Filters








1,473 Hits in 9.2 sec

Two Sides of the Same Coin: Counting and Enumerating Keys Post Side-Channel Attacks Revisited [chapter]

Daniel P. Martin, Luke Mather, Elisabeth Oswald
2018 Lecture Notes in Computer Science  
Motivated by the need to assess the concrete security of a device after a side channel attack, there has been a flurry of recent work designing both key rank and key enumeration algorithms.  ...  (FSE 2015), and a path counting based algorithm proposed by Martin et al. (Asiacrypt 2015). Both key ranking algorithms can be extended to key enumeration algorithms (Poussier et al.  ...  The final publication will be available at link.springer.com in the proceedings of CT-RSA 2018.  ... 
doi:10.1007/978-3-319-76953-0_21 fatcat:zupi4olkxbfepcfrw5ag7olsjq

Physical Security in the Post-quantum Era: A Survey on Side-channel Analysis, Random Number Generators, and Physically Unclonable Functions [article]

Sreeja Chowdhury, Ana Covic, Rabin Yu Acharya, Spencer Dupee, Fatemeh Ganji, Domenic Forte
2021 arXiv   pre-print
More specifically, the possibility of performing side-channel analysis in the quantum world is discussed and compared to attacks launched in the classic world.  ...  This survey aims to draw greater attention to the importance of physical security, with a focus on secure key generation and storage as well as secure execution.  ...  As discussed earlier, the side-channel attack consists of two steps. Firstly, data is obtained, which is processed into optimal sub-key candidates.  ... 
arXiv:2005.04344v2 fatcat:jstlhwebznfadf5g2zdri4sb6i

Prêt à Voter Providing Everlasting Privacy [chapter]

Denise Demirel, Maria Henning, Jeroen van de Graaf, Peter Y. A. Ryan, Johannes Buchmann
2013 Lecture Notes in Computer Science  
and in part by the German Federal Ministry of Education and Research (BMBF) via the project "BoRoVo -BoardRoomVoting".  ...  Ashish Choudhary for comments on multi-party computation, Markulf Kohlweiss for comments on the design of the CKLM12/13 protocols and Dr.  ...  Figure 4 shows two di↵erent attack scenarios in which the required independence between the voting channel and the SMS post-channel is violated.  ... 
doi:10.1007/978-3-642-39185-9_10 fatcat:5dkjajb5rjfstef4csslxlu4cm

From Information Theory Puzzles in Deletion Channels to Deniability in Quantum Cryptography [article]

Arash Atashpendar
2020 arXiv   pre-print
Next, we revisit the notion of deniability in quantum key exchange (QKE). We introduce and formalize the notion of coercer-deniable QKE.  ...  The difference between the Shannon entropy of this distribution and that of the uniform prior measures the amount of information about the channel input which is conveyed by the output of length m.  ...  Wilde and Ignatius William Primaatmaja for their comments. Further Applications of Covert Communication for Deniability  ... 
arXiv:2003.11663v1 fatcat:7ul4q6mupjcyzfyspus6xwh2ai

Security Analysis of PUF-based Key Generation and Entity Authentication

Jeroen Delvaux
2017 Zenodo  
Numerous newly revealed flaws and attacks are presented throughout this thesis. On the bright side, the lessons learned can help improve the quality of future PUF-based systems.  ...  No two physical objects are exactly the same, even when manufactured with a nominally identical process.  ...  However, neither the procedures SSGen and SSRep nor the transfer of helper data are an explicit part of the proposed protocol.  ... 
doi:10.5281/zenodo.2643392 fatcat:2pcr7p76qjbtnh36fuxsdk7enq

ARCUS: Symbolic Root Cause Analysis of Exploits in Production Systems

Carter Yagemann, Matthew Pruett, Simon P. Chung, Kennon Bittick, Brendan Saltaformaggio, Wenke Lee
2021 USENIX Security Symposium  
., CFI, system call IDS) flag processes in response to symptoms of a possible attack.  ...  of the process long after it executed the buggy instructions.  ...  Any opinions, findings, conclusions, or recommendations expressed in this material are those of the authors and do not necessarily reflect the views of ONR or DARPA.  ... 
dblp:conf/uss/YagemannPCBSL21 fatcat:cfwe7o4gdfetnmgxvakd4pw754

A Guideline on Pseudorandom Number Generation (PRNG) in the IoT [article]

Peter Kietzmann, Thomas C. Schmidt, Matthias Wählisch
2020 arXiv   pre-print
We analyse the potential attack surface, derive common requirements, and discuss the potentials and shortcomings of current IoT OSs.  ...  In this paper, we revisit the generation of randomness from the perspective of an IoT operating system (OS) that needs to support general purpose or crypto-secure random numbers.  ...  His particular research interest includes low-power radios, and IoT protocols, many of which he analyzed and transformed into code of RIOT.  ... 
arXiv:2007.11839v2 fatcat:dkiqyrddgfbfngxo2ysca3rb6a

