2014 International Carnahan Conference on Security Technology (ICCST) 2014
DOI: 10.1109/ccst.2014.6987032
|View full text |Cite
|
Sign up to set email alerts
|

Securing software cryptographic primitives for embedded systems against side channel attacks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2015
2015
2024
2024

Publication Types

Select...
3
1
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(2 citation statements)
references
References 12 publications
0
2
0
Order By: Relevance
“…A side-channel attack exploits physical properties of a device, such as power consumption or electromagnetic radiation, to extract sensitive data. A thorough study [140] has shown how effective sidechannel attacks can be in influencing different industries. For example, a hacker can use a side-channel attack to obtain an encryption key from a client device.…”
Section: ) Physical Attacksmentioning
confidence: 99%
“…A side-channel attack exploits physical properties of a device, such as power consumption or electromagnetic radiation, to extract sensitive data. A thorough study [140] has shown how effective sidechannel attacks can be in influencing different industries. For example, a hacker can use a side-channel attack to obtain an encryption key from a client device.…”
Section: ) Physical Attacksmentioning
confidence: 99%
“…This approach follows the example set by the industry in regards to media processing and digital signal processing, where new instructions added to commercial CPUs accelerated related functionalities. In the literature, the approach is also shown to be possible in cryptography, given the multiple instruction proposals and their implementations [18,19], such as the AES-NI extension set present in some Intel architectures [20] and the SHA-NI extension.…”
Section: Bob Signals Tomentioning
confidence: 99%