2020
DOI: 10.1007/s41635-020-00094-x
|View full text |Cite
|
Sign up to set email alerts
|

Key Update Countermeasure for Correlation-Based Side-Channel Attacks

Abstract: Side-channel analysis is a non-invasive form of attack that reveals the secret key of the cryptographic circuit by analyzing the leaked physical information. The traditional brute-force and cryptanalysis attacks target the weakness in the encryption algorithm, whereas side-channel attacks use statistical models such as differential analysis and correlation analysis on the leaked information gained from the cryptographic device during the run-time. As a non-invasive and passive attack, the side-channel attack b… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(1 citation statement)
references
References 29 publications
0
1
0
Order By: Relevance
“…In order to ensure secure communication between intelligent devices, a variety of security algorithms have been proposed [2], and locationbased services have also been widely used. In order to achieve secure communication of intelligent devices, efficient secure channels are usually established between devices through symmetric encryption algorithm, and key negotiation and message verification are realized through public key encryption and public key signature algorithm [3,4].…”
Section: Introductionmentioning
confidence: 99%
“…In order to ensure secure communication between intelligent devices, a variety of security algorithms have been proposed [2], and locationbased services have also been widely used. In order to achieve secure communication of intelligent devices, efficient secure channels are usually established between devices through symmetric encryption algorithm, and key negotiation and message verification are realized through public key encryption and public key signature algorithm [3,4].…”
Section: Introductionmentioning
confidence: 99%