International Association for Cryptologic Research

International Association
for Cryptologic Research

IACR Local Search

Possible queries include homomorphic author:david.
Found 20000 results
Stealing Keys from PCs Using a Radio: Cheap Electromagnetic Attacks on Windowed Exponentiation
Iacrpub
https://iacr.org/cryptodb/data/paper.php?pubkey=27424
Daniel Genkin Lev Pachmanov Itamar Pipman Eran Tromer
Ches 2015
Stealing Keys from PCs using a Radio: Cheap Electromagnetic Attacks on Windowed Exponentiation
Eprint
https://eprint.iacr.org/2015/170
Daniel Genkin Lev Pachmanov Itamar Pipman Eran Tromer
We present new side-channel attacks on RSA and ElGamal implementations that use the popular sliding-window or fixed-window (m-ary) modular exponentiation algorithms. The attacks can extract decryption keys using a very low...
last revised 3 Mar 2015
ECDH Key-Extraction via Low-Bandwidth Electromagnetic Attacks on PCs
Eprint
https://eprint.iacr.org/2016/129
Daniel Genkin Lev Pachmanov Itamar Pipman Eran Tromer
We present the first physical side-channel attack on elliptic curve cryptography running on a PC. The attack targets the ECDH public-key encryption algorithm, as implemented in the latest version of GnuPG's Libgcrypt. By...
last revised 17 Feb 2016
IACR CHES 2015
https://iacr.org/archive/ches2015/ches2015-index.html
CHES 2015: Helena Handschuh and Tim Güneysu (Eds.): Cryptographic Hardware and Embedded Systems - CHES 2015 17th International Workshop Saint-Malo, France, September 13-16, 2015 Proceedings. CHES 2015 Preface by Helena...
ECDSA Key Extraction from Mobile Devices via Nonintrusive Physical Side Channels
Eprint
https://eprint.iacr.org/2016/230
Daniel Genkin Lev Pachmanov Itamar Pipman Eran Tromer Yuval Yarom
We show that elliptic-curve cryptography implementations on mobile devices are vulnerable to electromagnetic and power side-channel attacks. We demonstrate full extraction of ECDSA secret signing keys from OpenSSL and...
last revised 19 Aug 2016
Get Your Hands Off My Laptop: Physical Side-Channel Key-Extraction Attacks on PCs
Eprint
https://eprint.iacr.org/2014/626
Daniel Genkin Itamar Pipman Eran Tromer
We demonstrate physical side-channel attacks on a popular software implementation of RSA and ElGamal, running on laptop computers. Our attacks use novel side channels, based on the observation that the "ground" electric...
last revised 20 Aug 2014
Get Your Hands Off My Laptop: Physical Side-Channel Key-Extraction Attacks on PCs
Iacrpub
https://iacr.org/cryptodb/data/paper.php?pubkey=27511
Daniel Genkin Itamar Pipman Eran Tromer
Ches 2014
CRYPTO 2016
https://iacr.org/conferences/crypto2016/cryptorump.html
CRYPTO 2016 August 14-18, 2016 date Santa Barbara, CA, USA location Home Technical Program Call for Papers Paper Submissions Accepted Papers Program Rump Session General Information Registration Travel Accommodations US Visas...
Drive-by Key-Extraction Cache Attacks from Portable Code
Eprint
https://eprint.iacr.org/2018/119
Daniel Genkin Lev Pachmanov Eran Tromer Yuval Yarom
We show how malicious web content can extract cryptographic secret keys from the user's computer. The attack uses portable scripting languages supported by modern browsers to induce contention for CPU cache resources, and...
received 31 Jan 2018
https://iacr.org/conferences/crypto2017/rumpsession.html
Crypto 2017 Rump Schedule Table of Contents 1. First session 2. Second session 3. Third session 4. Announcemnts 1 First session 19:20 Program Chair's Report Jonathan Katz 19:26 Forty years and still running Jean-Jacques...
https://iacr.org/conferences/crypto2017/rump.html
Crypto 2017 Rump Schedule Table of Contents 1. First session 2. Second session 3. Third session 4. Announcemnts 1 First session 19:20 Program Chair's Report Jonathan Katz 19:26 Forty years and still running Jean-Jacques...
IACR CHES 2014
https://iacr.org/archive/ches2014/ches2014-index.html
CHES 2014: Matthew J. B. Robshaw and Lejla Batina (Eds.): Cryptographic Hardware and Embedded Systems - CHES 2014 - 16th International Workshop Busan, South Korea, September 23-26, 2014 CHES 2014 Preface by Matthew J. B....
Itamar Pipman
Author
https://iacr.org/cryptodb/data/author.php?authorkey=9304
Student
Lev Pachmanov
Author
https://iacr.org/cryptodb/data/author.php?authorkey=9303
Tel Aviv University
Computational Integrity with a Public Random String from Quasi-Linear PCPs
Iacrpub
https://iacr.org/cryptodb/data/paper.php?pubkey=27999
Eli Ben-Sasson Iddo Bentov Alessandro Chiesa Ariel Gabizon Daniel Genkin Matan Hamilis Evgenya Pergament Michael Riabzev Mark Silberstein Eran Tromer Madars Virza
Eurocrypt 2017
RSA Key Extraction via Low-Bandwidth Acoustic Cryptanalysis
Eprint
https://eprint.iacr.org/2013/857
Daniel Genkin Adi Shamir Eran Tromer
Many computers emit a high-pitched noise during operation, due to vibration in some of their electronic components. These acoustic emanations are more than a nuisance: they can convey information about the software running on...
received 18 Dec 2013
RSA Key Extraction via Low-Bandwidth Acoustic Cryptanalysis
Iacrpub
https://iacr.org/cryptodb/data/paper.php?pubkey=25201
Daniel Genkin Adi Shamir Eran Tromer
Crypto 2014
Acoustic Cryptanalysis
Iacrpub
https://iacr.org/cryptodb/data/paper.php?pubkey=28422
Daniel Genkin Adi Shamir Eran Tromer
Jofc 2017
SNARKs for C: Verifying Program Executions Succinctly and in Zero Knowledge
Iacrpub
https://iacr.org/cryptodb/data/paper.php?pubkey=24644
Eli Ben-Sasson Alessandro Chiesa Daniel Genkin Eran Tromer Madars Virza
Crypto 2013
CRYPTO 2013
https://iacr.org/conferences/crypto2013/papers-2013.html
CRYPTO 2013 Aug 18 – 22 Santa Barbara California USA Home > Technical Program Accepted Papers > Program > Rump Session > Call for Papers > General information Registration > Travel > US Visa > Accommodations > Stipends >...
Next ►