2022
DOI: 10.1007/978-981-16-5529-6_14
|View full text |Cite
|
Sign up to set email alerts
|

Machine Learning Based and Reconfigurable Architecture with a Countermeasure for Side Channel Attacks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(1 citation statement)
references
References 11 publications
0
1
0
Order By: Relevance
“…Kocher [33] presented a platform-independent method for updating the secret key for each executive session of a cryptographic scheme, causing the synchronization patterns. Rambus [34] suggested a set of software libraries and hardware cores that are immune to secondary channel attacks such as temporal, electromagnetic, SPA, and DPA attacks. In fact, their methods are based on strategies that reduce the signal-to-noise ratio on side channels and introduce randomization into cryptographic operations.…”
Section: Securitymentioning
confidence: 99%
“…Kocher [33] presented a platform-independent method for updating the secret key for each executive session of a cryptographic scheme, causing the synchronization patterns. Rambus [34] suggested a set of software libraries and hardware cores that are immune to secondary channel attacks such as temporal, electromagnetic, SPA, and DPA attacks. In fact, their methods are based on strategies that reduce the signal-to-noise ratio on side channels and introduce randomization into cryptographic operations.…”
Section: Securitymentioning
confidence: 99%