Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








2,927 Hits in 6.7 sec

The World Is Not Enough: Another Look on Second-Order DPA [chapter]

François-Xavier Standaert, Nicolas Veyrat-Charvillon, Elisabeth Oswald, Benedikt Gierlichs, Marcel Medwed, Markus Kasper, Stefan Mangard
2010 Lecture Notes in Computer Science  
Further, we also investigate the case of second-and third-order masking (i.e. using three and four shares to represent one value).  ...  In other words, while a single distinguisher can be used to compare the susceptibility of different unprotected devices to first-order DPA, understanding second-order attacks requires to carefully investigate  ...  Summarizing, these experiments confirm the "world is not enough" nature of second-order DPA.  ... 
doi:10.1007/978-3-642-17373-8_7 fatcat:n3kgpqylyfbp3czrekvnpdatpe

Evaluation of countermeasure implementations based on Boolean masking to thwart side-channel attacks

Houssem Maghrebi, Jean-Luc Danger, Florent Flament, Sylvain Guilley, Laurent Sauvage
2009 2009 3rd International Conference on Signals, Circuits and Systems (SCS)  
In this study the masking countermeasure is tested with firstorder and higher-order SCAs on a fully-fledged DES.  ...  This attack is based on a variance analysis of the observed power consumption and it clearly shows the vulnerabilities of masking countermeasures.  ...  The second-order DPA as the one already presented in literature is hardly possible on a fully-fledged DES cryptoprocessor.  ... 
doi:10.1109/icscs.2009.5412597 fatcat:ix5szlc7ibcp3kldr7osujdh5u

Survey of Parallel A* in Rust [article]

Brett Fazio, Ellie Kozlowski, Dylan Ochoa, Blake Robertson, Idel Martinez
2021 arXiv   pre-print
A* is one of the most popular Best First Search (BFS) techniques for graphs.  ...  We will attempt an implementation of each in Rust to determine if there is a performance boost, and which one has the best performance.  ...  The problem is that since a lock is used and threads will likely be waiting on one another, SPA* has worse runtimes than single threaded A* (which is why we are not pursuing the implementation of SPA*)  ... 
arXiv:2105.03573v1 fatcat:ekzr2h3kr5c3rmmj7d65map2ii

IPA: A New Class of Power Attacks [chapter]

Paul N. Fahn, Peter K. Pearson
1999 Lecture Notes in Computer Science  
In the key extraction stage, the key is obtained from a very few power traces; we have successfully extracted keys from a single trace.  ...  Compared to differential power analysis, IPA has the advantages that the attacker does not need either plaintext or ciphertext, and that, in the key extraction stage, a key can be obtained from a small  ...  The S-box operations within a round do not depend on one another, and thus all 8! orderings of S-boxes are possible.  ... 
doi:10.1007/3-540-48059-5_16 fatcat:xubaq5yxcrdgxc4qajuf2sp6ky

Experiments in attacking FPGA-based embedded systems using differential power analysis

Song Sun, Zijun Yan, Joseph Zambreno
2008 2008 IEEE International Conference on Electro/Information Technology  
, or c) experimented using custom hardware that does not closely mirror real-world systems.  ...  when performing the DPA attack on our chosen commercial platform.  ...  One limitation of this approach is that the FPGA is placed on a custom board in order to facilitate the power analysis.  ... 
doi:10.1109/eit.2008.4554259 dblp:conf/eit/SunYZ08 fatcat:h4u4wqz6efdfrkrnkviv2vpw4u

Open source platform Digital Personal Assistant [article]

Denis Usachev, Azat Khusnutdinov, Manuel Mazzara, Adil Khan, Ivan Panchenko
2018 arXiv   pre-print
The system is designed to use the DPA as a learning platform for engineers to provide them with the opportunity to create and test their own hypothesis.  ...  The DPA is able to recognize users' commands in natural language and transform it to the set of machine commands that can be used to control different 3rd-party application.  ...  Another problem is that most of IoT devices are not capable of managing computationally intensive tasks, thus centralized control is required in order to build complex Automation system.  ... 
arXiv:1801.03650v3 fatcat:f5zlfuvsirdjviiil46z4osyry

Second-Order Power Analysis Attacks against Precomputation based Masking Countermeasure

Weijian Li, Haibo Yi
2016 International Journal of Smart Home  
Precomputation look-up table based masking countermeasure is low-cost and secure against first-order DPA, therefore is more suitable for lightweight ciphers in resourceconstrained devices.  ...  Otherwise, there are so few works focus on masked S-box as precomputation look-up table.  ...  of second-order attack with electronic noise, which is the case for the real-world measurements of power consumption.  ... 
doi:10.14257/ijsh.2016.10.3.25 fatcat:ajjt6qmu3fhftnfrg66wxnrt5u

Leakage Squeezing Countermeasure against High-Order Attacks [chapter]

Houssem Maghrebi, Sylvain Guilley, Jean-Luc Danger
2011 Lecture Notes in Computer Science  
The first one is based on a recoded memory with a size squared w.r.t. the unprotected requirement, whilst the second one is an enhancement alleviating the requirement for a large memory.  ...  In particular, second order attacks (2O-attacks) have been improved and successfully applied to break many masked implementations.  ...  Acknowledgment This work has been supported by the french Agency "Agence Nationale de la Recherche" in the frame of the SECRESOC project ANR-09-SEGI-013.  ... 
doi:10.1007/978-3-642-21040-2_14 fatcat:kckw2bylxrfbbamcyv36y5qphq

