RegKey: a register-based implementation of ECC signature algorithms against one-shot memory disclosure

Y Fu, J Lin, D Feng, W Wang, M Wang… - ACM Transactions on …, 2023 - dl.acm.org
To ensure the security of cryptographic algorithm implementations, several cryptographic
key protection schemes have been proposed to prevent various memory disclosure attacks …

Mimosa: Protecting private keys against memory disclosure attacks using hardware transactional memory

C Li, L Guan, J Lin, B Luo, Q Cai… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
Cryptography is essential for computer and network security. When cryptosystems are
deployed in computing or communication systems, it is extremely critical to protect the …

VIRSA: Vectorized in-register RSA computation with memory disclosure resistance

Y Fu, W Wang, L Meng, Q Wang, Y Zhao… - … Conference on Information …, 2021 - Springer
Memory disclosure attacks give adversaries access to sensitive data in memory, posing a
serious threat to the security of cryptographic systems. For example, the plain private key in …

CAUSEC: Cache-Based Secure Key Computation with (Mostly) Deprivileged Execution

S Alam, L Guan, Z Chen, H Wang… - 2023 IEEE 43rd …, 2023 - ieeexplore.ieee.org
As cold boot attacks become a realistic threat to cryptographic systems, several defense
solutions have been proposed in the past decade to protect cryptographic systems against …

Protecting Private Keys of Dilithium Using Hardware Transactional Memory

L Meng, Y Fu, F Zheng, Z Ma, M Wang, D Ye… - … on Information Security, 2023 - Springer
The confidentiality of cryptography keys is necessary in cryptographic implementations. In
order to resist memory disclosure attacks that steal sensitive variables such as private keys …

事务内存机制在系统安全中的应用: 现状与展望

李从午, 林锵璟, 蔡权伟, 罗勃 - 信息安全学报, 2019 - jcs.iie.ac.cn
为了提高并行程序中共享内存数据的读写访问性能, 事务内存机制于1993 年被提出.
因为事务内存机制直接涉及内存数据的读写控制, 所以也得到了系统安全研究人员的极大关注 …

[PDF][PDF] 密码应用安全技术研究及软件密码模块检测的讨论

郑昉昱, 林璟锵, 魏荣, 王琼霄 - 密码学报, 2020 - jcr.cacrnet.org.cn
基于密码学原理的安全解决方案是网络空间安全研究的重要内容, 能够为信息系统提供各种必要
安全保障. 然而, 许多现实事例表明, 在信息系统中完善地实施密码技术并非易事. 尤其是 …

Check for updates

UHT Memory, L Meng¹, Y Fu, F Zheng… - … ISC 2023, Groningen …, 2023 - books.google.com
The confidentiality of cryptography keys is necessary in cryptographic implementations. In
order to resist memory disclosure attacks that steal sensitive variables such as private keys …

Peapods: OS-independent memory confidentiality for cryptographic engines

C Li, J Lin, Q Cai, B Luo - 2018 IEEE Intl Conf on Parallel & …, 2018 - ieeexplore.ieee.org
Cryptography is widely adopted in computer systems to protect the confidentiality of
sensitive information. The security relies on the assumption that cryptography keys are never …

[PDF][PDF] Mimosa: Protecting Private Keys against Memory Disclosure Attacks using Hardware Transactional Memory

MDA using Hardware - ittc.ku.edu
Cryptography is essential for computer and network security. When cryptosystems are
deployed in computing or communication systems, it is extremely critical to protect the …