Coronary 发表于 2025-3-23 12:56:00
Constructive Side-Channel Analysis and Secure Design6th International WoAND 发表于 2025-3-23 16:00:43
Improving Non-profiled Attacks on Exponentiations Based on Clustering and Extracting Leakage from Muleakage. This is particularly critical in case of asymmetric cryptography, where attackers are only allowed single side-channel observations because secrets are either ephemeral or blinded by countermeasures. We focus on . attacks which require less attacker privileges and cannot be prevented easily狂热文化 发表于 2025-3-23 19:07:17
http://reply.papertrans.cn/24/2362/236129/236129_13.png懒洋洋 发表于 2025-3-23 22:39:57
Efficient Selection of Time Samples for Higher-Order DPA with Projection Pursuitstleneck of practical adversaries/evaluators as the size of the measurement traces increases, especially in the challenging context of masked implementations, where only a combination of multiple shares reveals information in higher-order statistical moments. In this paper, we describe new (black boxHEDGE 发表于 2025-3-24 02:53:08
http://reply.papertrans.cn/24/2362/236129/236129_15.png雪白 发表于 2025-3-24 06:38:28
Two Operands of Multipliers in Side-Channel Attack two consequences. Firstly, designing order of operands can be a cost-effective countermeasure.We show a concrete example in which operand order determines success and failure of the attack. Secondly, countermeasures can be ineffective if the asymmetric leakage is considered. In addition to the maincaldron 发表于 2025-3-24 13:56:19
Evaluating the Duplication of Dual-Rail Precharge Logics on FPGAsost of these schemes have originally been designed for ASIC platforms, but much efforts have been spent to map them to FPGAs as well. A particular challenge is here to apply those schemes to the predefined logic structures of FPGAs (i.e., slices, LUTs, FFs, and routing switch boxes) for which speciaVisual-Acuity 发表于 2025-3-24 18:10:37
Side-Channel Protection by Randomizing Look-Up Tables on Reconfigurable Hardwaretives at the cost of a significant reconfiguration time for the mask update. In this work we analyze alternative ways to implement dynamic first-order masking of AES with randomized look-up tables that can reduce this mask update time. The memory primitives we consider in this work include three disETHER 发表于 2025-3-24 22:53:03
A Faster and More Realistic , Attack on AESa dangerous behavior from virtualization systems that poses a serious security risk: resource sharing. This work exploits a shared resource optimization technique called memory deduplication to mount a powerful known-ciphertext only cache side-channel attack on a popular . implementation of AES. Inlymphoma 发表于 2025-3-25 02:10:26
Faster Software for Fast Endomorphismsion. Despite their introduction in 2001, implementations of the GLV method have yet to permeate widespread software libraries. Furthermore, side-channel vulnerabilities, specifically cache-timing attacks, remain unpatched in the OpenSSL code base since the first attack in 2009 (Brumley and Hakala) e