TVVF: Estimating the vulnerability of hardware cryptosystems against timing violation attacks.
Bilgiday YuceNahid Farhady GhalatyPatrick SchaumontPublished in: HOST (2015)
Keyphrases
- cryptographic protocols
- buffer overflow
- countermeasures
- security risks
- real time
- low cost
- denial of service
- security vulnerabilities
- hardware and software
- dos attacks
- malicious attacks
- security protocols
- rigid body
- attack detection
- elliptic curve
- hardware implementation
- massively parallel
- secret key
- hardware architecture
- signature scheme
- risk assessment
- data acquisition
- image processing