Our system is currently under heavy load due to increased usage. We're actively working on upgrades to improve performance. Thank you for your patience.
2017
DOI: 10.1587/elex.14.20162004
|View full text |Cite
|
Sign up to set email alerts
|

Tamper-resistant cryptographic hardware

Abstract: Cryptosystems are widely used for achieving data confidentiality and authenticated access control. Recent cryptographic algorithms such as AES or RSA are computationally safe in the sense that it is practically impossible to reveal key information from a pair of plain and cipher texts if a key of sufficient length is used. A malicious attacker aims to reveal a key by exploiting implementation flaws in cryptographic modules. Even if there are no flaws in the software, the attacker will try to extract a secret k… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2018
2018
2021
2021

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(2 citation statements)
references
References 14 publications
0
2
0
Order By: Relevance
“…Furthermore, secure cores that are dedicated for cryptographic operations are increasingly present in modern computer processor chips. Operations performed inside such cores lower the side-channel information leakage, forcing attackers to use more sensitive measuring equipment and sophisticated pre-processing of EM traces in order to perform key retrieval attacks [35,74].…”
Section: Currentmentioning
confidence: 99%
“…Furthermore, secure cores that are dedicated for cryptographic operations are increasingly present in modern computer processor chips. Operations performed inside such cores lower the side-channel information leakage, forcing attackers to use more sensitive measuring equipment and sophisticated pre-processing of EM traces in order to perform key retrieval attacks [35,74].…”
Section: Currentmentioning
confidence: 99%
“…Threats against automobiles and infrastructure such as power plants are focused on. Security modules including cryptosystems begin to be introduced in embedded systems used in these fields [1]. Spec-ifications for new models are classified data until the car is exhibited in a special auto show.…”
Section: Introductionmentioning
confidence: 99%