Sciweavers

525 search results - page 9 / 105
» The Davies-Murphy Power Attack
Sort
View
IFIP
2010
Springer
13 years 4 months ago
Foundations of Attack-Defense Trees
We introduce and give formal definitions of attack
Barbara Kordy, Sjouke Mauw, Sasa Radomirovic, Patr...
CHES
2000
Springer
204views Cryptology» more  CHES 2000»
14 years 2 months ago
Using Second-Order Power Analysis to Attack DPA Resistant Software
Under a simple power leakage model based on Hamming weight, a software implementation of a data-whitening routine is shown to be vulnerable to a first-order Differential Power Anal...
Thomas S. Messerges
FPL
2008
Springer
157views Hardware» more  FPL 2008»
13 years 11 months ago
Chosen-message SPA attacks against FPGA-based RSA hardware implementations
This paper presents SPA (Simple Power Analysis) attacks against public-key cryptosystems implemented on an FPGA platform. The SPA attack investigates a power waveform generated by...
Atsushi Miyamoto, Naofumi Homma, Takafumi Aoki, Ak...
IJDSN
2006
114views more  IJDSN 2006»
13 years 9 months ago
The Sleep Deprivation Attack in Sensor Networks: Analysis and Methods of Defense
The ability of sensor nodes to enter a low power sleep mode is very useful for extending network longevity. We show how adversary nodes can exploit clustering algorithms to ensure ...
Matthew Pirretti, Sencun Zhu, Narayanan Vijaykrish...
WISA
2010
Springer
13 years 7 months ago
Improved Trace-Driven Cache-Collision Attacks against Embedded AES Implementations
In this paper we present two attacks that exploit cache events, which are visible in some side channel, to derive a secret key used in an implementation of AES. The first is an imp...
Jean-François Gallais, Ilya Kizhvatov, Mich...