Cargando…
Exploiting Small Leakages in Masks to Turn a Second-Order Attack into a First-Order Attack and Improved Rotating Substitution Box Masking with Linear Code Cosets
Masking countermeasures, used to thwart side-channel attacks, have been shown to be vulnerable to mask-extraction attacks. State-of-the-art mask-extraction attacks on the Advanced Encryption Standard (AES) algorithm target S-Box recomputation schemes but have not been applied to scenarios where S-Bo...
Autores principales: | DeTrano, Alexander, Karimi, Naghmeh, Karri, Ramesh, Guo, Xiaofei, Carlet, Claude, Guilley, Sylvain |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
Hindawi Publishing Corporation
2015
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4601566/ https://www.ncbi.nlm.nih.gov/pubmed/26491717 http://dx.doi.org/10.1155/2015/743618 |
Ejemplares similares
-
Real masks and spoof faces: On the masked face presentation attack detection
por: Fang, Meiling, et al.
Publicado: (2022) -
Exploiting On-Chip Voltage Regulators for Leakage Reduction in Hardware Masking
por: Seçkiner, Soner, et al.
Publicado: (2022) -
Dataset: local government mask orders preceding statewide orders by US states
por: Jacobs, Philip, et al.
Publicado: (2021) -
Side-leakage of face mask
por: Persson, B. N. J.
Publicado: (2021) -
Untargeted white-box adversarial attack to break into deep leaning based COVID-19 monitoring face mask detection system
por: Sheikh, Burhan Ul haque, et al.
Publicado: (2023)