Essays about: "aes implementation"
Showing result 1 - 5 of 29 essays containing the words aes implementation.
-
1. Far Field EM Side-Channel Attack Based on Deep Learning with Automated Hyperparameter Tuning
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Side-channel attacks have become a realistic threat to the implementations of cryptographic algorithms. By analyzing the unintentional, side-channel leakage, the attacker is able to recover the secret of the target. Recently, a new type of side-channel leakage has been discovered, called far field EM emissions. READ MORE
-
2. Encrypted Documents Retrieval From The Cloud With Searchable Encryption : A Searchable Encryption Scheme Implementation
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Encrypting data is a solution to enhance the privacy and confidentiality of the data owners when outsourcing storage to cloud storage providers. However, using conventional encryption algorithms would render search queries based on the content of the data useless. READ MORE
-
3. Development of Generic Communication Middleware for Embedded Sensor Systems Transmitting Health Parameters
University essay from Mälardalens högskola/Akademin för innovation, design och teknik; Mälardalens högskola/Akademin för innovation, design och teknikAbstract : Health technology or e-Health is one of the most rapidly growing areas in healthcare today and it has been an important requirement as a new concept of healthcare industry. Since global society has been changed to aging society and the healthcare cost has been increasing in the 21st century since 2007. READ MORE
-
4. Far Field Electromagnetic Side Channel Analysis of AES
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Side-Channel Attacks (SCAs) have become a realistic threat to implementations of cryptographic algorithms. By utilizing the unintentionally leaked side-channel information during the execution of a cryptographic algorithm, it is possible to bypass the theoretical strength of the algorithm and extract its secret key. READ MORE
-
5. Deep Learning Based Side-Channel Analysis of AES Based on Far Field Electromagnetic Radiation
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Advanced Encryption Standard (AES) is a widely accepted encryption algorithm used in Internet-of-Things (IoT) devices such as Bluetooth devices. Although the implementation of AES is complicated enough, attackers can still acquire the cryptographic information generated from the AES execution to perform Side-Channel Attack (SCA). READ MORE