Maintaining Economic Freedom under the Defense Act of 1950

Donald S. Frey
1951 The University of Chicago Law Review  
One difficulty with this approach was that to a certain extent it shifted shortages from one material to another, since orders did not prohibit the manufacture of a nonessential article, but merely prohibited  ...  The significance of this second order can be appreciated only in the light of World War II experiences in assigning priorities.  ...  In the very exercise of these democratic concepts analyzed herein, it is not enough for individuals to say that this program will prevent communism from spreading.  ... 
doi:10.2307/1597679 fatcat:b552vc6wenhq5bvvbdifw2qbg4

Findings and Recommendations [chapter]

David Wright, Paul De Hert
2012 Privacy Impact Assessment  
Here is yet another example: On 9 December 2014, DPAs from around the world sent a letter to the operators of seven app marketplaces (Apple, Google, Samsung, Microsoft, Nokia, BlackBerry and Amazon.com  ...  Portugal Most of the time, DPAs are not aware of enforcement actions carried out by others, because there is no report system in place for such actions, at least not in a regular basis or widely enough  ... 
doi:10.1007/978-94-007-2543-0_22 fatcat:z5xhu36qdnglhoajogxpzhuevq

On using genetic algorithms for intrinsic side-channel resistance

Stjepan Picek, Bariş Ege, Lejla Batina, Domagoj Jakobovic, Łukasz Chmielewski, Marin Golub
2014 Proceedings of the First Workshop on Cryptography and Security in Computing Systems - CS2 '14  
The property of transparency order is important since it specifies the resilience of an S-box against differential power analysis.  ...  Finding balanced S-boxes with high nonlinearity and low transparency order is a difficult problem.  ...  Acknowledgments This work was supported in part by the Technology Foundation STW (project 12624 -SIDES), The Netherlands Organization for Scientific Research NWO (project ProFIL 628.001.007) and the ICT  ... 
doi:10.1145/2556315.2556319 dblp:conf/hipeac/PicekEBJCG14 fatcat:il3v3qwtivbb7gnxtaguqharbu

The Brave New World of Digital Personal Assistants: Benefits and Challenges from an Economic Perspec-tive

Oliver Budzinski, Victoriia Noskova, zhang xijie
2018 Social Science Research Network  
on the DPA market and economic dependence on a dominant DPA, potential leveraging of DPA suppliers' market power into neighboring markets, personalized data (ab)use and privacy, media bias and manipulation  ...  A DPA is an intelligent automated system that interacts with the user through a dialogue in natural language, and meanwhile applying third-party services to obtain information and perform various actions  ...  Consumer protection policy may attempt to make users better informed and behave more rationally by information campaigns -but whether this is enough remains doubtful at the least when looking at such phenomena  ... 
doi:10.2139/ssrn.3306169 fatcat:jkg5p3wxpjawbietfut2ttdix4

Digital Complementary Assets

Michael Rosemann, Magnus Anderson, Mikael Lind
2011 International Conference on Information Systems  
Second, we differentiate three models for how organizations can engage with such digital complementary assets. Third, user-base is found to be a critical factor when considering appropriability.  ...  However, despite the rapid uptake and their obvious influence on the behavior of individuals and the business models and networks of organizations, we still lack a deeper, theory-guided understanding of  ...  This second aspect of appropriability varies across industries and from one technology to another.  ... 
dblp:conf/icis/RosemannAL11 fatcat:oxxcno5lzvg27cj6tztwsva5pi

Controlled Label Propagation: Preventing Over-Propagation through Gradual Expansion [article]

Aria Rezaei, Saeed Mahlouji Far, Mahdieh Soleymani
2015 arXiv   pre-print
However, it has one major flaw; when the community structure in the network is not clear enough, it will assign every node the same label, thus detecting the whole graph as one giant community.  ...  Preliminary results show that not only our extension improves the detection capability of classic label propagation algorithm when communities are not clearly detectable, but also improves the overall  ...  ACKNOWLEDGMENT The authors would like to thank Dr.Šubelj for kindly providing us with the codes of BPA and DPA algorithms.  ... 
arXiv:1503.04694v1 fatcat:5xnosj74vzerjj3of5hy55k3ua

Breakthrough Silicon Scanning Discovers Backdoor in Military Chip [chapter]

Sergei Skorobogatov, Christopher Woods
2012 Lecture Notes in Computer Science  
This paper is a short summary of the first real world detection of a backdoor in a military grade FPGA.  ...  The backdoor was found amongst additional JTAG functionality and exists on the silicon itself, it was not present in any firmware loaded onto the chip.  ...  Communication was analysed with DPA, while the functions of control registers were tested with both DPA and PEA. This is because for some operations DPA is not sensitive enough.  ... 
doi:10.1007/978-3-642-33027-8_2 fatcat:tbcqe3s6ubhnnfholsxc6v5du4
« Previous Showing results 1 — 15 out of 2,927 results