Filters








1,522 Hits in 2.8 sec

Correlated Extra Reductions Defeat Fixed Window Exponentiation

Xiaohan Meng
2019 Journal of Computer and Communications  
In 2016, Dugardin took advantage of extra reductions to attack a regular exponentiation algorithm, which did not entirely adapt the fixed window method with Montgomery's algorithm.  ...  The central thesis of this paper is that there exists a positive correlation between extra reductions of pre-computation and post-computation when the calculation has the same multiplier factor.  ...  [12] pointed out binary exponentiation algorithms is vulnerable to side-channel attack even with message blinding and regular exponentiation.  ... 
doi:10.4236/jcc.2019.710016 fatcat:xjmp34eurvajxmxep7gpypblca

Stochastic methods defeat regular RSA exponentiation algorithms with combined blinding methods

Margaux Dugardin, Werner Schindler, Sylvain Guilley
2021 Journal of Mathematical Cryptology  
In this article, we derive stochastic attacks to defeat Rivest-Shamir-Adleman (RSA) with Montgomery ladder regular exponentiation coupled with base blinding.  ...  In addition to this result, we also apply our method to the case of regular exponentiation, base blinding, and modulus blinding.  ...  Assertion (ii) follows immediately from (i) and Lemma 3.4(ii), applied to the particular right-hand probabilities in (4.7). □ Stochastic methods defeat regular RSA exponentiation algorithms  419 The last  ... 
doi:10.1515/jmc-2020-0010 fatcat:qntd46362fgcngxprtb2rfyyve

Horizontal Correlation Analysis on Exponentiation [chapter]

Christophe Clavier, Benoit Feix, Georges Gagnerot, Mylène Roussellet, Vincent Verneuil
2010 Lecture Notes in Computer Science  
Our technique, which uses a single exponentiation curve, cannot be prevented by exponent blinding.  ...  We introduce in this paper a technique in which we apply correlation analysis using only one execution power curve during an exponentiation to recover the whole secret exponent manipulated by the chip.  ...  Horizontal Correlation Analysis We present hereafter our attack on an atomically protected RSA exponentiation using Barrett reduction.  ... 
doi:10.1007/978-3-642-17650-0_5 fatcat:imvjhbr6hbgk7htjbrkvrnu4ca

Vertical and horizontal correlation attacks on RNS-based exponentiations

Guilherme Perin, Laurent Imbert, Philippe Maurine, Lionel Torres
2015 Journal of Cryptographic Engineering  
countermeasures like the exponent and message blinding.  ...  On exponentiations, the so-called horizontal correlation attacks originally proposed by Walter in 2001 and improved by Clavier et al in 2010 demonstrated to be efficient even in the presence of strong  ...  An alternative solution to defeat horizontal correlation analysis is to randomize the RNS bases during the exponentiation, as proposed in [12] .  ... 
doi:10.1007/s13389-015-0095-0 fatcat:gaixhnguevbb3o3vhfsexcbe7a

Horizontal and Vertical Side-Channel Attacks against Secure RSA Implementations [chapter]

Aurélie Bauer, Eliane Jaulmes, Emmanuel Prouff, Justine Wild
2013 Lecture Notes in Computer Science  
To defeat Horizontal attacks, the authors of the ICICS paper have proposed a set of new countermeasures.  ...  A wide variety of countermeasures have been proposed and most of practical attacks are nowadays efficiently defeated by them.  ...  To defeat simple SCA against RSA implementations, a classical countermeasure is to insert dummy multiplications in order to have a regular algorithm.  ... 
doi:10.1007/978-3-642-36095-4_1 fatcat:hehtkxynp5bldbs5kzwmxfjk4a

A Survey of Timing Channels and Countermeasures

Arnab Kumar Biswas, Dipak Ghosal, Shishir Nagaraja
2017 ACM Computing Surveys  
Blind flow watermarking Unlike passive or non-blind flow analysis techniques, blind flow watermarking detector does not require the original incoming flow to correlate with an outgoing flow.  ...  There are some non-blind or passive flow analysis techniques available to correlate traffic flows.  ... 
doi:10.1145/3023872 fatcat:bj7jt5qwtbet3lzp5yghle4c3m

The Biointelligence Explosion [chapter]

David Pearce
2012 The Frontiers Collection  
2002) gathers pace, prospective parents will pre-select alleles and allelic combinations for a new child in anticipation of their behavioural effects -a novel kind of selection pressure to replace the "blind  ...  Brute-force algorithms suffer from an exponentially growing search space that soon defeats any classical computational device in open-field contexts.  ...  For sure, many forms of human action can be predicted, fallibly, on the basis of crude behavioural regularities and reinforcement learning.  ... 
doi:10.1007/978-3-642-32560-1_11 fatcat:7bpjlkuwcbghlbn6djidac4mda

