A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2010; you can also visit the original URL.
The file type is application/pdf
.
Filters
The World Is Not Enough: Another Look on Second-Order DPA
[chapter]
2010
Lecture Notes in Computer Science
Further, we also investigate the case of second-and third-order masking (i.e. using three and four shares to represent one value). ...
In other words, while a single distinguisher can be used to compare the susceptibility of different unprotected devices to first-order DPA, understanding second-order attacks requires to carefully investigate ...
Summarizing, these experiments confirm the "world is not enough" nature of second-order DPA. ...
doi:10.1007/978-3-642-17373-8_7
fatcat:n3kgpqylyfbp3czrekvnpdatpe
Evaluation of countermeasure implementations based on Boolean masking to thwart side-channel attacks
2009
2009 3rd International Conference on Signals, Circuits and Systems (SCS)
In this study the masking countermeasure is tested with firstorder and higher-order SCAs on a fully-fledged DES. ...
This attack is based on a variance analysis of the observed power consumption and it clearly shows the vulnerabilities of masking countermeasures. ...
The second-order DPA as the one already presented in literature is hardly possible on a fully-fledged DES cryptoprocessor. ...
doi:10.1109/icscs.2009.5412597
fatcat:ix5szlc7ibcp3kldr7osujdh5u
Survey of Parallel A* in Rust
[article]
2021
arXiv
pre-print
A* is one of the most popular Best First Search (BFS) techniques for graphs. ...
We will attempt an implementation of each in Rust to determine if there is a performance boost, and which one has the best performance. ...
The problem is that since a lock is used and threads will likely be waiting on one another, SPA* has worse runtimes than single threaded A* (which is why we are not pursuing the implementation of SPA*) ...
arXiv:2105.03573v1
fatcat:ekzr2h3kr5c3rmmj7d65map2ii
IPA: A New Class of Power Attacks
[chapter]
1999
Lecture Notes in Computer Science
In the key extraction stage, the key is obtained from a very few power traces; we have successfully extracted keys from a single trace. ...
Compared to differential power analysis, IPA has the advantages that the attacker does not need either plaintext or ciphertext, and that, in the key extraction stage, a key can be obtained from a small ...
The S-box operations within a round do not depend on one another, and thus all 8! orderings of S-boxes are possible. ...
doi:10.1007/3-540-48059-5_16
fatcat:xubaq5yxcrdgxc4qajuf2sp6ky
Experiments in attacking FPGA-based embedded systems using differential power analysis
2008
2008 IEEE International Conference on Electro/Information Technology
, or c) experimented using custom hardware that does not closely mirror real-world systems. ...
when performing the DPA attack on our chosen commercial platform. ...
One limitation of this approach is that the FPGA is placed on a custom board in order to facilitate the power analysis. ...
doi:10.1109/eit.2008.4554259
dblp:conf/eit/SunYZ08
fatcat:h4u4wqz6efdfrkrnkviv2vpw4u
Open source platform Digital Personal Assistant
[article]
2018
arXiv
pre-print
The system is designed to use the DPA as a learning platform for engineers to provide them with the opportunity to create and test their own hypothesis. ...
The DPA is able to recognize users' commands in natural language and transform it to the set of machine commands that can be used to control different 3rd-party application. ...
Another problem is that most of IoT devices are not capable of managing computationally intensive tasks, thus centralized control is required in order to build complex Automation system. ...
arXiv:1801.03650v3
fatcat:f5zlfuvsirdjviiil46z4osyry
Second-Order Power Analysis Attacks against Precomputation based Masking Countermeasure
2016
International Journal of Smart Home
Precomputation look-up table based masking countermeasure is low-cost and secure against first-order DPA, therefore is more suitable for lightweight ciphers in resourceconstrained devices. ...
Otherwise, there are so few works focus on masked S-box as precomputation look-up table. ...
of second-order attack with electronic noise, which is the case for the real-world measurements of power consumption. ...
doi:10.14257/ijsh.2016.10.3.25
fatcat:ajjt6qmu3fhftnfrg66wxnrt5u
Leakage Squeezing Countermeasure against High-Order Attacks
[chapter]
2011
Lecture Notes in Computer Science
The first one is based on a recoded memory with a size squared w.r.t. the unprotected requirement, whilst the second one is an enhancement alleviating the requirement for a large memory. ...
In particular, second order attacks (2O-attacks) have been improved and successfully applied to break many masked implementations. ...
Acknowledgment This work has been supported by the french Agency "Agence Nationale de la Recherche" in the frame of the SECRESOC project ANR-09-SEGI-013. ...
doi:10.1007/978-3-642-21040-2_14
fatcat:kckw2bylxrfbbamcyv36y5qphq
Maintaining Economic Freedom under the Defense Act of 1950
1951
The University of Chicago Law Review
One difficulty with this approach was that to a certain extent it shifted shortages from one material to another, since orders did not prohibit the manufacture of a nonessential article, but merely prohibited ...
The significance of this second order can be appreciated only in the light of World War II experiences in assigning priorities. ...
In the very exercise of these democratic concepts analyzed herein, it is not enough for individuals to say that this program will prevent communism from spreading. ...
doi:10.2307/1597679
fatcat:b552vc6wenhq5bvvbdifw2qbg4
Findings and Recommendations
[chapter]
2012
Privacy Impact Assessment
Here is yet another example: On 9 December 2014, DPAs from around the world sent a letter to the operators of seven app marketplaces (Apple, Google, Samsung, Microsoft, Nokia, BlackBerry and Amazon.com ...
Portugal Most of the time, DPAs are not aware of enforcement actions carried out by others, because there is no report system in place for such actions, at least not in a regular basis or widely enough ...
doi:10.1007/978-94-007-2543-0_22
fatcat:z5xhu36qdnglhoajogxpzhuevq
On using genetic algorithms for intrinsic side-channel resistance
2014
Proceedings of the First Workshop on Cryptography and Security in Computing Systems - CS2 '14
The property of transparency order is important since it specifies the resilience of an S-box against differential power analysis. ...
Finding balanced S-boxes with high nonlinearity and low transparency order is a difficult problem. ...
Acknowledgments This work was supported in part by the Technology Foundation STW (project 12624 -SIDES), The Netherlands Organization for Scientific Research NWO (project ProFIL 628.001.007) and the ICT ...
doi:10.1145/2556315.2556319
dblp:conf/hipeac/PicekEBJCG14
fatcat:il3v3qwtivbb7gnxtaguqharbu
The Brave New World of Digital Personal Assistants: Benefits and Challenges from an Economic Perspec-tive
2018
Social Science Research Network
on the DPA market and economic dependence on a dominant DPA, potential leveraging of DPA suppliers' market power into neighboring markets, personalized data (ab)use and privacy, media bias and manipulation ...
A DPA is an intelligent automated system that interacts with the user through a dialogue in natural language, and meanwhile applying third-party services to obtain information and perform various actions ...
Consumer protection policy may attempt to make users better informed and behave more rationally by information campaigns -but whether this is enough remains doubtful at the least when looking at such phenomena ...
doi:10.2139/ssrn.3306169
fatcat:jkg5p3wxpjawbietfut2ttdix4
Digital Complementary Assets
2011
International Conference on Information Systems
Second, we differentiate three models for how organizations can engage with such digital complementary assets. Third, user-base is found to be a critical factor when considering appropriability. ...
However, despite the rapid uptake and their obvious influence on the behavior of individuals and the business models and networks of organizations, we still lack a deeper, theory-guided understanding of ...
This second aspect of appropriability varies across industries and from one technology to another. ...
dblp:conf/icis/RosemannAL11
fatcat:oxxcno5lzvg27cj6tztwsva5pi
Controlled Label Propagation: Preventing Over-Propagation through Gradual Expansion
[article]
2015
arXiv
pre-print
However, it has one major flaw; when the community structure in the network is not clear enough, it will assign every node the same label, thus detecting the whole graph as one giant community. ...
Preliminary results show that not only our extension improves the detection capability of classic label propagation algorithm when communities are not clearly detectable, but also improves the overall ...
ACKNOWLEDGMENT The authors would like to thank Dr.Šubelj for kindly providing us with the codes of BPA and DPA algorithms. ...
arXiv:1503.04694v1
fatcat:5xnosj74vzerjj3of5hy55k3ua
Breakthrough Silicon Scanning Discovers Backdoor in Military Chip
[chapter]
2012
Lecture Notes in Computer Science
This paper is a short summary of the first real world detection of a backdoor in a military grade FPGA. ...
The backdoor was found amongst additional JTAG functionality and exists on the silicon itself, it was not present in any firmware loaded onto the chip. ...
Communication was analysed with DPA, while the functions of control registers were tested with both DPA and PEA. This is because for some operations DPA is not sensitive enough. ...
doi:10.1007/978-3-642-33027-8_2
fatcat:tbcqe3s6ubhnnfholsxc6v5du4
« Previous
Showing results 1 — 15 out of 2,927 results