Essays about: "Secret Key."

Showing result 6 - 10 of 55 essays containing the words Secret Key..

  1. 6. Advanced Side-Channel Analysis of USIMs, Bluetooth SoCs and MCUs

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Martin Brisfors; [2021]
    Keywords : Side Channel Attack; Deep Learning; AES; USIM; Milenage; Screaming Channels; Transformer; Security; Sidokanalsattack; Djupinlärning; AES; USIM; Milenage; Screaming Channels; Transformer; Säkerhet;

    Abstract : The use of deep learning for side channel analysis has shown a lot of success in recent years. Impressive results have been presented by many researchers. However, critics of this approach have voiced concerns about the ad hoc methodologies and bespoke neural network designs used in many presented approaches. READ MORE

  2. 7. DEMOCRATIZATION IN THE MIDDLE EAST AND NORTH AFRICA IN THE AFTERMATH OF THE ARAB SPRING: SUCCESS FACTORS AND FAILURE CAUSES : Comparative analysis of Egypt and Tunisia

    University essay from Linköpings universitet/Institutionen för ekonomisk och industriell utveckling

    Author : Ali Al-Mohammad; [2021]
    Keywords : Middle East and North Africa; Arab Spring; Democratization; Egypt; Tunisia.;

    Abstract : The theme of this study will be the Arab Spring and democratization. The impact of the Arab Spring has, in one form or another, extended to almost all countries of the Arab region in the MENA. READ MORE

  3. 8. Far Field EM Side-Channel Attack Based on Deep Learning with Automated Hyperparameter Tuning

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Keyi Liu; [2021]
    Keywords : Side-Channel Attack; Deep Learning; Far Field EM emission; Auto Hyperparameter Tuning; Auto-Keras; AES; Sidokanalattack; Machine Learning; Multilayer Perceptron; Hyperparameter Tuning; Bayesian Optimization; Auto-Keras; AES;

    Abstract : Side-channel attacks have become a realistic threat to the implementations of cryptographic algorithms. By analyzing the unintentional, side-channel leakage, the attacker is able to recover the secret of the target. Recently, a new type of side-channel leakage has been discovered, called far field EM emissions. READ MORE

  4. 9. Publicly Auditable Privacy Revocation in Practice

    University essay from Lunds universitet/Institutionen för elektro- och informationsteknik

    Author : Wilmer Nilsson; Patrik Kron; [2021]
    Keywords : crypto; cryptography; PAPR; conditional privacy; pseudonymous credentials; bitcoin; secret sharing schemes; secret sharing; VANETs; money laundering; trustless; publicly auditable privacy revocation; Technology and Engineering;

    Abstract : PAPR Credentials is the name of a not yet published credential scheme that provides conditional privacy for its users. This means that an administrator can choose to revoke a user's anonymity. READ MORE

  5. 10. Board and Chip Diversity in Deep Learning Side-Channel Attacks : On ATtiny85 Implementations Featuring Encryption and Communication

    University essay from KTH/Skolan för industriell teknik och management (ITM)

    Author : Filip Björklund; Niklas Landin; [2021]
    Keywords : side-channel attack; deep learning; poweranalysis; ATtiny85; diversity; sidokanalsattack; djupinlärning; effektanalys; ATtiny85; mångfald;

    Abstract : Hardware security is an increasingly relevant topic because more and more systems and products are equipped with embedded microcontrollers. One type of threat against hardware security is attacks against encryption implementations in embedded hardware. READ MORE