International Association for Cryptologic Research

International Association
for Cryptologic Research

IACR Local Search

Possible queries include homomorphic author:david.
Found 20000 results
Security Limits for Compromising Emanations
Iacrpub
https://iacr.org/cryptodb/data/paper.php?pubkey=693
Markus G. Kuhn
Ches 2005
Workshop on Cryptographic Hardware and Embedded Systems 2005 (CHES 2005)
https://iacr.org/workshops/ches.dir/ches2005/accepted.html
Workshop on Cryptographic Hardware and Embedded Systems 2005 (CHES 2005) Edinburgh, Scotland Monday Evening August 29 th - Thursday September 1 st , 2005 [ CHES 05 ][ PROGRAM ][ CHES BANQUET ][ ACCEPTED PAPERS ][...
Cryptographic Hardware and Embedded Systems - CHES 2005
https://iacr.org/archive/ches2005/ches2005.html
Much of the information on this web page was provided courtesy of Michael Ley and the DBLP Project CHES 2005: Edinburgh, UK Josyula R. Rao, Berk Sunar (Eds.): Cryptographic Hardware and Embedded Systems - CHES 2005, 7th...
Markus G. Kuhn
Author
https://iacr.org/cryptodb/data/author.php?authorkey=877
University of Cambridge
CHES 2005: Workshop on Cryptographic Hardware and Embedded Systems 2005
https://iacr.org/workshops/ches.dir/ches2005/program2005.html
Workshop on Cryptographic Hardware and Embedded Systems (CHES 2005) Edinburgh, Scotland Monday Evening August 29 th - Thursday September 1 st , 2005 The Roxburghe Hotel sponsored by IACR [ CHES 05 ][ PROGRAM ][ CHES BANQUET ][...
Workshop on Cryptographic Hardware and Embedded Systems 2005 (CHES 2005)
https://iacr.org/workshops/ches/ches2005/program2005.html
CHES 2010 CALL FOR PAPERS CHES STATISTICS FORMER CHES STEERING COMMITTEE SC RULES CHES '99 CHES 2000 CHES 2001 CHES 2002 CHES 2003 CHES 2004 CHES 2005 CHES 2006 CHES 2007 CHES 2008 CHES 2009 Workshop on Cryptographic Hardware...
EMpowering Side-Channel Attacks
Eprint
https://eprint.iacr.org/2001/037
Josyula R. Rao Pankaj Rohatgi
In this paper, we report preliminary results obtained as a result of a systematic investigation of leakage of compromising information via EM emanations from chipcards and other devices. Our findings show that the EM...
received 11 May 2001
Efficient Template Attacks
Eprint
https://eprint.iacr.org/2013/770
Omar Choudary Markus G. Kuhn
Template attacks remain a powerful side-channel technique to eavesdrop on tamper-resistant hardware. They model the probability distribution of leaking signals and noise to guide a search for secret data values. In practice,...
last revised 10 Nov 2015
IACR CHES 2009
https://iacr.org/archive/ches2009/ches2009.html
CHES 2009: Kris Gaj and Christophe Clavier (Eds.): Cryptographic Hardware and Embedded Systems - CHES 2009, 11th International Workshop, Lausanne, Switzerland, September 6-9, 2009, Proceedings Proceedings. CHES 2009 Lausanne,...
Efficient Stochastic Methods: Profiled Attacks Beyond 8 Bits
Eprint
https://eprint.iacr.org/2014/885
Marios O. Choudary Markus G. Kuhn
Template attacks and stochastic models are among the most powerful side-channel attacks. However, they can be computationally expensive when processing a large number of samples. Various compression techniques have been used...
last revised 18 Aug 2015
Side-Channel Attacks on BLISS Lattice-Based Signatures -- Exploiting Branch Tracing Against strongSwan and Electromagnetic Emanations in Microcontrollers
Eprint
https://eprint.iacr.org/2017/505
Thomas Espitau Pierre-Alain Fouque Benoit Gerard Mehdi Tibouchi
In this paper, we investigate the security of the BLISS lattice-based signature scheme, one of the most promising candidates for post-quantum-secure signatures, against side-channel attacks. Several works have been devoted to...
