A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Filters
Vulnerability Bounds and Leakage Resilience of Blinded Cryptography under Timing Attacks
2010
2010 23rd IEEE Computer Security Foundations Symposium
We establish formal bounds for the number of min-entropy bits that can be extracted in a timing attack against a cryptosystem that is protected by blinding, the state-of-the art countermeasure against ...
Compared with existing bounds, our bounds are both tighter and of greater operational significance, in that they directly address the key's one-guess vulnerability. ...
Geoffrey Smith was partially supported by the National Science Foundation under grant CNS-0831114. ...
doi:10.1109/csf.2010.11
dblp:conf/csfw/KopfS10
fatcat:d5bwqnj2mfbujpd2a4gl6asgwu
Physical Protection of Lattice-Based Cryptography
2018
Proceedings of the 2018 on Great Lakes Symposium on VLSI - GLSVLSI '18
We survey the state-of-the-art in terms of side channel attacks (SCA), both invasive and passive attacks, and proposed countermeasures. ...
Although the weaknesses exposed have led to countermeasures for these schemes, the cost, practicality and effectiveness of these on multiple implementation platforms, however, remains under-studied. ...
The first work discussing timing attacks on lattice-based cryptography is the one of Silverman and Whyte [40] . They mounted a timing attack an implementation of NTRUEncrypt. ...
doi:10.1145/3194554.3194616
dblp:conf/glvlsi/KhalidOVOGR18
fatcat:lfintj5vbbf5xllxwoxeer6hdu
Implementation of a leakage-resilient ElGamal key encapsulation mechanism
2016
Journal of Cryptographic Engineering
Leakage-resilient cryptography aims to extend the rigorous guarantees achieved through the provable security paradigm to physical implementations. ...
Our first contribution is a variant of the bounded leakage and the only-computation-leaks model that is closer to practice. ...
Even though they provide provable security against a large class of side-channel attacks, they do so under certain leakage models and leakage bound requirements that are far from what we can ensure in ...
doi:10.1007/s13389-016-0121-x
fatcat:vz3ape7ydvadvdrn2iuqkdkxly
The Meaning of Attack-Resistant Systems
[article]
2015
arXiv
pre-print
hard to exploit by certain attackers, usually relying on the strength of the randomness of a probabilistic transformation of the environment or the program and some knowledge on the attacker's goals and ...
Can we quantify and show that these defense mechanisms provide formal security guarantees, albeit partial, even in the presence of exploitable vulnerabilities?". ...
Acknowledgements We would like to thank the following people for their contributions and discussions: Michael Carbin, Martin Rinard, Mayank Varia, Michael Stone and Somesh Jha. ...
arXiv:1502.04023v3
fatcat:fqpbykjrore5tib655lozlpfaq
Another look at security definitions
2013
Advances in Mathematics of Communications
We pay particular attention to digital signatures, symmetric-key encryption, and leakage resilience. ...
Even when definitions have an appealing logical elegance and nicely reflect certain notions of security, they fail to take into account many types of attacks and do not provide a comprehensive model of ...
In addition, we thank Ann Hibner Koblitz for helpful editorial and stylistic suggestions, and Gustav Claus for providing a model of Bubba's dialect of English. ...
doi:10.3934/amc.2013.7.1
fatcat:ajlicvmsivh6rpbjn344sw72ki
Special Issue on Entropy-Based Applied Cryptography and Enhanced Security for Ubiquitous Computing
2016
Entropy
and modeling of cyber attacks with Petri Nets, and quantum flows for secret key distribution, etc. ...
Entropy is a basic and important concept in information theory. It is also often used as a measure of the unpredictability of a cryptographic key in cryptography research areas. ...
Conflicts of Interest: The authors declare no conflict of interest. ...
doi:10.3390/e18090334
fatcat:vxubyrnfrrhdzgedsufoews4gq
Achieving Leakage Resilience through Dual System Encryption
[chapter]
2011
Lecture Notes in Computer Science
We demonstrate this concretely by providing fully secure IBE, HIBE, and ABE systems which are resilient to bounded leakage from each of many secret keys per user, as well as many master keys. ...
This can be realized as resilience against continual leakage if we assume keys are periodically updated and no (or logarithmic) leakage is allowed during the update process. ...
Acknowledgments We are thankful to Joël Alwen and Yevgeniy Vahlis for useful observations. ...
doi:10.1007/978-3-642-19571-6_6
fatcat:sphqyprquvehjivaet5blzy5ra
Differential power analysis countermeasures for the configuration of SRAM FPGAs
2015
MILCOM 2015 - 2015 IEEE Military Communications Conference
proposed by Cryptography Research, Inc. ...
