The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Side Channel Analysis (SCA) provides a powerful tool for skilled adversaries to reduce the effort to determine an unknown key by the principle of 'divide and conquer', especially for the implementation of symmetric cryptographic algorithm. Among the SCA techniques, Correlation Power Analysis (CPA) is one of the most famous methods since it is easy to carry out and the efficiency is usually high. The...
Electromagnetic attacks are non-invasive attacks and pose serious threats to the security of cryptographic devices. However, its environment is complex and the noise on electromagnetic traces is often large. Thus, traditional differential electromagnetic analysis (DEMA) and correlation electromagnetic analysis (CEMA) require a lot of electromagnetic traces to recover the key used in the cryptographic...
Computer displays emit electromagnetic waves, which compromise the information displayed by the computer. This can be a potential information security threat as the sensitive information can be stolen from a distance without leaving any trace. The video leakage signals contain the information of the image displayed in the computer, so the video leakage signals can be seen as special image signals...
The electromagnetic waves emitted from devices can be a source of information leakage and can cause electromagnetic compatibility (EMC) problems. Electromagnetic radiation signal from computer display can be seen as a computer security risk if the radiation signal is intercepted and reconstructed. In addition to the image information displayed by the computer, electromagnetic radiation leaks the hardware...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.