搜索结果: 1-15 共查到“密码学 Attacking”相关记录27条 . 查询时间(0.062 秒)
A Comparison of Single-Bit and Multi-Bit DPA for Attacking AES128 on an ATmega328P
AES DPA multi-bit DPA
2019/8/8
Side channel attacks have demonstrated in the past that it is possible to break cryptographic algorithms by attacking the implementation rather than the algorithm. This paper compares an adaptation of...
The Rush Dilemma: Attacking and Repairing Smart Contracts on Forking Blockchains
blockchain forks smart contracts secure computation
2019/8/6
We investigate the security of smart contracts within a blockchain that can fork (as Bitcoin and Ethereum). In particular, we focus on multi-party computation (MPC) protocols run on-chain with the aid...
Structural Nonlinear Invariant Attacks on T-310: Attacking Arbitrary Boolean Functions
block ciphers Boolean functions non-linearity
2019/1/2
Recent papers show how to construct polynomial invariant attacks for block ciphers, however almost all such results are somewhat weak: invariants are simple and low degree and the Boolean functions te...
This paper studies the security of Ring Oscillator Physically Unclonable Function (PUF) with Enhanced Challenge-Response Pairs as proposed by Delavar et al. We present an attack that can predict all P...
Simulations of Optical Emissions for Attacking AES and Masked AES
Photonic side channel Side channel analysis Light emission
2018/3/29
In this paper we present a novel attack based on photonic emission analysis targeting software implementations of AES. We focus on the particular case in which the attacker can collect the photonic em...
Attacking Deterministic Signature Schemes using Fault Attacks
Deterministic signatures EdDSA fault attack
2017/10/19
Many digital signature schemes rely on random numbers that are unique and non-predictable per signature. Failures of random number generators may have catastrophic effects such as compromising private...
On the Power of Optical Contactless Probing: Attacking Bitstream Encryption of FPGAs
ICs FPGA
2017/9/1
Modern Integrated Circuits (ICs) employ several classes of countermeasures to mitigate physical attacks. Recently, a powerful semi-invasive attack relying on optical contactless probing has been intro...
To BLISS-B or not to be - Attacking strongSwan's Implementation of Post-Quantum Signatures
lattice-based cryptography side-channel analysis signatures
2017/6/1
In the search for post-quantum secure alternatives to RSA and ECC, lattice-based cryptography appears to be an attractive and efficient option. A particularly interesting lattice-based signature schem...
Grover Meets Simon - Quantumly Attacking the FX-construction
symmetric cryptography quantum attacks Grover's algorithm
2017/5/23
Using whitening keys is a well understood mean of increasing the key-length of any given cipher. Especially as it is known ever since Grover's seminal work that the effective key-length is reduced by ...
Attacking FHE-based applications by software fault injections
FHE safe errors reaction attacks
2016/12/29
The security of fully homomorphic encryption is often studied at the primitive level, and a lot of questions remain open when the cryptographer needs to choose between incompatible options, like IND- ...
Attacking embedded ECC implementations through cmov side channels
ECC Montgomery ladder power analysis
2016/12/8
Side-channel attacks against implementations of elliptic-curve cryptography have been extensively studied in the literature and a large tool-set of countermeasures is available to thwart different att...
A New Birthday-Type Algorithm for Attacking the Fresh Re-Keying Countermeasure
LPN Ring-LPN fresh re-keying
2016/3/2
The fresh re-keying scheme is a countermeasure designed to protect low-cost devices against side-channel attacks. In this paper, we present a new birthday-type attack based on a refined reduction to R...
We identify two attacks on the Network Time Protocol (NTP)’s
cryptographically-authenticated broadcast mode. First, we
present a replay attack that allows an on-path attacker to
indefinitely stick ...
Attacking Suggest Boxes in Web Applications Over HTTPS Using Side-Channel Stochastic Algorithms
Side-channel leak web application suggest box
2016/1/5
Web applications are subject to several types of attacks. In
particular, side-channel attacks consist in performing a statistical analysis
of the web traffic to gain sensitive information about a cl...
We explore the risk that network attackers can exploit unauthenticated Network Time Protocol (NTP) traffic to alter the time on client systems. We first discuss how an on-path attacker, that hijacks t...