an adversary is able to manipulate the measurements taken at ...
Oliver Kosut, Liyan Jia, Robert J. Thomas, Lang To...
EIT
2008
IEEE
13 years 11 months ago
Experiments in attacking FPGA-based embedded systems using differential power analysis
Abstract--In the decade since the concept was publicly introduced, power analysis attacks on cryptographic systems have become an increasingly studied topic in the computer securit...
Song Sun, Zijun Yan, Joseph Zambreno