2015
DOI: 10.13089/jkiisc.2015.25.4.727
|View full text |Cite
|
Sign up to set email alerts
|

Power Analysis Attacks on Blinding Countermeasure against Horizontal CPA

Abstract: Until recently, power analysis is one of the most popular research issues among various side channel analyses. Since Differential Power Analysis had been first proposed by Kocher et al., various practical power analyses correspond with software/hardware cryptographic devices have been proposed. In this paper, we analyze vulnerability of countermeasure against power analysis exploiting single power trace of public cryptographic algorithm. In ICICS 2010, Clavier et al. proposed Horizontal Correlation Analysis wh… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
2
0
1

Year Published

2023
2023
2023
2023

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(3 citation statements)
references
References 15 publications
0
2
0
1
Order By: Relevance
“…As an emerging technology, AI virtual assistants remain in the initial stage of technology innovation, and its immature function and inaccurate response to user commands lead to user discomfort on its failure and mistakes in completing tasks (Pyae & Joelsson, 2018). AI virtual assistants collect and process user information via AI algorithms and stored in the cloud, causing user concern on information security (Lee et al, 2018). When the perceived risk of a user is strong, the behavioral intention to use AI virtual assistants is low, suggesting that user perceived risk will hinder the acceptance of AI technology (Liu et al, 2019; Zhang et al, 2019).…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…As an emerging technology, AI virtual assistants remain in the initial stage of technology innovation, and its immature function and inaccurate response to user commands lead to user discomfort on its failure and mistakes in completing tasks (Pyae & Joelsson, 2018). AI virtual assistants collect and process user information via AI algorithms and stored in the cloud, causing user concern on information security (Lee et al, 2018). When the perceived risk of a user is strong, the behavioral intention to use AI virtual assistants is low, suggesting that user perceived risk will hinder the acceptance of AI technology (Liu et al, 2019; Zhang et al, 2019).…”
Section: Discussionmentioning
confidence: 99%
“…AI virtual assistants offer convenience and flexibility to users; however, they also give rise to trust and risk concerns that can hinder their acceptance (Ostrom et al, 2019). Users are concerned with the continuous recording of their voices in personal spaces (e.g., home and office) and the handling and protection of their collected information (Lee et al, 2018). Additionally, users may feel uncertain regarding the unpredictable performance of AI virtual assistants, such as a lack of feedback or performance failures (Pyae & Joelsson, 2018).…”
Section: Introductionmentioning
confidence: 99%
“…5. Anti-aircraft operation procedure of combat system [34] 유의미한 성과를 거둔 사례를 확인할 수 있었다 [46][47][48][49] .…”
Section: 함정 전투체계 보안 연구unclassified