Side-channel attacks on smartcards

被引:0
|
作者
NGS Software [1 ]
机构
来源
Netw. Secur. | 2006年 / 12卷 / 18-20期
关键词
D O I
10.1016/S1353-4858(06)70465-2
中图分类号
学科分类号
摘要
引用
收藏
相关论文
共 50 条
  • [21] Side-Channel Attacks on Mobile and Wearable Systems
    Nahapetian, Ani
    2016 13TH IEEE ANNUAL CONSUMER COMMUNICATIONS & NETWORKING CONFERENCE (CCNC), 2016,
  • [22] A Survey of Side-Channel Attacks on Caches and Countermeasures
    Yangdi Lyu
    Prabhat Mishra
    Journal of Hardware and Systems Security, 2018, 2 (1) : 33 - 50
  • [23] Side-Channel Attacks on Shared Search Indexes
    Wang, Liang
    Grubbs, Paul
    Lu, Jiahui
    Bindschaedler, Vincent
    Cash, David
    Ristenpart, Thomas
    2017 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP), 2017, : 673 - 692
  • [24] How to Compare Profiled Side-Channel Attacks?
    Standaert, Francois-Xavier
    Koeune, Francois
    Schindler, Werner
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, 2009, 5536 : 485 - +
  • [25] On the Feasibility of Side-Channel Attacks in a Virtualized Environment
    Vateva-Gurova, Tsvetoslava
    Luna, Jesus
    Pellegrino, Giancarlo
    Suri, Neeraj
    E-BUSINESS AND TELECOMMUNICATIONS, ICETE 2014, 2015, 554 : 319 - 339
  • [26] On the Correctness of an Approach against Side-Channel Attacks
    Wang, Peng
    Feng, Dengguo
    Wu, Wenling
    Zhang, Liting
    INFORMATION SECURITY PRACTICE AND EXPERIENCE, PROCEEDINGS: 5TH INTERNATIONAL CONFERENCE, ISPEC 2009, 2009, 5451 : 336 - +
  • [27] Side-Channel Expectation-Maximization Attacks
    Béguinot, Julien
    Cheng, Wei
    Guilley, Sylvain
    Rioul, Olivier
    IACR Transactions on Cryptographic Hardware and Embedded Systems, 2022, 2022 (04): : 774 - 799
  • [28] Side-Channel Attacks and Machine Learning Approach
    Levina, Alia
    Sleptsova, Daria
    Zaitsev, Oleg
    2016 18TH CONFERENCE OF OPEN INNOVATIONS ASSOCIATION AND SEMINAR ON INFORMATION SECURITY AND PROTECTION OF INFORMATION TECHNOLOGY (FRUCT-ISPIT), 2016, : 181 - 186
  • [29] A tutorial on physical security and side-channel attacks
    Koeune, F
    Standaert, FX
    FOUNDATIONS OF SECURITY ANALYSIS AND DESIGN III, 2005, 3655 : 78 - 108
  • [30] SonarSnoop: active acoustic side-channel attacks
    Cheng, Peng
    Bagci, Ibrahim Ethem
    Roedig, Utz
    Yan, Jeff
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2020, 19 (02) : 213 - 228