RegKey: a register-based implementation of ECC signature algorithms against one-shot memory disclosure
Y Fu, J Lin, D Feng, W Wang, M Wang… - ACM Transactions on …, 2023 - dl.acm.org
To ensure the security of cryptographic algorithm implementations, several cryptographic
key protection schemes have been proposed to prevent various memory disclosure attacks …
key protection schemes have been proposed to prevent various memory disclosure attacks …
Mimosa: Protecting private keys against memory disclosure attacks using hardware transactional memory
Cryptography is essential for computer and network security. When cryptosystems are
deployed in computing or communication systems, it is extremely critical to protect the …
deployed in computing or communication systems, it is extremely critical to protect the …
VIRSA: Vectorized in-register RSA computation with memory disclosure resistance
Y Fu, W Wang, L Meng, Q Wang, Y Zhao… - … Conference on Information …, 2021 - Springer
Memory disclosure attacks give adversaries access to sensitive data in memory, posing a
serious threat to the security of cryptographic systems. For example, the plain private key in …
serious threat to the security of cryptographic systems. For example, the plain private key in …
CAUSEC: Cache-Based Secure Key Computation with (Mostly) Deprivileged Execution
As cold boot attacks become a realistic threat to cryptographic systems, several defense
solutions have been proposed in the past decade to protect cryptographic systems against …
solutions have been proposed in the past decade to protect cryptographic systems against …
Protecting Private Keys of Dilithium Using Hardware Transactional Memory
L Meng, Y Fu, F Zheng, Z Ma, M Wang, D Ye… - … on Information Security, 2023 - Springer
The confidentiality of cryptography keys is necessary in cryptographic implementations. In
order to resist memory disclosure attacks that steal sensitive variables such as private keys …
order to resist memory disclosure attacks that steal sensitive variables such as private keys …
事务内存机制在系统安全中的应用: 现状与展望
李从午, 林锵璟, 蔡权伟, 罗勃 - 信息安全学报, 2019 - jcs.iie.ac.cn
为了提高并行程序中共享内存数据的读写访问性能, 事务内存机制于1993 年被提出.
因为事务内存机制直接涉及内存数据的读写控制, 所以也得到了系统安全研究人员的极大关注 …
因为事务内存机制直接涉及内存数据的读写控制, 所以也得到了系统安全研究人员的极大关注 …
[PDF][PDF] 密码应用安全技术研究及软件密码模块检测的讨论
郑昉昱, 林璟锵, 魏荣, 王琼霄 - 密码学报, 2020 - jcr.cacrnet.org.cn
基于密码学原理的安全解决方案是网络空间安全研究的重要内容, 能够为信息系统提供各种必要
安全保障. 然而, 许多现实事例表明, 在信息系统中完善地实施密码技术并非易事. 尤其是 …
安全保障. 然而, 许多现实事例表明, 在信息系统中完善地实施密码技术并非易事. 尤其是 …
Check for updates
UHT Memory, L Meng¹, Y Fu, F Zheng… - … ISC 2023, Groningen …, 2023 - books.google.com
The confidentiality of cryptography keys is necessary in cryptographic implementations. In
order to resist memory disclosure attacks that steal sensitive variables such as private keys …
order to resist memory disclosure attacks that steal sensitive variables such as private keys …
Peapods: OS-independent memory confidentiality for cryptographic engines
Cryptography is widely adopted in computer systems to protect the confidentiality of
sensitive information. The security relies on the assumption that cryptography keys are never …
sensitive information. The security relies on the assumption that cryptography keys are never …
[PDF][PDF] Mimosa: Protecting Private Keys against Memory Disclosure Attacks using Hardware Transactional Memory
MDA using Hardware - ittc.ku.edu
Cryptography is essential for computer and network security. When cryptosystems are
deployed in computing or communication systems, it is extremely critical to protect the …
deployed in computing or communication systems, it is extremely critical to protect the …