Zobrazeno 1 - 10
of 10
pro vyhledávání: '"Chitchanok Chuengsatiansup"'
Autor:
Shing Hing William Cheng, Chitchanok Chuengsatiansup, Daniel Genkin, Dallas McNeil, Toby Murray, Yuval Yarom, Zhiyuan Zhang
Publikováno v:
Transactions on Cryptographic Hardware and Embedded Systems, Vol 2024, Iss 3 (2024)
Speculative out-of-order execution is a strategy of masking execution latency by allowing younger instructions to execute before older instructions. While originally considered to be innocuous, speculative out-of-order execution was brought into the
Externí odkaz:
https://doaj.org/article/8f9e8eb068344251a4fbf48bf22b202e
Autor:
Florian Sieck, Zhiyuan Zhang, Sebastian Berndt, Chitchanok Chuengsatiansup, Thomas Eisenbarth, Yuval Yarom
Publikováno v:
Transactions on Cryptographic Hardware and Embedded Systems, Vol 2024, Iss 1 (2023)
The microarchitectural behavior of modern CPUs is mostly hidden from developers and users of computer software. Due to a plethora of attacks exploiting microarchitectural behavior, developers of security-critical software must, e.g., ensure their cod
Externí odkaz:
https://doaj.org/article/a8f8e8e2b99a49439070c867cdf287db
Publikováno v:
Transactions on Cryptographic Hardware and Embedded Systems, Vol 2023, Iss 3 (2023)
In this paper, we present the first chosen-ciphertext (CC) cache-timing attacks on the reference implementation of HQC. We build a cache-timing based distinguisher for implementing a plaintext-checking (PC) oracle. The PC oracle uses side-channel inf
Externí odkaz:
https://doaj.org/article/f4c180f4118b44d1897bc0f5fe21bcd5
Publikováno v:
The Computer Journal.
The Pilsung cipher is part of the North Korean Red Star operating system, which was leaked to the West in 2014. Initial analysis by Kryptos Logic reported a possibility of a class of weak keys due to the use of pseudo-random diffusion. Following this
Publikováno v:
Proceedings of the Genetic and Evolutionary Computation Conference Companion.
Publikováno v:
Topics in Cryptology – CT-RSA 2022 ISBN: 9783030953119
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::ee94888392de8f9453ad8079383012fe
https://doi.org/10.1007/978-3-030-95312-6_12
https://doi.org/10.1007/978-3-030-95312-6_12
Publikováno v:
Applied Cryptography and Network Security ISBN: 9783031092336
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::c7e9877dcbc980b2051b4667ca08edcd
https://doi.org/10.1007/978-3-031-09234-3_10
https://doi.org/10.1007/978-3-031-09234-3_10
Publikováno v:
AsiaCCS
ASIA-CCS
ASIA-CCS, 2020, Taipei, France. pp.853-866, ⟨10.1145/3320269.3384758⟩
Proceedings of the 15th ACM Asia Conference on Computer and Communications Security
ASIA-CCS
ASIA-CCS, 2020, Taipei, France. pp.853-866, ⟨10.1145/3320269.3384758⟩
Proceedings of the 15th ACM Asia Conference on Computer and Communications Security
International audience; Lattices lead to promising practical post-quantum digital signatures, combining asymptotic efficiency with strong theoretical security guarantees. However, tuning their parameters into practical instantiations is a delicate ta
Publikováno v:
Lecture Notes in Computer Science
Lecture Notes in Computer Science-Selected Areas in Cryptography – SAC 2019
International Conference on Selected Areas in Cryptography
Selected Areas in Cryptography
Selected Areas in Cryptography, 2019, Waterloo, Canada. pp.693-713, ⟨10.1007/978-3-030-38471-5_28⟩
Lecture Notes in Computer Science ISBN: 9783030384708
SAC
Selected Areas in Cryptography – SAC 2019
Lecture Notes in Computer Science-Selected Areas in Cryptography – SAC 2019
International Conference on Selected Areas in Cryptography
Selected Areas in Cryptography
Selected Areas in Cryptography, 2019, Waterloo, Canada. pp.693-713, ⟨10.1007/978-3-030-38471-5_28⟩
Lecture Notes in Computer Science ISBN: 9783030384708
SAC
Selected Areas in Cryptography – SAC 2019
We investigate the efficiency of a \(\mathsf {(module}\text {-}\mathsf {)LWR}\)-based PRF built using the GGM design. Our construction enjoys the security proof of the GGM construction and the \(\mathsf {(module}\text {-}\mathsf {)LWR}\) hardness ass
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::548497a97afc5f7ef577da2a334de35f
Autor:
Ruben Niederhagen, Tanja Lange, Tung Chou, Eran Lambooij, Andreas Hülsing, Christine van Vredendaal, Chitchanok Chuengsatiansup, Daniel J. Bernstein
Publikováno v:
Lecture Notes in Computer Science
Lecture Notes in Computer Science-Security Standardisation Research
Security Standardisation Research ISBN: 9783319271514
Security Standardisation Research
Lecture Notes in Computer Science-Security Standardisation Research
Security Standardisation Research ISBN: 9783319271514
Security Standardisation Research
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::cabcc5a90d7b46779b7d446af6cc7dd1