Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 228,667,933 papers from all fields of science
Search
Sign In
Create Free Account
Side-channel attack
Known as:
Side channel
, Side channel attack
, Side-channel attacks
Expand
In cryptography, a side-channel attack is any attack based on information gained from the physical implementation of a cryptosystem, rather than…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
32 relations
Acoustic cryptanalysis
Algorithm
Argon2
Asynchronous circuit
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2018
2018
Detecting Cache-Timing Vulnerabilities in Post-Quantum Cryptography Algorithms
A. Facon
,
S. Guilley
,
Matthieu Lec'Hvien
,
Alexander Schaub
,
Youssef Souissi
International Verification and Security Workshop
2018
Corpus ID: 53018853
When implemented on real systems, cryptographic algorithms are vulnerable to attacks observing their execution behavior, such as…
Expand
2011
2011
SkyNET: A 3G-Enabled Mobile Attack Drone and Stealth Botmaster
Theodore Reed
,
Joseph Geis
,
S. Dietrich
Workshop on Offensive Technologies
2011
Corpus ID: 7016333
SkyNET is a stealth network that connects hosts to a bot-master through a mobile drone. The network is comprised of machines on…
Expand
2011
2011
Utilizing hard cores of modern FPGA devices for high-performance cryptography
Tim Güneysu
Journal of Cryptographic Engineering
2011
Corpus ID: 2291066
This article presents a unique design approach for the implementation of standardized symmetric and asymmetric cryptosystems on…
Expand
2007
2007
Side-Channel Attack on Biometric Cryptosystem Based on Keystroke Dynamics
Zhang Tao
,
Mingquan Fan
,
Fu Bo
International Symposium on Data, Privacy, and E…
2007
Corpus ID: 20583386
The security of biometric template is generally based on the security of algorithms, such as key binding algorithm or hash…
Expand
2005
2005
AES side channel attack protection using random isomorphisms.
Rostovtsev A G
,
Shemyakina O V
2005
Corpus ID: 5539709
General method of side-channel attacks protection, based on random cipher isomorphisms is presented. Isomorphic ciphers produce…
Expand
2005
2005
A Design Methodology for Secured ICs Using Dynamic Current Mode Logic
F. Macé
,
François-Xavier Standaert
,
J. Quisquater
,
J. Legat
International Workshop on Power and Timing…
2005
Corpus ID: 1821895
This paper presents principles and concepts for the secured design of cryptographic IC's. In order to achieve a secure…
Expand
2004
2004
Power Analysis of Synchronous Stream Ciphers with Resynchronization Mechanism
Joseph Lano
,
N. Mentens
,
B. Preneel
,
I. Verbauwhede
Intelligent Information Technology Application
2004
Corpus ID: 3727115
In this paper we discuss power analysis of stream ciphers. In such attacks, one measures the power consumption of the algorithm…
Expand
Review
2003
Review
2003
Elliptic Curves and Side-Channel Attacks
M. Joye
2003
Corpus ID: 351268
Naive implementations of crypto-algorithms are susceptible to side-channel analysis. This talk surveys the known methods for…
Expand
Highly Cited
2002
Highly Cited
2002
Parallel scalar multiplication on general elliptic curves over Fp hedged against Non-Differential Side-Channel Attacks
Wieland Fischer
,
Christophe Giraud
,
E. Knudsen
,
Jean-Pierre Seifert
IACR Cryptology ePrint Archive
2002
Corpus ID: 16995694
. Abstract. For speeding up elliptic curve scalar multiplication and making it secure against side-channel attacks such as timing…
Expand
Highly Cited
2002
Highly Cited
2002
Parallelizable Elliptic Curve Point Multiplication Method with Resistance against Side-Channel Attacks
Bodo Möller
Information Security Conference
2002
Corpus ID: 675804
We present a new 2?-ary elliptic curve point multiplication method with resistance against side-channel attacks. This method…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE