Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Hardware security exploiting post-CMOS devices: Fundamental device characteristics, state-of-the-art countermeasures, challenges and roadmap
Emerging nanoelectronic semiconductor devices have been quite promising in enhancing
hardware-oriented security and trust. However, implementing hardware security primitives …
hardware-oriented security and trust. However, implementing hardware security primitives …
Gini-impurity index analysis
Y Yuan, L Wu, X Zhang - IEEE Transactions on Information …, 2021 - ieeexplore.ieee.org
In the past few decades, DPA-based side-channel attack strategies, such as DPA and CPA,
have shown strong ability to analyze the security of the cryptographic implementations …
have shown strong ability to analyze the security of the cryptographic implementations …
Attacks on cryptosystems implemented via VLSI: A review
Serious threats to the VLSI crypto devices are posed by the Side Channel Attack (SCA) that
utilizes the devices' SCI (Side Channel Information) to break the entire cryptographic …
utilizes the devices' SCI (Side Channel Information) to break the entire cryptographic …
SCAUL: Power side-channel analysis with unsupervised learning
Existing power analysis techniques rely on strong adversary models with prior knowledge of
the leakage or training data. We introduce side-channel analysis with unsupervised learning …
the leakage or training data. We introduce side-channel analysis with unsupervised learning …
Compositional verification of efficient masking countermeasures against side-channel attacks
Masking is one of the most effective countermeasures for securely implementing
cryptographic algorithms against power side-channel attacks, the design of which however …
cryptographic algorithms against power side-channel attacks, the design of which however …
Exploiting the back-gate biasing technique as a countermeasure against power analysis attacks
Fully depleted silicon-on-insulator (FD-SOI) technology is renowned for its back-gate bias
voltage controllability. It allows devices fabricated with FD-SOI technology to be optimized …
voltage controllability. It allows devices fabricated with FD-SOI technology to be optimized …
[PDF][PDF] 侧信道攻击与防御技术研究进展
王永娟, 樊昊鹏, 代政一, 袁庆军, 王相宾 - 计算机学报, 2023 - 159.226.43.17
摘要侧信道攻击利用密码实现的物理泄露而不是理论弱点来恢复密钥, 对密码系统的安全实现有
严重的现实威胁. 密码设备运行时所产生的能量, 电磁, 缓存和故障输出等侧信息均可能导致密钥 …
严重的现实威胁. 密码设备运行时所产生的能量, 电磁, 缓存和故障输出等侧信息均可能导致密钥 …
An energy trace compression method for differential power analysis attack
X Cai, R Li, S Kuang, J Tan - IEEE Access, 2020 - ieeexplore.ieee.org
Differential power analysis attacks are the most commonly used means to break
cryptographic devices within the side-channel attack technology. Since there is a lot of noise …
cryptographic devices within the side-channel attack technology. Since there is a lot of noise …
Attacking the edge-of-things: A physical attack perspective
The concepts between Internet of Things (IoT) and edge computing are increasingly
intertwined, as an edge-computing architecture generally comprises a (large) number of …
intertwined, as an edge-computing architecture generally comprises a (large) number of …
Formal verification of masking countermeasures for arithmetic programs
P Gao - Proceedings of the 35th IEEE/ACM International …, 2020 - dl.acm.org
Cryptographic algorithms are widely used to protect data privacy in many aspects of daily
lives from smart card to cyber-physical systems. Unfortunately, programs implementing …
lives from smart card to cyber-physical systems. Unfortunately, programs implementing …