DIKUL - logo

Search results

Basic search    Expert search   

Currently you are NOT authorised to access e-resources UL. For full access, REGISTER.

1 2 3 4 5
hits: 122
1.
Full text

PDF
2.
  • Power Analysis Attacks Power Analysis Attacks
    Mangard, Stefan; Oswald, Elisabeth; Popp, Thomas 2007
    eBook

    Power analysis attacks allow the extraction of secret information from smart cards. Smart cards are used in many applications including banking, mobile communications, pay TV, and electronic ...
Full text
Available for: UL
3.
  • Malware Guard Extension: ab... Malware Guard Extension: abusing Intel SGX to conceal cache attacks
    Schwarz, Michael; Weiser, Samuel; Gruss, Daniel ... Cybersecurity (Singapore), 01/2020, Volume: 3, Issue: 1
    Journal Article
    Peer reviewed
    Open access

    In modern computer systems, user processes are isolated from each other by the operating system and the hardware. Additionally, in a cloud scenario it is crucial that the hypervisor isolates tenants ...
Full text
Available for: UL

PDF
4.
  • SIFA: Exploiting Ineffective Fault Inductions on Symmetric Cryptography
    Christoph Dobraunig; Maria Eichlseder; Thomas Korak ... IACR transactions on cryptographic hardware and embedded systems, 08/2018, Volume: 2018, Issue: 3
    Journal Article
    Peer reviewed
    Open access

    Since the seminal work of Boneh et al., the threat of fault attacks has been widely known and techniques for fault attacks and countermeasures have been studied extensively. The vast majority of the ...
Full text
Available for: UL
5.
  • MEAS: memory encryption and... MEAS: memory encryption and authentication secure against side-channel attacks
    Unterluggauer, Thomas; Werner, Mario; Mangard, Stefan Journal of cryptographic engineering, 06/2019, Volume: 9, Issue: 2
    Journal Article
    Peer reviewed
    Open access

    Memory encryption is used in many devices to protect memory content from attackers with physical access to a device. However, many current memory encryption schemes can be broken using differential ...
Full text
Available for: UL

PDF
6.
  • Smooth Passage with the Gua... Smooth Passage with the Guards: Second-Order Hardware Masking of the AES with Low Randomness and Low Latency
    Gigerl, Barbara; Klug, Franz; Mangard, Stefan ... IACR transactions on cryptographic hardware and embedded systems, 12/2023, Volume: 2024, Issue: 1
    Journal Article
    Peer reviewed
    Open access

    Cryptographic devices in hostile environments can be vulnerable to physical attacks such as power analysis. Masking is a popular countermeasure against such attacks, which works by splitting every ...
Full text
Available for: UL
7.
  • Riding the Waves Towards Ge... Riding the Waves Towards Generic Single-Cycle Masking in Hardware
    Nagpal, Rishub; Gigerl, Barbara; Primas, Robert ... IACR transactions on cryptographic hardware and embedded systems, 08/2022, Volume: 2022, Issue: 4
    Journal Article
    Peer reviewed
    Open access

    Research on the design of masked cryptographic hardware circuits in the past has mostly focused on reducing area and randomness requirements. However, many embedded devices like smart cards and IoT ...
Full text
Available for: UL
8.
  • Isap v2.0
    Christoph Dobraunig; Maria Eichlseder; Stefan Mangard ... IACR Transactions on Symmetric Cryptology, 06/2020, Volume: 2020, Issue: S1
    Journal Article
    Peer reviewed
    Open access

    We specify Isap v2.0, a lightweight permutation-based authenticated encryption algorithm that is designed to ease protection against side-channel and fault attacks. This design is an improved version ...
Full text
Available for: UL
9.
  • Successfully Attacking Mask... Successfully Attacking Masked AES Hardware Implementations
    Mangard, Stefan; Pramstaller, Norbert; Oswald, Elisabeth Cryptographic Hardware and Embedded Systems – CHES 2005, 2005
    Book Chapter, Conference Proceeding
    Peer reviewed
    Open access

    During the last years, several masking schemes for AES have been proposed to secure hardware implementations against DPA attacks. In order to investigate the effectiveness of these countermeasures in ...
Full text
Available for: UL

PDF
10.
  • SYNFI: Pre-Silicon Fault An... SYNFI: Pre-Silicon Fault Analysis of an Open-Source Secure Element
    Nasahl, Pascal; Osorio, Miguel; Vogel, Pirmin ... IACR transactions on cryptographic hardware and embedded systems, 08/2022, Volume: 2022, Issue: 4
    Journal Article
    Peer reviewed
    Open access

    Fault attacks are active, physical attacks that an adversary can leverage to alter the control-flow of embedded devices to gain access to sensitive information or bypass protection mechanisms. Due to ...
Full text
Available for: UL
1 2 3 4 5
hits: 122

Load filters