A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2020; you can also visit the original URL.
The file type is application/pdf
.
Filters
Correlated Extra Reductions Defeat Fixed Window Exponentiation
2019
Journal of Computer and Communications
In 2016, Dugardin took advantage of extra reductions to attack a regular exponentiation algorithm, which did not entirely adapt the fixed window method with Montgomery's algorithm. ...
The central thesis of this paper is that there exists a positive correlation between extra reductions of pre-computation and post-computation when the calculation has the same multiplier factor. ...
[12] pointed out binary exponentiation algorithms is vulnerable to side-channel attack even with message blinding and regular exponentiation. ...
doi:10.4236/jcc.2019.710016
fatcat:xjmp34eurvajxmxep7gpypblca
Stochastic methods defeat regular RSA exponentiation algorithms with combined blinding methods
2021
Journal of Mathematical Cryptology
In this article, we derive stochastic attacks to defeat Rivest-Shamir-Adleman (RSA) with Montgomery ladder regular exponentiation coupled with base blinding. ...
In addition to this result, we also apply our method to the case of regular exponentiation, base blinding, and modulus blinding. ...
Assertion (ii) follows immediately from (i) and Lemma 3.4(ii), applied to the particular right-hand probabilities in (4.7). □ Stochastic methods defeat regular RSA exponentiation algorithms 419 The last ...
doi:10.1515/jmc-2020-0010
fatcat:qntd46362fgcngxprtb2rfyyve
Horizontal Correlation Analysis on Exponentiation
[chapter]
2010
Lecture Notes in Computer Science
Our technique, which uses a single exponentiation curve, cannot be prevented by exponent blinding. ...
We introduce in this paper a technique in which we apply correlation analysis using only one execution power curve during an exponentiation to recover the whole secret exponent manipulated by the chip. ...
Horizontal Correlation Analysis We present hereafter our attack on an atomically protected RSA exponentiation using Barrett reduction. ...
doi:10.1007/978-3-642-17650-0_5
fatcat:imvjhbr6hbgk7htjbrkvrnu4ca
Vertical and horizontal correlation attacks on RNS-based exponentiations
2015
Journal of Cryptographic Engineering
countermeasures like the exponent and message blinding. ...
On exponentiations, the so-called horizontal correlation attacks originally proposed by Walter in 2001 and improved by Clavier et al in 2010 demonstrated to be efficient even in the presence of strong ...
An alternative solution to defeat horizontal correlation analysis is to randomize the RNS bases during the exponentiation, as proposed in [12] . ...
doi:10.1007/s13389-015-0095-0
fatcat:gaixhnguevbb3o3vhfsexcbe7a
Horizontal and Vertical Side-Channel Attacks against Secure RSA Implementations
[chapter]
2013
Lecture Notes in Computer Science
To defeat Horizontal attacks, the authors of the ICICS paper have proposed a set of new countermeasures. ...
A wide variety of countermeasures have been proposed and most of practical attacks are nowadays efficiently defeated by them. ...
To defeat simple SCA against RSA implementations, a classical countermeasure is to insert dummy multiplications in order to have a regular algorithm. ...
doi:10.1007/978-3-642-36095-4_1
fatcat:hehtkxynp5bldbs5kzwmxfjk4a
A Survey of Timing Channels and Countermeasures
2017
ACM Computing Surveys
Blind flow watermarking Unlike passive or non-blind flow analysis techniques, blind flow watermarking detector does not require the original incoming flow to correlate with an outgoing flow. ...
There are some non-blind or passive flow analysis techniques available to correlate traffic flows. ...
doi:10.1145/3023872
fatcat:bj7jt5qwtbet3lzp5yghle4c3m
The Biointelligence Explosion
[chapter]
2012
The Frontiers Collection
2002) gathers pace, prospective parents will pre-select alleles and allelic combinations for a new child in anticipation of their behavioural effects -a novel kind of selection pressure to replace the "blind ...
Brute-force algorithms suffer from an exponentially growing search space that soon defeats any classical computational device in open-field contexts. ...
For sure, many forms of human action can be predicted, fallibly, on the basis of crude behavioural regularities and reinforcement learning. ...
doi:10.1007/978-3-642-32560-1_11
fatcat:7bpjlkuwcbghlbn6djidac4mda
Medical Research: Guarding Against Premature Birth
1996
Science
The epidemic of baby-blinding retinopathy of prematurity continues because of several blatantly rigged clinical trials. ...