This work further presents data on the effectiveness of the underlying solution using a statistical characterization of side channel leakage using the Test Vector Leakage Assessment (TVLA) methodology ...
The target uses a leakage resistant mode of decryption and authentication proposed by Cryptography Research Inc. [15] .
IV. ...
doi:10.1109/milcom.2015.7357621
dblp:conf/milcom/LuisNA15
fatcat:njkkw4lutnd4dleososhpbluc4
Rational Protection against Timing Attacks
2015
2015 IEEE 28th Computer Security Foundations Symposium
At the heart of the equilibrium computation are novel bounds for the probability of key recovery, which are expressed as a function of the applied protection and the attack strategy of a timing adversary ...
One is hence faced with the problem of striking a balance between performance and security against timing attacks. ...
Acknowledgements: This work was partially funded by Spanish Project TIN2012-39391-C04-01 StrongSoft and Madrid Regional Project S2013/ICE-2731 N-GREENS. ...
doi:10.1109/csf.2015.39
dblp:conf/csfw/DoychevK15
fatcat:g2wnnmpqtzhwjnojyjoz6wngbu
A Survey of Microarchitectural Side-channel Vulnerabilities, Attacks and Defenses in Cryptography
[article]
2021
arXiv
pre-print
of side-channel vulnerabilities. ...
Side-channel attacks have become a severe threat to the confidentiality of computer applications and systems. ...
Abstract interpretation is a common approach to analyze the source code and measure the information leakage (bounds). ...
arXiv:2103.14244v1
fatcat:u35eyivqbngplfa4qrswfsqqti
From A to Z: Projective coordinates leakage in the wild
2020
Transactions on Cryptographic Hardware and Embedded Systems
However, this attack has received little attention by the scientific community, and the status of deployed mitigations to prevent it in widely adopted cryptography libraries is unknown. ...
To demonstrate the applicability of the attack, we use a side-channel attack to exploit this vulnerability within libgcrypt in the context of ECDSA. ...
This project has received funding from the European Research Council (ERC) under the European Union's Horizon 2020 research and innovation programme (grant agreement No 804476). ...
doi:10.13154/tches.v2020.i3.428-453
dblp:journals/tches/AldayaGB20
fatcat:ooimjadaarbfngl454r2qzva2y
A Leakage Resilient MAC
[chapter]
2015
Lecture Notes in Computer Science
the nonleakage security) and it also means that, if the security of the non-leakage version is improved, the security in the face of leakage is improved 'for free'. ...
Within the context of continuous leakage, we introduce a novel modular proof technique: while most previous schemes are proven secure directly in the face of leakage, we reduce the (leakage) security of ...
However the leakage bound is a total bound, i.e. it holds regardless of the number of times the tag and verify algorithms are called. ...
doi:10.1007/978-3-319-27239-9_18
fatcat:ossr3onblzgplpfun7nlvnugiq
Enabling Encrypted Cloud Media Center with Secure Deduplication
2015
Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security - ASIA CCS '15
networks and different devices to ensure the quality of service. ...
It builds on top of latest advancements on secure deduplication and video coding techniques, with fully functional system implementations on encrypted video deduplication and adaptive video dissemination ...
Under this setting, CE is not appropriate for use in our system since its data encryption key is not leakage resilient. ...
doi:10.1145/2714576.2714628
dblp:conf/ccs/ZhengYWJWG15
fatcat:zt6ouqpjyfh3tejopwpkduyxre
A Survey on Security Mechanisms for NoC-based Many-Core SoCs
2021
Journal of Integrated Circuits and Systems
The literature contains several proposals to protect many-cores against attacks, focusing on the protection of the application execution or the access to shared memories. ...
This survey concludes with an evaluation of the studied methods, pointing out directions and research opportunities. ...
ACKNOWLEDGEMENTS This work was financed in part by CNPq (Conselho Nacional de Desenvolvimento Científico e Tecnológico) -grant 309605/2020-2; and CAPES (Coordenação de Aperfeiçoamento de Pessoal de Nível ...
doi:10.29292/jics.v16i2.485
fatcat:vc7hgae5arhxvmko2obif4lwl4
Critical perspectives on provable security: Fifteen years of "another look" papers
2019
Advances in Mathematics of Communications
We give an overview of our critiques of "proofs" of security and a guide to our papers on the subject that have appeared over the past decade and a half. ...
We also provide numerous additional examples and a few updates and errata. 2010 Mathematics Subject Classification: Primary: 94A60. ...
for editorial corrections and comments. ...
doi:10.3934/amc.2019034
fatcat:gpftyd4hxjebfpzdqwdes345na
« Previous
Showing results 1 — 15 out of 228 results