[PDF][PDF] 侧信道攻击与防御技术研究进展
王永娟, 樊昊鹏, 代政一, 袁庆军, 王相宾 - 计算机学报, 2023 - 159.226.43.17
摘要侧信道攻击利用密码实现的物理泄露而不是理论弱点来恢复密钥, 对密码系统的安全实现有
严重的现实威胁. 密码设备运行时所产生的能量, 电磁, 缓存和故障输出等侧信息均可能导致密钥 …
严重的现实威胁. 密码设备运行时所产生的能量, 电磁, 缓存和故障输出等侧信息均可能导致密钥 …
When frodo flips: End-to-end key recovery on frodokem via rowhammer
In this work, we recover the private key material of the FrodoKEM key exchange mechanism
as submitted to the NIST Post Quantum Cryptography (PQC) standardization process. The …
as submitted to the NIST Post Quantum Cryptography (PQC) standardization process. The …
Jolt: Recovering tls signing keys via rowhammer faults
Digital Signature Schemes such as DSA, ECDSA, and RSA are widely deployed to protect
the integrity of security protocols such as TLS, SSH, and IPSec. In TLS, for instance, RSA …
the integrity of security protocols such as TLS, SSH, and IPSec. In TLS, for instance, RSA …
Securing IoT Systems in a Post-Quantum Environment: Vulnerabilities, Attacks, and Possible Solutions
Abstract The Internet of Things (IoT) refers to the distributed systems environment
connecting billions of devices to the Internet, and quantum computing is an emerging …
connecting billions of devices to the Internet, and quantum computing is an emerging …
Signature correction attack on dilithium signature scheme
Motivated by the rise of quantum computers, existing public-key cryptosystems are expected
to be replaced by post-quantum schemes in the next decade in billions of devices. To …
to be replaced by post-quantum schemes in the next decade in billions of devices. To …
Separating oil and vinegar with a single trace: side-channel assisted Kipnis-Shamir attack on UOV
Due to recent cryptanalytical breakthroughs, the multivariate signature schemes that
seemed to be most promising in the past years are no longer in the focus of the research …
seemed to be most promising in the past years are no longer in the focus of the research …
[PDF][PDF] Toward realistic backdoor injection attacks on dnns using rowhammer
State-of-the-art deep neural networks (DNNs) have been proven to be vulnerable to
adversarial manipulation and backdoor attacks. Backdoored models deviate from expected …
adversarial manipulation and backdoor attacks. Backdoored models deviate from expected …
SoK: How (not) to design and implement post-quantum cryptography
Post-quantum cryptography has known a Cambrian explosion in the last decade. What
started as a very theoretical and mathematical area has now evolved into a sprawling …
started as a very theoretical and mathematical area has now evolved into a sprawling …
[PDF][PDF] SledgeHammer: Amplifying Rowhammer via Bank-level Parallelism
Rowhammer is a hardware vulnerability in DDR memory by which attackers can perform
specific access patterns in their own memory to flip bits in adjacent, uncontrolled rows …
specific access patterns in their own memory to flip bits in adjacent, uncontrolled rows …
Revisiting security estimation for LWE with hints from a geometric perspective
D Dachman-Soled, H Gong, T Hanson… - Annual International …, 2023 - Springer
Abstract The Distorted Bounded Distance Decoding Problem (DBDD) was introduced by
Dachman-Soled et al.[Crypto'20] as an intermediate problem between LWE and unique-SVP …
Dachman-Soled et al.[Crypto'20] as an intermediate problem between LWE and unique-SVP …