IACR Local SearchPossible queries include
Found 20000 results
Workshop on Cryptographic Hardware and Embedded Systems 2005 (CHES 2005) Edinburgh, Scotland Monday Evening August 29 th - Thursday September 1 st , 2005 [ CHES 05 ][ PROGRAM ][ CHES BANQUET ][ ACCEPTED PAPERS ][...
Much of the information on this web page was provided courtesy of Michael Ley and the DBLP Project CHES 2005: Edinburgh, UK Josyula R. Rao, Berk Sunar (Eds.): Cryptographic Hardware and Embedded Systems - CHES 2005, 7th...
University of Cambridge
Workshop on Cryptographic Hardware and Embedded Systems (CHES 2005) Edinburgh, Scotland Monday Evening August 29 th - Thursday September 1 st , 2005 The Roxburghe Hotel sponsored by IACR [ CHES 05 ][ PROGRAM ][ CHES BANQUET ][...
CHES 2010 CALL FOR PAPERS CHES STATISTICS FORMER CHES STEERING COMMITTEE SC RULES CHES '99 CHES 2000 CHES 2001 CHES 2002 CHES 2003 CHES 2004 CHES 2005 CHES 2006 CHES 2007 CHES 2008 CHES 2009 Workshop on Cryptographic Hardware...
In this paper, we report preliminary results obtained as a result of a systematic investigation of leakage of compromising information via EM emanations from chipcards and other devices. Our findings show that the EM...received 11 May 2001
Template attacks remain a powerful side-channel technique to eavesdrop on tamper-resistant hardware. They model the probability distribution of leaking signals and noise to guide a search for secret data values. In practice,...last revised 10 Nov 2015
CHES 2009: Kris Gaj and Christophe Clavier (Eds.): Cryptographic Hardware and Embedded Systems - CHES 2009, 11th International Workshop, Lausanne, Switzerland, September 6-9, 2009, Proceedings Proceedings. CHES 2009 Lausanne,...
Template attacks and stochastic models are among the most powerful side-channel attacks. However, they can be computationally expensive when processing a large number of samples. Various compression techniques have been used...last revised 18 Aug 2015
Side-Channel Attacks on BLISS Lattice-Based Signatures -- Exploiting Branch Tracing Against strongSwan and Electromagnetic Emanations in Microcontrollers
In this paper, we investigate the security of the BLISS lattice-based signature scheme, one of the most promising candidates for post-quantum-secure signatures, against side-channel attacks. Several works have been devoted to...last revised 13 Jul 2018
A Closer Look at Keyboard Acoustic Emanations: Random Passwords, Typing Styles and Decoding Techniques
We take a closer look at keyboard acoustic emanations specifically for the purpose of eavesdropping over random passwords. In this scenario, dictionary and HMM language models are not applicable; the attacker can only utilize...last revised 14 May 2012
CHES 2011: Tsuyoshi Takagi and Bart Preneel (Eds.): Cryptographic Hardware and Embedded Systems - CHES 2011 - 13th International Workshop - CHES 2011, Nara, Japan, September 28 - October 1, 2011 Proceedings. CHES 2011 Japan,...
Limits on the Locality of Pseudorandom Generators and Applications to Indistinguishability Obfuscation
Lin and Tessaro (ePrint 2017) recently proposed indistinguishability obfuscation (IO) and functional encryption (FE) candidates and proved their security based on two assumptions: a standard assumption on bilinear maps and a...last revised 7 Oct 2017
Template attacks remain a most powerful side-channel technique to eavesdrop on tamper-resistant hardware. They use a profiling step to compute the parameters of a multivariate normal distribution from a training device and an...last revised 1 Jul 2014
In the random oracle model, parties are given oracle access to a random function (i.e., a uniformly chosen function from the set of all functions), and are assumed to have unbounded computational power (though they can only...last revised 14 Jan 2013
Consider a pseudorandom generator $G$ with $m$ outputs, whose seed contains $n$ blocks of $b$ bits each. Further, assume that this PRG has block-locality $\ell$, i.e. each output bit depends on at most $\ell$ out of the $n$...last revised 23 May 2019
From Dolev-Yao to Strong Adaptive Corruption: Analyzing Security in the Presence of Compromising Adversaries
We formalize a hierarchy of adversary models for security protocol analysis, ranging from a Dolev-Yao style adversary to more powerful adversaries who can reveal different parts of principals' states during protocol execution....last revised 9 Nov 2009
EUROCRYPT 2011: Kenneth G. Paterson (Ed.): Advances in Cryptology - EUROCRYPT 2011 - 30th Annual International Conference on the Theory and Applications of Cryptographic Techniques - EUROCRYPT 2011, Tallinn, Estonia, May...
Recent breakthroughs in cryptography have positioned indistinguishability obfuscation as a ``central hub'' for almost all known cryptographic tasks, and as an extremely powerful building block for new cryptographic tasks...last revised 28 Jul 2015