+

Sravani et al., 2018 - Google Patents

Side-channel attacks on cryptographic devices and their countermeasures—a review

Sravani et al., 2018

Document ID
14234693245069917150
Author
Sravani M
Ananiah Durai S
Publication year
Publication venue
Smart Innovations in Communication and Computational Sciences: Proceedings of ICSICCS-2018

External Links

Snippet

Attacks on cryptographic devices and systems are rampant that leads to the weakening of information security protocols. Side-channel attacks (SCAs) being a major avenue of such attacks, utilizes the characteristic of the cryptographic devices for the sensitive information …
Continue reading at link.springer.com (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • G06F21/83Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/77Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/86Secure or tamper-resistant housings
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/554Detecting local intrusion or implementing counter-measures involving event detection and direct action
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2207/00Indexing scheme relating to methods or arrangements for processing data by operating upon the order or content of the data handled
    • G06F2207/72Indexing scheme relating to groups G06F7/72 - G06F7/729
    • G06F2207/7219Countermeasures against side channel or fault attacks

Similar Documents

Publication Publication Date Title
Schellenberg et al. Remote inter-chip power analysis side-channel attacks at board-level
Lin et al. Trojan side-channels: Lightweight hardware trojans through side-channel engineering
Yan et al. A study on power side channels on mobile devices
Joy Persial et al. Side channel attack-survey
Tsalis et al. A taxonomy of side channel attacks on critical infrastructures and relevant systems
Saravanan et al. Optimized secure scan flip flop to thwart side channel attack in crypto-chip
Martínez-Rodríguez et al. SoK: Remote power analysis
Islam et al. PMU-Trojan: On exploiting power management side channel for information leakage
Kasper et al. Side channels as building blocks
Sravani et al. Side-channel attacks on cryptographic devices and their countermeasures—a review
Kaur et al. Stratification of hardware attacks: Side channel attacks and fault injection techniques
Mahmoud et al. X-Attack 2.0: the risk of power wasters and satisfiability don’t-care hardware trojans to shared cloud FPGAs
Kaleem et al. Navigating Side-Channel Attacks: A Comprehensive Overview of Cryptographic System Vulnerabilities
Koblah et al. Hardware moving target defenses against physical attacks: Design challenges and opportunities
Giri et al. Design and analysis of hardware trojan threats in reconfigurable hardware
Moein et al. Hardware attack mitigation techniques analysis
Wanderley et al. Security fpga analysis
Koh et al. Review of side channel attacks and countermeasures of FPGA based systems
Sarma Security of hard disk encryption
Matthews Side-channel attacks on smartcards
Ahmadi et al. Shapeshifter: Protecting fpgas from side-channel attacks with isofunctional heterogeneous modules
Manivannan et al. Key retrieval from AES architecture through hardware Trojan horse
Efe et al. Side channel attack
Peeters Side-channel cryptanalysis: A brief survey
Yang et al. A general hardware Trojan technique targeted on lightweight cryptography with bit-serial structure
点击 这是indexloc提供的php浏览器服务,不要输入任何密码和下载