马赛克 发表于 2025-3-28 14:39:30

White-Box Cryptography with Global Device Binding from Message-Recoverable Signatures and Token-Basen. We later consider the use of Token-Based Obfuscation for constructing a simpler family of global white-boxes, and show new ways of building white-box crypto, from more accepted assumptions as previously considered in the literature.

令人作呕 发表于 2025-3-28 19:48:49

http://reply.papertrans.cn/24/2362/236127/236127_42.png

Camouflage 发表于 2025-3-29 00:36:07

http://reply.papertrans.cn/24/2362/236127/236127_43.png

GRATE 发表于 2025-3-29 03:49:48

http://reply.papertrans.cn/24/2362/236127/236127_44.png

侧面左右 发表于 2025-3-29 10:00:07

http://reply.papertrans.cn/24/2362/236127/236127_45.png

Bumptious 发表于 2025-3-29 11:24:04

http://reply.papertrans.cn/24/2362/236127/236127_46.png

In-Situ 发表于 2025-3-29 16:15:36

http://reply.papertrans.cn/24/2362/236127/236127_47.png

小口啜饮 发表于 2025-3-29 21:20:23

SAMVA: Static Analysis for Multi-fault Attack Paths Determinationthe attacker’s objective. We evaluate the proposed approach on eight PIN verification programs containing various software countermeasures. Our framework finds numerous attack paths, even for the most hardened version, in very limited time.

scrutiny 发表于 2025-3-30 01:47:12

On the Feasibility of Single-Trace Attacks on the Gaussian Sampler Using a CDTk and leverages its success rate to 100%..We accomplish the attack on FrodoKEM, a lattice-based KEM and third-round alternate candidate. We execute it on a Cortex-M4 board equipped with an STM32F4 micro-controller clocked at different frequencies.

gospel 发表于 2025-3-30 06:31:40

http://reply.papertrans.cn/24/2362/236127/236127_50.png
页: 1 2 3 4 [5] 6
查看完整版本: Titlebook: Constructive Side-Channel Analysis and Secure Design; 14th International W Elif Bilge Kavun,Michael Pehl Conference proceedings 2023 The Ed