搜索结果: 1-15 共查到“军事学 timing attacks”相关记录15条 . 查询时间(0.063 秒)
Timing attacks on Error Correcting Codes in Post-Quantum Secure Schemes
Post-Quantum Cryptography Decryption Failures Side-Channel Attacks
2019/3/20
While error correcting codes (ECC) have the potential to significantly reduce the failure probability of post-quantum schemes, they add an extra ECC decoding step to the algorithm. As this additional ...
DAWG: A Defense Against Cache Timing Attacks in Speculative Execution Processors
secure processor cache timing attack cache partitioning
2018/5/11
Software side channel attacks have become a serious concern with the recent rash of attacks on speculative processor architectures. Most attacks that have been demonstrated exploit the cache tag state...
Cache-Timing Attacks on RSA Key Generation
applied cryptography public key cryptography RSA
2018/4/25
During the last decade, constant-time cryptographic software has quickly transitioned from an academic construct to a concrete security requirement for real-world libraries. Most of OpenSSL's constant...
A Survey of Microarchitectural Timing Attacks and Countermeasures on Contemporary Hardware
Microarchitectural timing attacks Cache-based timing attacks Countermeasures
2016/6/17
Microarchitectural timing channels expose hidden hardware state though timing. We survey recent attacks that exploit microarchitectural features in shared hardware, especially as they are relevant for...
We improve the timing attack on ECDSA in [1] by Brumley and
Tuveri. We use the Gaussian heuristic to analyse the length of error
vectors in the lattice Close Vector Problem in order to determine
th...
Exclusive Exponent Blinding May Not Suffice to Prevent Timing Attacks on RSA
Timing attack RSA CRT exponent blinding
2016/1/6
The references [9, 3, 1] treat timing attacks on RSA with
CRT and Montgomery’s multiplication algorithm in unprotected implementations.
It has been widely believed that exponent blinding would
prev...
A Formal Analysis of Prefetching in Profiled Cache-Timing Attacks on Block Ciphers
Chester Rebeiro Debdeep Mukhopadhyay
2015/12/18
Formally bounding side-channel leakage is important to bridge the gap between the theory and practice in cryptography. However, bounding side-channel leakages is difficult because leakage in a crypto-...
Timing Attacks against the Syndrome Inversionin Code-based Cryptosystems
fstrenzke at crypto-source de
2012/6/14
In this work we present new timing vulnerabilities that arise in the inversion of the error syndrome through the Extended Euclidean Algorithm that is part of the decryption operation of code-based Cry...
Timing Attacks against the Syndrome Inversionin Code-based Cryptosystems
implementation / ide channel attack timing attack post quantum crypto-graphy code-based cryptography
2012/3/20
In this work we present new timing vulnerabilities that arise in the inversion of the error syndrome through the Extended Euclidean Algorithm that is part of the decryption operation of code-based Cry...
Timing Attacks against the Syndrome Inversion in Code-based Cryptosystems
ide channel attack timing attack post quantum crypto-graphy
2012/8/28
In this work we present the first practical key-aimed timing attack against code-based cryptosystems. It arises from vulnerabilities that are present in the inversion of the error syndrome through the...
Remote Timing Attacks are Still Practical
public-key cryptography / side-channel attacks timing attacks elliptic curve cryptography lattice attacks
2012/3/28
For over two decades, timing attacks have been an active area of research within applied cryptography. These attacks exploit cryptosystem or protocol implementations that do not run in constant time. ...
Remote Timing Attacks are Still Practical
public-key cryptography / side-channel attacks timing attacks elliptic curve cryptography lattice attacks
2011/6/8
For over two decades, timing attacks have been an active area of research within applied cryptography. These attacks exploit cryptosystem or protocol implementations that do not run in constant time. ...
Cache Timing Attacks on Camellia Block Cipher
block cipher access driven Cache timing attack
2009/7/22
Camellia, as the final winner of 128-bit block cipher in NESSIE, is the most secure block cipher of the world, none of the published paper has claimed to extract full Camellia key through experiment w...
A Provably Secure And Efficient Countermeasure Against Timing Attacks
Provably Secure And Efficient Countermeasure Timing Attacks
2009/6/12
We show that the amount of information about the key that
an unknown-message attacker can extract from a deterministic
side-channel is bounded from above by |O| log2(n + 1) bits,
where n is the num...
A Dynamic and Differential CMOS Logic Style to Resist Power and Timing Attacks on Security IC’s.
Dynamic and Differential CMOS Logic Style Power and Timing Attacks Security IC’s
2009/3/24
We present a dynamic and differential CMOS logic style, which has a signal independent switching
behavior. It is shown that during each clock cycle, power consumption and all circuit characteristics,...