NATTY 发表于 2025-3-28 17:03:52

http://reply.papertrans.cn/24/2362/236128/236128_41.png

指数 发表于 2025-3-28 22:40:14

Differential Fault Attacks on KLEINciphertexts, the attacker is able to determine the last round key. The second variant, which works only on KLEIN-64, injects a byte-fault in the key schedule and requires at least four faulty ciphertexts in order to determine the whole key. Furthermore, we demonstrate the efficiency of both attack methods by simulation.

凹槽 发表于 2025-3-28 23:58:15

http://reply.papertrans.cn/24/2362/236128/236128_43.png

morale 发表于 2025-3-29 03:58:06

http://reply.papertrans.cn/24/2362/236128/236128_44.png

CRANK 发表于 2025-3-29 07:49:04

FIMA: Fault Intensity Map Analysispaper, we use FIMA to retrieve the entire 128-bit secret key of the Ascon authenticated cipher, a CAESAR finalist for lightweight applications. On a software implementation of Ascon, simulations show that FIMA recovers the secret key with fewer than 50% of the fault injections required by previous t

scrutiny 发表于 2025-3-29 13:41:50

Another Look on Bucketing Attack to Defeat White-Box Implementations from software execution traces. Moreover, we extend this cryptanalysis technique, originally designed to break DES white-box implementations, to target AES white-box implementations. To illustrate the effectiveness of our proposal, we apply our attack on several publicly available white-box impleme

nautical 发表于 2025-3-29 16:16:59

http://reply.papertrans.cn/24/2362/236128/236128_47.png

Antecedent 发表于 2025-3-29 21:22:37

http://reply.papertrans.cn/24/2362/236128/236128_48.png

Paraplegia 发表于 2025-3-30 01:43:42

http://reply.papertrans.cn/24/2362/236128/236128_49.png

GIST 发表于 2025-3-30 07:15:33

Towards Optimized and Constant-Time CSIDH on Embedded Devicesst 12 s for each party to compute a commutative action operation in constant-time over the 511-bit finite field proposed by Castryck et al. However, using uniform but variable-time Montgomery ladder with security considerations improves these results significantly.
页: 1 2 3 4 [5] 6
查看完整版本: Titlebook: Constructive Side-Channel Analysis and Secure Design; 10th International W Ilia Polian,Marc Stöttinger Conference proceedings 2019 Springer