توجه: محتویات این صفحه به صورت خودکار پردازش شده و مقاله‌های نویسندگانی با تشابه اسمی، همگی در بخش یکسان نمایش داده می‌شوند.
۱An Investigation through Different B its Leakage in Power Analysis Attacks
نویسنده(ها): ،
اطلاعات انتشار: چهارمین کنفرانس انجمن رمز ایران، سال
تعداد صفحات: ۶
Since the introduction of side–channel attacks, cryptographic devices are highly susceptible to power and electromagnetic analysis attacks, because these attacks require only relatively inexpensive equipments. Unless adequate countermeasures are implemented, side channel attacks allow an unauthorized person to reveal the private key of a cryptographic module. For attackers it is really prominent to attack a module with less number of measurements. Choosing an appropriate intermediate result is often of high importance and enables them to reveal the secret key with less number of measurements and in a short duration of time. In this paper a differential power analysis attack on different bits of an intermediate result on software implementation of AES– 128 on an 8051–compatible microcontroller has been carried out. The results show that specific bits leak information that is detectable with given 200 measurements. The other bits do not leak enough information that could be exploitable with 200 measurements in this particular attack. Consequently attackers should be aware that different bits in the same register in a processor leak different amount of information.<\div>

۲A Parallelized and Pipelined Datapath to Implement ISODATA Algorithm for Rosette Scan Images on a Reconfigurable Hardware
نویسنده(ها): ، ،
اطلاعات انتشار: چهارمین کنفرانس ماشین بینایی و پردازش تصویر، سال
تعداد صفحات: ۷
Unsupervised clustering is a powerful technique that can be used for distinguishing the real target from the false targets such as flares in the mages formed by infrared sensors in missiles. The rosette scan image is formed by a single infrared sensor scanning the total field of view by rosette pattern. This image is a greyscale image in which the real target could be differentiated from flares regarding the intensity of radiation sensed by IR sensor or the spatial position of the target. The ISODATA is one of the unsupervised clustering algorithms that could be used in infrared guided missiles detectors, since the algorithm itself computes the number of clusters or in other words the number of flares. Although the only drawback of the ISODATA is the extension in the processing time of the algorithm while the missile approaches the target and the number of detected clusters varies frequently, we can still take advantage of the algorithm by speeding up the most time consuming parts. In our approach to identify and locate the time consuming parts of the algorithm, first a profiling on a software implementation of the ISODATA algorithm has been carried out. The results show that over 60 percent of the complete execution time of the algorithm is consumed in computation of the distance from cluster centres. In this paper we propose a pipelined and parallelized datapath for hardware implementation of the algorithm in order to speed up the distance computation process and overcome the problem.<\div>
نمایش نتایج ۱ تا ۲ از میان ۲ نتیجه