نتایج جستجو برای: secret disclosure attack

تعداد نتایج: 121525  

Journal: :IACR Cryptology ePrint Archive 2015
Marc Green Thomas Eisenbarth

Side-channel attacks utilize information leakage in the implementation of an otherwise secure cryptographic algorithm to extract secret information. For example, adversaries can extract the secret key used in a cryptographic algorithm by observing cache-timing data. Threshold cryptography enables the division of private keys into shares, distributed among several nodes; the knowledge of a subse...

Journal: :SAHARA J : journal of Social Aspects of HIV/AIDS Research Alliance 2013
Georges Tiendrebeogo Fabienne Hejoaka Edwige Mireille Belem Pascal Louis Germain Compaoré Liezel Wolmarans André Soubeiga Nathalie Ouangraoua

Increasingly parents living with HIV will have to confront the dilemmas of concealing their lifelong treatment or disclosing to their children exposed to their daily treatment practices. However, limited data are available regarding parental HIV disclosure to children in Burkina Faso. Do parents on antiretroviral therapy disclose their HIV status to their children? What drives them? How do they...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه مازندران 1388

some researches made in the field of agency problem issue, deal with the role of control systems regarding owners and managers. in this research the relationship between the two control mechanisms, namely the voluntary disclosure (external control mechanism) and outside directors (internal control mechanism), which are reductive of agency problems, has been studied. for this reason, a sample ...

2005
Kris Tiri David D. Hwang Alireza Hodjat Bo-Cheng Lai Shenglin Yang Patrick Schaumont Ingrid Verbauwhede

Wave dynamic differential logic combined with differential routing is a working, practical technique to thwart side-channel power attacks. Measurement-based experimental results show that a differential power analysis attack on a prototype IC, fabricated in 0.18μm CMOS, does not disclose the entire secret key of the AES algorithm at 1,500,000 measurement acquisitions. This makes the attack de f...

2000
Dan Boneh Antoine Joux Phong Q. Nguyen

We present an attack on plain ElGamal and plain RSA encryption. The attack shows that without proper preprocessing of the plaintexts, both ElGamal and RSA encryption are fundamentally insecure. Namely, when one uses these systems to encrypt a (short) secret key of a symmetric cipher it is often possible to recover the secret key from the ciphertext. Our results demonstrate that preprocessing me...

2008
Stefan Böttcher

We consider information disclosure caused by answering queries to an XML database. We introduce an audit framework to determine ‘suspicious’ user queries, i.e. those queries that returned results being sufficient to derive disclosed secret information. We describe secret information in form of a secret query and provide a formal definition of ‘suspicious’ user queries based on what we call ‘rea...

1999
Jean-Sébastien Coron

Differential Power Analysis, first introduced by Kocher et al. in [14], is a powerful technique allowing to recover secret smart card information by monitoring power signals. In [14] a specific DPA attack against smart-cards running the DES algorithm was described. As few as 1000 encryptions were sufficient to recover the secret key. In this paper we generalize DPA attack to elliptic curve (EC)...

1998
Hongjun Wu Feng Bao Robert H. Deng Qin-Zhong Ye

Knudsen and Berson have applied truncated differential attack on 5 round SAFER K-64 successfully. However, their attack is not efficient when applied on 5 round SAFER SK-64 (with the modified key schedule) and can not be applied on 6 round SAFER. In this paper, we improve the truncated differential attack on SAFER by using better truncated differential and additional filtering method. Our attac...

Journal: :IACR Cryptology ePrint Archive 2016
Leon Groot Bruinderink Andreas Hülsing Tanja Lange Yuval Yarom

We present the first side-channel attack on a lattice-based signature scheme, using the Flush+Reload cache-attack. The attack is targeted at the discrete Gaussian sampler, an important step in the Bimodal Lattice Signature Schemes (BLISS). After observing only 450 signatures with a perfect side-channel, an attacker is able to extract the secret BLISS-key in less than 2 minutes, with a success p...

2009
Pierre-Alain Fouque Gaëtan Leurent Denis Réal Frédéric Valette

In this paper, we show a very efficient side channel attack against HMAC. Our attack assumes the presence of a side channel that reveals the Hamming distance of some registers. After a profiling phase in which the adversary has access to a device and can configure it, the attack recovers the secret key by monitoring a single execution of HMAC-SHA-1. The secret key can be recovered using a "temp...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید