International Association for Cryptologic Research

International Association
for Cryptologic Research

IACR Local Search

Possible queries include homomorphic author:david.
Found 20000 results
Single-Trace Side-Channel Attacks on Masked Lattice-Based Encryption
Iacrpub
https://iacr.org/cryptodb/data/paper.php?pubkey=28933
Robert Primas Peter Pessl Stefan Mangard
Ches 2017
Although lattice-based cryptography has proven to be a particularly efficient approach to post-quantum cryptography, its security against side-channel attacks is still a very open topic. There already exist some first works...
Single-Trace Side-Channel Attacks on Masked Lattice-Based Encryption
Eprint
https://eprint.iacr.org/2017/594
Robert Primas Peter Pessl Stefan Mangard
Although lattice-based cryptography has proven to be a particularly efficient approach to post-quantum cryptography, its security against side-channel attacks is still a very open topic. There already exist some first works...
last revised 23 Aug 2017
More Practical Single-Trace Attacks on the Number Theoretic Transform
Eprint
https://eprint.iacr.org/2019/795
Peter Pessl Robert Primas
Single-trace side-channel attacks are a considerable threat to implementations of classic public-key schemes. For lattice-based cryptography, however, this class of attacks is much less understood, and only a small number of...
received 8 Jul 2019
Statistical Ineffective Fault Attacks on Masked AES with Fault Countermeasures
Iacrpub
https://iacr.org/cryptodb/data/paper.php?pubkey=29167
Christoph Dobraunig Maria Eichlseder Hannes Gross Stefan Mangard Florian Mendel Robert Primas
Asiacrypt 2018
Implementation attacks like side-channel and fault attacks are a threat to deployed devices especially if an attacker has physical access. As a consequence, devices like smart cards and IoT devices usually provide...
Statistical Ineffective Fault Attacks on Masked AES with Fault Countermeasures
Eprint
https://eprint.iacr.org/2018/357
Christoph Dobraunig Maria Eichlseder Hannes Gross Stefan Mangard Florian Mendel Robert Primas
Implementation attacks like side-channel and fault attacks are a threat to deployed devices especially if an attacker has physical access. As a consequence, devices like smart cards and IoT devices usually provide...
last revised 8 Sep 2018
Pinpointing the Side-Channel Leakage of Masked AES Hardware Implementations
Iacrpub
https://iacr.org/cryptodb/data/paper.php?pubkey=810
Stefan Mangard Kai Schramm
Ches 2006
IACR CHES 2012
https://iacr.org/archive/ches2012/ches2012-index.html
CHES 2012: Patrick Schaumont and Emmanuel Prouff (Eds.): Cryptographic Hardware and Embedded Systems - 14th International Workshop - CHES 2012, Leuven, Belgium September 9-12, 2012 Proceedings. CHES 2012 Leuven, Belgium,...
CHES 2007
https://iacr.org/archive/ches2007/ches2007.html
Much of the information on this web page was provided courtesy of Michael Ley and the DBLP Project CHES 2007: Pascal Paillier and Ingrid Verbauwhede (Eds.): Cryptographic Hardware and Embedded Systems - CHES 2007, 9th...
Analyzing the Shuffling Side-Channel Countermeasure for Lattice-Based Signatures
Eprint
https://eprint.iacr.org/2017/033
Peter Pessl
Implementation security for lattice-based cryptography is still a vastly unexplored field. At CHES 2016, the very first side-channel attack on a lattice-based signature scheme was presented. Later, shuffling was proposed as an...
received 12 Jan 2017
IACR CHES 2014
https://iacr.org/archive/ches2014/ches2014-index.html
CHES 2014: Matthew J. B. Robshaw and Lejla Batina (Eds.): Cryptographic Hardware and Embedded Systems - CHES 2014 - 16th International Workshop Busan, South Korea, September 23-26, 2014 CHES 2014 Preface by Matthew J. B....
Workshop on Cryptographic Hardware and Embedded Systems (CHES 2007)
https://iacr.org/workshops/ches/ches2007/program2007.html
CHES 2010 CALL FOR PAPERS CHES STATISTICS FORMER CHES STEERING COMMITTEE SC RULES CHES '99 CHES 2000 CHES 2001 CHES 2002 CHES 2003 CHES 2004 CHES 2005 CHES 2006 CHES 2007 CHES 2008 CHES 2009 Workshop on Cryptographic Hardware...
Assessing the Feasibility of Single Trace Power Analysis of Frodo
Eprint
https://eprint.iacr.org/2018/687
Joppe W. Bos Simon Friedberger Marco Martinoli Elisabeth Oswald Martijn Stam
Lattice-based schemes are among the most promising post-quantum schemes, yet the effect of both parameter and implementation choices on their side-channel resilience is still poorly understood. Aysu et al. (HOST'18) recently...
received 17 Jul 2018
Cryptographic Hardware and Embedded Systems - CHES 2005
https://iacr.org/archive/ches2005/ches2005.html
Much of the information on this web page was provided courtesy of Michael Ley and the DBLP Project CHES 2005: Edinburgh, UK Josyula R. Rao, Berk Sunar (Eds.): Cryptographic Hardware and Embedded Systems - CHES 2005, 7th...
New Single-Trace Side-Channel Attacks on a Specific Class of Elgamal Cryptosystem
Eprint
https://eprint.iacr.org/2018/761
N. Mahdion Hadi Soleimany Pouya Habibi Farokhlagha Moazami
In 2005, Yen et al. proposed the first $N-1$ attack on the modular exponentiation algorithms such as BRIP and square-and-multiply-always methods. This attack makes use of the ciphertext $N-1$ as a distinguisher to obtain a...
received 19 Aug 2018
IACR CHES 2013
https://iacr.org/archive/ches2013/ches2013-index.html
CHES 2013: Jean-Sébastien Coron and Guido Bertoni (Eds.): Cryptographic Hardware and Embedded Systems - CHES 2013 - 15th International Workshop, Santa Barbara, CA, USA, August 20-23, 2013 Proceedings. CHES 2013 Preface by...
CHES 2012
https://iacr.org/archive/ches2012/ches2012.html
Breakthrough Silicon Scanning Discovers Backdoor in Military Chip , 23-40, Sergei Skorobogatov , Christopher Woods bib info Simple Photonic Emission Analysis of AES - Photonic Side Channel Analysis for the Rest of Us , 41-57,...
IACR CHES 2009
https://iacr.org/archive/ches2009/ches2009.html
CHES 2009: Kris Gaj and Christophe Clavier (Eds.): Cryptographic Hardware and Embedded Systems - CHES 2009, 11th International Workshop, Lausanne, Switzerland, September 6-9, 2009, Proceedings Proceedings. CHES 2009 Lausanne,...
Exploiting the Physical Disparity: Side-Channel Attacks on Memory Encryption
Eprint
https://eprint.iacr.org/2016/473
Thomas Unterluggauer Stefan Mangard
Memory and disk encryption is a common measure to protect sensitive information in memory from adversaries with physical access. However, physical access also comes with the risk of physical attacks. As these may pose a threat...
received 17 May 2016
CHES 2005: Workshop on Cryptographic Hardware and Embedded Systems 2005
https://iacr.org/workshops/ches.dir/ches2005/program2005.html
Workshop on Cryptographic Hardware and Embedded Systems (CHES 2005) Edinburgh, Scotland Monday Evening August 29 th - Thursday September 1 st , 2005 The Roxburghe Hotel sponsored by IACR [ CHES 05 ][ PROGRAM ][ CHES BANQUET ][...
Reliable Information Extraction for Single Trace Attacks
Eprint
https://eprint.iacr.org/2015/045
Valentina Banciu Elisabeth Oswald Carolyn Whitnall
Side-channel attacks using only a single trace crucially rely on the capability of reliably extracting side-channel information (e.g. Hamming weights of intermediate target values) from traces. In particular, in original...
received 19 Jan 2015
Next ►