Loading...
Search for: information-leakage
0.011 seconds

    Power analysis attacks on MDPL and DRSL implementations

    , Article 10th International Conference on Information Security and Cryptology, ICISC 2007, Seoul, 29 November 2007 through 30 November 2007 ; Volume 4817 LNCS , 2007 , Pages 259-272 ; 03029743 (ISSN); 9783540767879 (ISBN) Moradi, A ; Salmasizadeh, M ; Manzuri Shalmani, M. T ; Sharif University of Technology
    Springer Verlag  2007
    Abstract
    Several logic styles such as Masked Dual-Rail Pre-charge Logic (MDPL) and Dual-Rail Random Switching Logic (DRSL) have been recently proposed to make implementations resistant against power analysis attacks. In this paper, it is shown that the circuits which contain sequential elements, flip-flops, and implemented in MDPL or DRSL styles are vulnerable to DPA attacks. Based on our results, the information leakage of CMOS D-flip-flops that are used to construct MDPL and DRSL D-flip-fiops is the cause of this vulnerability. To reduce the leakage, a modification on the structure of the MDPL and DRSL flip-flops are proposed; two CMOS D-flip-flops are used in the suggested structure. The proposed... 

    Finding Influential Nodes in Complex Networks

    , M.Sc. Thesis Sharif University of Technology Barazandeh Shirvan, Amin (Author) ; Jalili, Mahdi (Supervisor)
    Abstract
    The modern science of networks helps us to have a better understanding of complex systems. Networked systems can be found everywhere and many systems can be represented by a complex network. A networked structure consists of a number of nodes and links connecting to them. Networks’ ability in information propagation is one of their amazing features that have attracted lots of scholars to work on. It has potential applications in many fields ranging from marketing to biology, epidemiology and sociology. Information propagation studies how information such as computer viruses, contagion, rumor, or new product’s interest propagates over a network. Percolation theory and various epidemic models... 

    Colluding eavesdroppers in large cooperative wireless networks

    , Article IWCIT 2014 - Iran Workshop on Communication and Information Theory ; 2014 ; ISBN: 9781479948789 Mirmohseni, M ; Papadimitratos, P ; Sharif University of Technology
    Abstract
    Securing communication against non-colluding passive eavesdroppers has been extensively studied. Colluding eavesdroppers were considered for interference-limited large networks. However, collusion was not investigated for large cooperative networks. This paper closes this gap: we study the improvement the eavesdroppers achieve due to collusion in terms of the information leakage rate in a large cooperative network. We consider a dense network with nl legitimate nodes, ne eavesdroppers, and path loss exponent α ≥ 2. We show that if ne (2+2/α) (log ne)γ = o(n l) holds, for some positive γ, then zero-cost secure communication is possible; i.e., ne colluding eavesdroppers can be tolerated. This... 

    Access control aware data retrieval for secret sharing based database outsourcing

    , Article Distributed and Parallel Databases ; Volume 34, Issue 4 , Dec , 2015 , pp 505–534 ; 09268782 (ISSN) Hadavi, M. A ; Jalili, R ; Karimi, L ; Sharif University of Technology
    Kluwer Academic Publishers  2015
    Abstract
    Enforcing dynamic and confidential access control policies is a challenging issue of data outsourcing to external servers due to the lack of trust towards the servers. In this paper, we propose a scalable yet flexible access control enforcement mechanism when the underlying relational data, on which access policies are defined, has been shared through a secret sharing scheme. For sharing values of an attribute in a relation, the attribute is assigned a secret distribution key and its values are split and distributed among data servers according to a Shamir based secret sharing scheme. Given access control policies over attributes of the relation schema, access to distribution keys, used... 