Their so contaminated doctrine prevents them from acknowledging the real cause of the blinding which is the lighting that they have specified for the intensive-care nursery. ...
In the U.S. alone, an estimated 16,000 extra babies per year died from the oxygen restrictions (see Fig. 1 ). ...
doi:10.1126/science.271.5246.139b
pmid:8539610
fatcat:6jynl3ldt5ezhkciz5xlvwwdfi
Bogus Research, Even-More-Bogus Researcher
2014
Chemical & engineering news (Print)
The epidemic of baby-blinding retinopathy of prematurity continues because of several blatantly rigged clinical trials. ...
Their so contaminated doctrine prevents them from acknowledging the real cause of the blinding which is the lighting that they have specified for the intensive-care nursery. ...
In the U.S. alone, an estimated 16,000 extra babies per year died from the oxygen restrictions (see Fig. 1 ). ...
doi:10.1021/cen-09250-newscripts
fatcat:w2bv6yg6jfhtjjey37w4dba3ye
Last-Level Cache Side-Channel Attacks are Practical
2015
2015 IEEE Symposium on Security and Privacy
While processing a "1" bit, the squaring is followed by a modulo reduction, which is followed by a multiply and another reduction. ...
While fixing GnuPG would defeat our specific attacks, this will not prevent information leaks from other software. ...
doi:10.1109/sp.2015.43
dblp:conf/sp/LiuYGHL15
fatcat:v4wsd47m45gevjt5ddlnkrf2lu
The challenge of poker
2002
Artificial Intelligence
We have never observed the big blind check-raising in the past, so the danger of being trapped for an extra bet is not too high. ...
However, the added equity from having an extra bet in the pot is normally greater than the risk of shared outs, so we are happy to let the blinds draw with us against the bettor. ...
doi:10.1016/s0004-3702(01)00130-8
fatcat:5cxf5itov5awppfw6iveh3kp44
Hardware Designer's Guide to Fault Attacks
2013
IEEE Transactions on Very Large Scale Integration (vlsi) Systems
This creates an extra design concern for a hardware designer. ...
Blinding an exponent or a message can be applied to achieve side-channel and fault attack-resistant exponentiation algorithms, using a single countermeasure [58] , [59] . ...
Blinding. An alternative to specific countermeasures that can help to complicate possible attacks is called blinding. ...
doi:10.1109/tvlsi.2012.2231707
fatcat:4mhbkwfw3jgttptpc6ck5czwba
Targeting cultural changes supportive of the healthiest lifestyle patterns. A biosocial evidence-base for prevention of obesity
2011
Appetite
Behavioural correlates of successful weight reduction at 3 y. Results from the Lean Habits Study. International Journal of Obesity 28, 334-335. Wittgenstein, L. (1953) . ...
Energy intake away from regular meals is a major example of the advantages of the scientific method of enABLE over dietary assessment procedures. ...
doi:10.1016/j.appet.2010.12.003
pmid:21145364
fatcat:fc4d6hsn6jcx5kjha56lspubj4
Poster Session I
2015
Neuropsychopharmacology
However, changes in superior parietal network negatively correlated with visuospatial memory improvements in medial parietal cortex. ...
Increased connectivity in the language processing network also positively correlated with verbal memory performance in the left inferior frontal gyrus. ...
In high BDNF patients, LPH was significantly correlated with IED completed stage trials (r ¼ 0.755, p ¼ 0.001) and pre-extra-dimensional shift errors (r ¼ 0.588, p ¼ 0.017). ...
doi:10.1038/npp.2015.325
pmid:26632286
pmcid:PMC4672310
fatcat:cqqyl6zydfeuxltv6zkqhn7qry
Regret Minimization in Non-Zero-Sum Games with Applications to Building Champion Multiplayer Computer Poker Agents
[article]
2013
arXiv
pre-print
Our new agent wins the three-player events of the 2012 ACPC and defeats the winning three-player programs from previous competitions while requiring less resources to generate than the 2011 winner. ...
However, normal form is often impractical for even moderately-sized problems because the size of the action set in G is exponential in |I i | · |A(I i )|. ...
This can lead to more aggressive play when applied to the regular, non-tilted game and were used by the poker program Polaris that won the 2008 Man-vs-Machine competition [3] . ...
arXiv:1305.0034v1
fatcat:qhoyrdxlvrhdvhnvdkl4yb4w2e
« Previous
Showing results 1 — 15 out of 1,522 results