Medical Research: Guarding Against Premature Birth

W. Roush
1996 Science  
The epidemic of baby-blinding retinopathy of prematurity continues because of several blatantly rigged clinical trials.  ...  Their so contaminated doctrine prevents them from acknowledging the real cause of the blinding which is the lighting that they have specified for the intensive-care nursery.  ...  In the U.S. alone, an estimated 16,000 extra babies per year died from the oxygen restrictions (see Fig. 1 ).  ... 
doi:10.1126/science.271.5246.139b pmid:8539610 fatcat:6jynl3ldt5ezhkciz5xlvwwdfi

Bogus Research, Even-More-Bogus Researcher

2014 Chemical & engineering news (Print)  
The epidemic of baby-blinding retinopathy of prematurity continues because of several blatantly rigged clinical trials.  ...  Their so contaminated doctrine prevents them from acknowledging the real cause of the blinding which is the lighting that they have specified for the intensive-care nursery.  ...  In the U.S. alone, an estimated 16,000 extra babies per year died from the oxygen restrictions (see Fig. 1 ).  ... 
doi:10.1021/cen-09250-newscripts fatcat:w2bv6yg6jfhtjjey37w4dba3ye

Last-Level Cache Side-Channel Attacks are Practical

Fangfei Liu, Yuval Yarom, Qian Ge, Gernot Heiser, Ruby B. Lee
2015 2015 IEEE Symposium on Security and Privacy  
While processing a "1" bit, the squaring is followed by a modulo reduction, which is followed by a multiply and another reduction.  ...  While fixing GnuPG would defeat our specific attacks, this will not prevent information leaks from other software.  ... 
doi:10.1109/sp.2015.43 dblp:conf/sp/LiuYGHL15 fatcat:v4wsd47m45gevjt5ddlnkrf2lu

The challenge of poker

Darse Billings, Aaron Davidson, Jonathan Schaeffer, Duane Szafron
2002 Artificial Intelligence  
We have never observed the big blind check-raising in the past, so the danger of being trapped for an extra bet is not too high.  ...  However, the added equity from having an extra bet in the pot is normally greater than the risk of shared outs, so we are happy to let the blinds draw with us against the bettor.  ... 
doi:10.1016/s0004-3702(01)00130-8 fatcat:5cxf5itov5awppfw6iveh3kp44

Hardware Designer's Guide to Fault Attacks

Dusko Karaklajic, Jorn-Marc Schmidt, Ingrid Verbauwhede
2013 IEEE Transactions on Very Large Scale Integration (vlsi) Systems  
This creates an extra design concern for a hardware designer.  ...  Blinding an exponent or a message can be applied to achieve side-channel and fault attack-resistant exponentiation algorithms, using a single countermeasure [58] , [59] .  ...  Blinding. An alternative to specific countermeasures that can help to complicate possible attacks is called blinding.  ... 
doi:10.1109/tvlsi.2012.2231707 fatcat:4mhbkwfw3jgttptpc6ck5czwba

Targeting cultural changes supportive of the healthiest lifestyle patterns. A biosocial evidence-base for prevention of obesity

David A. Booth, Phil Booth
2011 Appetite  
Behavioural correlates of successful weight reduction at 3 y. Results from the Lean Habits Study. International Journal of Obesity 28, 334-335. Wittgenstein, L. (1953) .  ...  Energy intake away from regular meals is a major example of the advantages of the scientific method of enABLE over dietary assessment procedures.  ... 
doi:10.1016/j.appet.2010.12.003 pmid:21145364 fatcat:fc4d6hsn6jcx5kjha56lspubj4

Poster Session I

2015 Neuropsychopharmacology  
However, changes in superior parietal network negatively correlated with visuospatial memory improvements in medial parietal cortex.  ...  Increased connectivity in the language processing network also positively correlated with verbal memory performance in the left inferior frontal gyrus.  ...  In high BDNF patients, LPH was significantly correlated with IED completed stage trials (r ¼ 0.755, p ¼ 0.001) and pre-extra-dimensional shift errors (r ¼ 0.588, p ¼ 0.017).  ... 
doi:10.1038/npp.2015.325 pmid:26632286 pmcid:PMC4672310 fatcat:cqqyl6zydfeuxltv6zkqhn7qry

Regret Minimization in Non-Zero-Sum Games with Applications to Building Champion Multiplayer Computer Poker Agents [article]

Richard Gibson
2013 arXiv   pre-print
Our new agent wins the three-player events of the 2012 ACPC and defeats the winning three-player programs from previous competitions while requiring less resources to generate than the 2011 winner.  ...  However, normal form is often impractical for even moderately-sized problems because the size of the action set in G is exponential in |I i | · |A(I i )|.  ...  This can lead to more aggressive play when applied to the regular, non-tilted game and were used by the poker program Polaris that won the 2008 Man-vs-Machine competition [3] .  ... 
arXiv:1305.0034v1 fatcat:qhoyrdxlvrhdvhnvdkl4yb4w2e
« Previous Showing results 1 — 15 out of 1,522 results