last revised 13 Jul 2018
A Closer Look at Keyboard Acoustic Emanations: Random Passwords, Typing Styles and Decoding Techniques
Eprint
https://eprint.iacr.org/2010/605
Tzipora Halevi Nitesh Saxena
We take a closer look at keyboard acoustic emanations specifically for the purpose of eavesdropping over random passwords. In this scenario, dictionary and HMM language models are not applicable; the attacker can only utilize...
last revised 14 May 2012
IACR CHES 2011
https://iacr.org/archive/ches2011/ches2011-index.html
CHES 2011: Tsuyoshi Takagi and Bart Preneel (Eds.): Cryptographic Hardware and Embedded Systems - CHES 2011 - 13th International Workshop - CHES 2011, Nara, Japan, September 28 - October 1, 2011 Proceedings. CHES 2011 Japan,...
Limits on the Locality of Pseudorandom Generators and Applications to Indistinguishability Obfuscation
Eprint
https://eprint.iacr.org/2017/301
Alex Lombardi Vinod Vaikuntanathan
Lin and Tessaro (ePrint 2017) recently proposed indistinguishability obfuscation (IO) and functional encryption (FE) candidates and proved their security based on two assumptions: a standard assumption on bilinear maps and a...
last revised 7 Oct 2017
Template Attacks on Different Devices
Eprint
https://eprint.iacr.org/2014/459
Omar Choudary Markus G. Kuhn
Template attacks remain a most powerful side-channel technique to eavesdrop on tamper-resistant hardware. They use a profiling step to compute the parameters of a multivariate normal distribution from a training device and an...
last revised 1 Jul 2014
Limits on the Usefulness of Random Oracles
Eprint
https://eprint.iacr.org/2012/573
Iftach Haitner Eran Omri Hila Zarosim
In the random oracle model, parties are given oracle access to a random function (i.e., a uniformly chosen function from the set of all functions), and are assumed to have unbounded computational power (though they can only...
last revised 14 Jan 2013
Limits on Low-Degree Pseudorandom Generators (Or: Sum-of-Squares Meets Program Obfuscation)
Eprint
https://eprint.iacr.org/2017/312
Boaz Barak Zvika Brakerski Ilan Komargodski Pravesh K. Kothari
Consider a pseudorandom generator $G$ with $m$ outputs, whose seed contains $n$ blocks of $b$ bits each. Further, assume that this PRG has block-locality $\ell$, i.e. each output bit depends on at most $\ell$ out of the $n$...
last revised 23 May 2019
From Dolev-Yao to Strong Adaptive Corruption: Analyzing Security in the Presence of Compromising Adversaries
Eprint
https://eprint.iacr.org/2009/079
David Basin Cas Cremers
We formalize a hierarchy of adversary models for security protocol analysis, ranging from a Dolev-Yao style adversary to more powerful adversaries who can reveal different parts of principals' states during protocol execution....
last revised 9 Nov 2009
IACR EUROCRYPT 2011
https://iacr.org/archive/eurocrypt2011/eurocrypt2011-index.html
EUROCRYPT 2011: Kenneth G. Paterson (Ed.): Advances in Cryptology - EUROCRYPT 2011 - 30th Annual International Conference on the Theory and Applications of Cryptographic Techniques - EUROCRYPT 2011, Tallinn, Estonia, May...
Limits on the Power of Indistinguishability Obfuscation and Functional Encryption
Eprint
https://eprint.iacr.org/2015/341
Gilad Asharov Gil Segev
Recent breakthroughs in cryptography have positioned indistinguishability obfuscation as a ``central hub'' for almost all known cryptographic tasks, and as an extremely powerful building block for new cryptographic tasks...
last revised 28 Jul 2015
Next ►