The Role of Entanglement in Quantum Communication, and Analysis of the Detection Loophole [article]

Thomas Cope
2019 arXiv   pre-print
We also consider the secret key capacity of these channels, showing how different entanglement measures provide a better upper bound for different regions of these channels.  ...  This new class is characterised, and studied in detail for a particular resource state, leading to a family of simulable channels named "Pauli-Damping channels" whose properties are analysed.  ...  the channel, and the successful ones are post-selected.  ... 
arXiv:1904.11769v1 fatcat:ekozffyvdjfnbpiaribx5aijvm

Open Identity Summit 2021 - Complete Volume

2021 Open Identity Summit  
We propose tackling this information using identity management functions and perform a systematic gap analysis based on the FIDIS typology of identity management systems.  ...  While it has been noted in earlier work that data governance is central for the successful operation of a data lake, and that privacy is a central issue in such a setting as personal information may be  ...  A8 -Tamper with Resource Responses: The capabilities of A7, but this attacker can also tamper with responses from the resource servers (e.g., a compromised reverse proxy in front of the resource server  ... 
dblp:conf/openidentity/X21 fatcat:o54xtce6rneehgbbpsr3vasvvq

Wireless Sensor Network Security

An Liu, Mihui Kim, Leonardo B. Oliveira, Hailun Tan
2013 International Journal of Distributed Sensor Networks  
Acknowledgements We wish to thank Alexander Becher and Maximillian Dornseif for many helpful discussions and the delightful previous cooperation in breaking sensors [6] which formed the basis of Section  ...  The user thereof uses the information at its sole risk and liability. References  ...  A Note on Side-Channel Attacks Side-channel attacks (SCAs) are an important category of implementation attacks, which can threaten the security of cryptographic devices.  ... 
doi:10.1155/2013/362385 fatcat:2ph46uukonbtbdkc5q6t4mvgcq

PYCSP3: Modeling Combinatorial Constrained Problems in Python [article]

Christophe Lecoutre, Nicolas Szczepanski
2021 arXiv   pre-print
Currently, with PyCSP3, you can write models of constraint satisfaction and optimization problems.  ...  Importantly, there is a complete separation between the modeling and solving phases: you write a model, you compile it (while providing some data) in order to generate an XCSP3 instance (file), and you  ...  Two queens attack each other iff they belong to the same row, the same column or the same diagonal. An illustration is given by Figure 1 .4.  ... 
arXiv:2009.00326v3 fatcat:3rwe6smirvgezhlpcyw6nxhic4

Political uncertainty and household savings

Rolf Aaberge, Kai Liu, Yu Zhu
2017 Journal of comparative economics (Print)  
By focusing on time variation in uncertainty, our identification strategy avoids many of the potential problems in empirical studies of precautionary savings such as self-selection and life-cycle effects  ...  The uncertainty effect is more pronounced among older, wealthier, and more socially advantaged households. We interpret our findings using existing models of precautionary behavior.  ...  , could account for two-thirds of the increase in China's urban household saving rate in the same period.  ... 
doi:10.1016/j.jce.2015.12.011 fatcat:47lzhzkdqncxreej44idvtl7uy

BLITZKRIEG REVISITED: A NEW LOOK AT NAZI WAR AND EXTERMINATION PLANNING

TOBIAS JERSAK
2000 The Historical Journal  
He counts 13,974 heavy artillery on the Allies’ side (10,700 alone in France) and only 7,378 on the German side.  ...  The racial-ideological dimension is the flip side of the war planning coin, and it seems worthwhile to connect our understanding of Hitler’s geopolitical priorities — as modified by Frieser’s findings  ... 
doi:10.1017/s0018246x99001004 fatcat:bszqcjfyzzat5mpk2jnbafslyq

The Moral Economy of Cultural Identity

Martin Saxer
2012 Civilisations  
How to understand the fusion of the economic, the political, and the moral?  ...  in form and style from the classical cases of moral economies.  ...  Meanwhile, Chinese television aired over and over again the same footage showing a Tibetan mob attacking Han residents in Lhasa.  ... 
doi:10.4000/civilisations.3143 fatcat:5ctrmk4uibgpho36gkd6uhgd74

Political Uncertainty and Household Savings

Rolf Aaberge, Liu Kai, Yu Zhu
2014 Social Science Research Network  
By focusing on time variation in uncertainty, our identification strategy avoids many of the potential problems in empirical studies of precautionary savings such as self-selection and life-cycle effects  ...  The uncertainty effect is more pronounced among older, wealthier, and more socially advantaged households. We interpret our findings using existing models of precautionary behavior.  ...  , could account for two-thirds of the increase in China's urban household saving rate in the same period.  ... 
doi:10.2139/ssrn.2553807 fatcat:awwyvmzhpnasnahzwblzsts4dy
« Previous Showing results 1 — 15 out of 1,473 results