搜索结果: 1-15 共查到“Attacking”相关记录30条 . 查询时间(0.046 秒)
A Comparison of Single-Bit and Multi-Bit DPA for Attacking AES128 on an ATmega328P
AES DPA multi-bit DPA
2019/8/8
Side channel attacks have demonstrated in the past that it is possible to break cryptographic algorithms by attacking the implementation rather than the algorithm. This paper compares an adaptation of...
The Rush Dilemma: Attacking and Repairing Smart Contracts on Forking Blockchains
blockchain forks smart contracts secure computation
2019/8/6
We investigate the security of smart contracts within a blockchain that can fork (as Bitcoin and Ethereum). In particular, we focus on multi-party computation (MPC) protocols run on-chain with the aid...
Structural Nonlinear Invariant Attacks on T-310: Attacking Arbitrary Boolean Functions
block ciphers Boolean functions non-linearity
2019/1/2
Recent papers show how to construct polynomial invariant attacks for block ciphers, however almost all such results are somewhat weak: invariants are simple and low degree and the Boolean functions te...
This paper studies the security of Ring Oscillator Physically Unclonable Function (PUF) with Enhanced Challenge-Response Pairs as proposed by Delavar et al. We present an attack that can predict all P...
Simulations of Optical Emissions for Attacking AES and Masked AES
Photonic side channel Side channel analysis Light emission
2018/3/29
In this paper we present a novel attack based on photonic emission analysis targeting software implementations of AES. We focus on the particular case in which the attacker can collect the photonic em...
Attacking Deterministic Signature Schemes using Fault Attacks
Deterministic signatures EdDSA fault attack
2017/10/19
Many digital signature schemes rely on random numbers that are unique and non-predictable per signature. Failures of random number generators may have catastrophic effects such as compromising private...
On the Power of Optical Contactless Probing: Attacking Bitstream Encryption of FPGAs
ICs FPGA
2017/9/1
Modern Integrated Circuits (ICs) employ several classes of countermeasures to mitigate physical attacks. Recently, a powerful semi-invasive attack relying on optical contactless probing has been intro...
To BLISS-B or not to be - Attacking strongSwan's Implementation of Post-Quantum Signatures
lattice-based cryptography side-channel analysis signatures
2017/6/1
In the search for post-quantum secure alternatives to RSA and ECC, lattice-based cryptography appears to be an attractive and efficient option. A particularly interesting lattice-based signature schem...
Grover Meets Simon - Quantumly Attacking the FX-construction
symmetric cryptography quantum attacks Grover's algorithm
2017/5/23
Using whitening keys is a well understood mean of increasing the key-length of any given cipher. Especially as it is known ever since Grover's seminal work that the effective key-length is reduced by ...
Attacking FHE-based applications by software fault injections
FHE safe errors reaction attacks
2016/12/29
The security of fully homomorphic encryption is often studied at the primitive level, and a lot of questions remain open when the cryptographer needs to choose between incompatible options, like IND- ...
Attacking embedded ECC implementations through cmov side channels
ECC Montgomery ladder power analysis
2016/12/8
Side-channel attacks against implementations of elliptic-curve cryptography have been extensively studied in the literature and a large tool-set of countermeasures is available to thwart different att...
Energy balance represents a battle between energy intake and
energy expenditure. When intake is greater than expenditure,
most of the excess energy is stored as triacylglycerols in adipose
tissue. ...
A New Birthday-Type Algorithm for Attacking the Fresh Re-Keying Countermeasure
LPN Ring-LPN fresh re-keying
2016/3/2
The fresh re-keying scheme is a countermeasure designed to protect low-cost devices against side-channel attacks. In this paper, we present a new birthday-type attack based on a refined reduction to R...
By switching 'bait,'IU biologists trick plants' bacterial defense into attacking virus
bait IU biologists plants bacterial defense attacking virus
2016/2/23
Scientists at Indiana University have modified a plant gene that normally fights bacterial infection to confer resistance to a virus.The method, described in a paper to be published Feb. 12 in the jou...
We identify two attacks on the Network Time Protocol (NTP)’s
cryptographically-authenticated broadcast mode. First, we
present a replay attack that allows an on-path attacker to
indefinitely stick ...