    Generation of motional entangled coherent state in an optomechanical system in the single photon strong coupling regime

    , Article Journal of Modern Optics ; Volume 62, Issue 19 , Jul , 2015 , Pages 1685-1691 ; 09500340 (ISSN) Mahmoudi, Z ; Shakeri, S ; Hamidi, O ; Zandi, M. H ; Bahrampour, A ; Sharif University of Technology
    Taylor and Francis Ltd  2015
    Abstract
    The single-photon strong coupling in the deep-resolved sideband of the optomechanical system induces photon blockade (PB) effect. For the PB cavity, an initial mechanical coherent state evolves into superposition of phonon cat states entangled with the cavity Fock states. Measurement of the cavity photon number states produces phonon even and odd cat states. The information leakage effect of two photon states on the fidelity of cat states is calculated, it is shown that for low average phonon number this effect is negligible and decreases by increasing the two photon cavity state. The Lindblad equation is solved numerically to obtain the environmental effects on the fidelity of cat states  

    Access control aware data retrieval for secret sharing based database outsourcing

    , Article Distributed and Parallel Databases ; Volume 34, Issue 4 , 2016 , Pages 505-534 ; 09268782 (ISSN) Hadavi, M. A ; Jalili, R ; Karimi, L ; Sharif University of Technology
    Springer New York LLC  2016
    Abstract
    Enforcing dynamic and confidential access control policies is a challenging issue of data outsourcing to external servers due to the lack of trust towards the servers. In this paper, we propose a scalable yet flexible access control enforcement mechanism when the underlying relational data, on which access policies are defined, has been shared through a secret sharing scheme. For sharing values of an attribute in a relation, the attribute is assigned a secret distribution key and its values are split and distributed among data servers according to a Shamir based secret sharing scheme. Given access control policies over attributes of the relation schema, access to distribution keys, used... 

    AS5: A secure searchable secret sharing scheme for privacy preserving database outsourcing

    , Article Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Pisa ; Volume 7731 LNCS , 2013 , Pages 201-216 ; 03029743 (ISSN) ; 9783642358890 (ISBN) Hadavi, M. A ; Damiani, E ; Jalili, R ; Cimato, S ; Ganjei, Z ; Sharif University of Technology
    2013
    Abstract
    Researchers have been studying security challenges of database outsourcing for almost a decade. Privacy of outsourced data is one of the main challenges when the "Database As a Service" model is adopted in the service oriented trend of the cloud computing paradigm. This is due to the insecurity of the network environment or even the untrustworthiness of the service providers. This paper proposes a method to preserve privacy of outsourced data based on Shamir's secret sharing scheme. We split attribute values into several parts and distribute them among untrusted servers. The problem of using secret sharing in data outsourcing scenario is how to search efficiently within the randomly... 

    FLMAP: A fast lightweight mutual authentication protocol for RFID systems

    , Article 2008 16th International Conference on Networks, ICON 2008, New Delhi, 12 December 2008 through 14 December 2008 ; February , 2008 ; 9781424438051 (ISBN) Sadighian, A ; Jalili, R ; Sharif University of Technology
    2008
    Abstract
    Numerous authentication protocols for RFID systems were proposed as attempt to prevent unauthorized tracking and monitoring, impersonation or cloning, and information leakage. Many of such attempts cannot establish essential requirements that one robust authentication protocol must guarantee. In this paper, we propose a rapid mutual authentication protocol, called FLMAP, that overcomes all the drawbacks of previously proposed protocols. Our protocol has three passes and it does not use any cryptographic primitives such as hash functions and encryption algorithms; it is very fast and efficient. Significant characteristics of the protocol are forward security, tag anonymity, location privacy,... 

    Modified cache template attack on AES

    , Article Scientia Iranica ; Volume 29, Issue 4 , 2022 , Pages 1949-1956 ; 10263098 (ISSN) Esfahani, M ; Soleimany, H ; Aref, M. R ; Sharif University of Technology
    Sharif University of Technology  2022
    Abstract
    CPU caches are powerful sources of information leakage. To develop practical cache-based attacks, the need for automation of the process of finding exploitable cachebased side-channels in computer systems is felt more than ever. Cache template attack is a generic technique that utilizes Flush+Reload attack in order to automatically exploit cache vulnerability of Intel platforms. Cache template attack on the T-table-based AES implementation consists of two phases including the profiling phase and key exploitation phase. Profiling is a preprocessing phase to monitor dependencies between the secret key and behavior of the cache memory. In addition, the addresses of T-tables can be obtained...