Essays about: "Side channel attack"
Showing result 1 - 5 of 26 essays containing the words Side channel attack.
-
1. Determining the Optimal Frequencies for a Duplicated Randomized Clock SCA Countermeasure
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Side-channel attacks pose significant challenges to the security of embedded systems, often allowing attackers to circumvent encryption algorithms in minutes compared to the trillions of years required for brute-force attacks. To mitigate these vulnerabilities, various countermeasures have been developed. READ MORE
-
2. A Side-Channel Attack on Masked and Shuffled Implementations of M-LWE and M-LWR Cryptography : A case study of Kyber and Saber
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : In response to the threat of a future, large-scale, quantum computer, the American National Institute of Standards and Technology (NIST) initiated a competition for designs of quantum-resistant cryptographic primitives. In 2022, the lattice-based Module-Learning With Errors (M-LWE) scheme Kyber emerged as the winner to be standardized. READ MORE
-
3. Reverse Engineering of Deep Learning Models by Side-Channel Analysis
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Side-Channel Analysis (SCA) aims to extract secrets from cryptographic systems by exploiting the physical leakage acquired from implementations of cryptographic algorithms. With the development of Deep Learning (DL), a new type of SCA called Deep Learning Side-Channel Analysis (DLSCA) utilizes the advantages of DL techniques in data features processing to break cryptographic systems more efficiently. READ MORE
-
4. A deep learning based side-channel analysis of an FPGA implementation of Saber
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : In 2016, NIST started a post quantum cryptography (PQC) standardization project in response to the rapid development of quantum algorithms which break many public-key cryptographic schemes. As the project nears its end, it is necessary to assess the resistance of its finalists to side-channel attacks. READ MORE
-
5. Improving deep learning assistedfar-field electromagnetic sidechannelattacks on AES : Effects on attack efficiency from using additive noise and otherdata augmentation techniques
University essay from KTH/MekatronikAbstract : Profiled side-channel attacks on hardware implemented cryptographic algorithms have been a well-researched topic for the past two decades and many countermeasures against these attacks have been proposed and adopted by the industry. Recently, a new form of far field EM side channel called "screaming channel attacks" have been highlighted. READ MORE