65 research outputs found

    Asymmetric Leakage from Multiplier and Collision-Based Single-Shot Side-Channel Attack

    Get PDF
    The single-shot collision attack on RSA proposed by Hanley et al. is studied focusing on the difference between two operands of multiplier. It is shown that how leakage from integer multiplier and long-integer multiplication algorithm can be asymmetric between two operands. The asymmetric leakage is verified with experiments on FPGA and micro-controller platforms. Moreover, we show an experimental result in which success and failure of the attack is determined by the order of operands. Therefore, designing operand order can be a cost-effective countermeasure. Meanwhile we also show a case in which a particular countermeasure becomes ineffective when the asymmetric leakage is considered. In addition to the above main contribution, an extension of the attack by Hanley et al. using the signal-processing technique of Big Mac Attack is presented

    Novel scotoma detection method using time required for fixation to the random targets

    Get PDF
    We developed a novel scotoma detection system using time required for fixation to the random targets, or the” eye-guided scotoma detection method “. In order to verify the” eye-guided scotoma detection method “, we measured 78 eyes of 40 subjects, and examined the measurement results in comparison with the results of measurement by Humphrey perimetry. The results were as follows: (1) Mariotte scotomas were detected in 100% of the eyes tested; (2) The false-negative rate (the percentage of cases where a scotoma was evaluated as a non-scotoma) was less than 10%; (3) The positive point distribution in the low-sensitivity eyes was well matched. These findings suggested that the novel scotoma detection method in the current study will pave the way for the realization of mass screening to detect pathological scotoma earlier.[Author summary] Conventional perimeters, such as the Goldmann perimeter and Humphrey perimeter, require experienced examiners and space occupying. With either perimeter, subjects’ eye movements need to be strictly fixed to the fixation target of the device. Other perimeters can monitor fixation and automatically measure the visual field. With the eye-guided scotoma detection method proposed in the current study, subjects feel less burdened since they do not have to fixate on the fixation target of the device and can move their eyes freely. Subjects simply respond to visual targets on the display; then, scotomas can be automatically detected. The novel method yields highly accurate scotoma detection through an algorithm that separates scotomas from non-scotomas

    Paleopathological characteristics of Neolithic early rice farmers in the lower reaches of the Yangtze river

    Get PDF
    Paleopathological investigations of human remains from the Neolithic Hemudu culture in the lower reaches of the Yangtze River in southern East Asia were conducted to clarify the health status of people in early rice-farming societies. Our results show that the occurrence ratios of cribra orbitalia and enamel hypoplasia did not differ significantly between early rice farmers and hunter-gatherers. By contrast, the occurrence ratios of periosteal reactions, dental caries, and antemortem tooth loss in adults were higher among the early rice farmers. Based on these findings and the results of archaeological research on the Hemudu culture, it was suggested that: 1) the Hemudu culture adopted a diversified livelihood strategy that was not overly dependent on rice as a food resource, which did not lead to an extreme decline in health status, 2) the work in the rice fields or the working environment caused stress to the workers, and 3) the rice-farming society’s dietary habits led to a decline in oral health. Our results provide new paleopathological insights into the health status of early rice farmers in East Asia. However, the sample size of early rice farmers used in this study was small, and more data are needed to verify the validity of the views presented here

    Random Switching Logic: A Countermeasure against DPA based on Transition Probability

    Get PDF
    In this paper, we propose a new model for directly evaluating DPA leakage from logic information in CMOS circuits. This model is based on the transition probability for each gate, and is naturally applicable to various actual devices for simulating power analysis. We also report on our study of the e#ects of the previously known countermeasures on both our model and FPGA, and show the possibility of leaking information, which is caused by strict precondition for implementing a secure circuit. Furthermore, we present an e#cient countermeasure, Random Switching Logic(RSL), for relaxing the precondition, and show that RSL makes a cryptographic circuit secure through evaluation on both our model and FPGA

    Multi Proxy Anchor Loss and Effectiveness of Deep Metric Learning Performance Metrics

    Full text link
    Deep metric learning (DML) learns the mapping, which maps into embedding space in which similar data is near and dissimilar data is far. However, conventional proxy-based losses for DML have two problems: gradient problems and applying the real-world dataset with multiple local centers. Besides, DML performance metrics also have some issues have stability and flexibility. This paper proposes multi-proxies anchor (MPA) loss and normalized discounted cumulative gain (nDCG@k) metric. This study contributes three following: (1) MPA loss is able to learn the real-world dataset with multi-local centers. (2) MPA loss improves the training capacity of a neural network owing to solving the gradient issues. (3) nDCG@k metric encourages complete evaluation for various datasets. Finally, we demonstrate MPA loss's effectiveness, and MPA loss achieves higher accuracy on two datasets for fine-grained images

    Random Switching Logic: A Countermeasure against DPA based on Transition Probability. Cryptology ePrint Archive (http://eprint.iacr.org

    No full text
    Abstract. In this paper, we propose a new model for directly evaluating DPA leakage from logic information in CMOS circuits. This model is based on the transition probability for each gate, and is naturally applicable to various actual devices for simulating power analysis. We also report on our study of the effects of the previously known countermeasures on both our model and FPGA, and show the possibility of leaking information, which is caused by strict precondition for implementing a secure circuit. Furthermore, we present an efficient countermeasure, Random Switching Logic(RSL), for relaxing the precondition, and show that RSL makes a cryptographic circuit secure through evaluation on both our model and FPGA.

    Toward Effective Countermeasures against an Improved Fault Sensitivity Analysis

    No full text
    corecore