Zobrazeno 1 - 10
of 18
pro vyhledávání: '"Vladimir Sedlacek"'
Publikováno v:
Transactions on Cryptographic Hardware and Embedded Systems, Vol 2024, Iss 4 (2024)
Side-channel attacks on elliptic curve cryptography (ECC) often assume a white-box attacker who has detailed knowledge of the implementation choices taken by the target implementation. Due to the complex and layered nature of ECC, there are many choi
Externí odkaz:
https://doaj.org/article/50af233f9fff4e3d8e7f6c7fb97be525
Publikováno v:
Transactions on Cryptographic Hardware and Embedded Systems, Vol 2020, Iss 4 (2020)
We present our discovery of a group of side-channel vulnerabilities in implementations of the ECDSA signature algorithm in a widely used Atmel AT90SC FIPS 140-2 certified smartcard chip and five cryptographic libraries (libgcrypt, wolfSSL, MatrixSSL,
Externí odkaz:
https://doaj.org/article/9f475132a461455faa5bb5553140c15c
Publikováno v:
Proceedings of the 19th International Conference on Security and Cryptography.
Publikováno v:
Progress in Cryptology-AFRICACRYPT 2022 ISBN: 9783031174322
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::9f6faeaef75c32d31e7dd6cc37e9dfbb
https://doi.org/10.1007/978-3-031-17433-9_21
https://doi.org/10.1007/978-3-031-17433-9_21
Publikováno v:
Lecture Notes in Computer Science ISBN: 9783030920616
Advances in Cryptology-ASIACRYPT 2021-27th International Conference on the Theory and Application of Cryptology and Information Security
Lecture Notes in Computer Science
Lecture Notes in Computer Science-Advances in Cryptology – ASIACRYPT 2021
Advances in Cryptology-ASIACRYPT 2021-27th International Conference on the Theory and Application of Cryptology and Information Security
Lecture Notes in Computer Science
Lecture Notes in Computer Science-Advances in Cryptology – ASIACRYPT 2021
The Refined Power Analysis, Zero-Value Point, and Exceptional Procedure attacks introduced side-channel techniques against specific cases of elliptic curve cryptography. The three attacks recover bits of a static ECDH key adaptively, collecting infor
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::1fb61f7fd0eac2611615dd5de54ab1a8
https://doi.org/10.1007/978-3-030-92062-3_5
https://doi.org/10.1007/978-3-030-92062-3_5
Publikováno v:
Computer Security – ESORICS 2020 ISBN: 9783030590123
ESORICS (2)
ESORICS (2)
We analyse whether the smartcards of the JavaCard platform correctly validate primality of domain parameters. The work is inspired by Albrecht et al. [1], where the authors analysed many open-source libraries and constructed pseudoprimes fooling the
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::ff495596dd0e8aadea11d222d955f017
http://hdl.handle.net/10278/3745629
http://hdl.handle.net/10278/3745629
Autor:
Vladimir Sedlacek
Publikováno v:
Archivum Mathematicum. :221-252
Publikováno v:
ICETE (2)
We analyze Cheng’s 4p - 1 factorization method as the means of a potential backdoor for the RSA primes generated inside black-box devices like cryptographic smartcards. We devise three detection methods for such a backdoor and also audit 44 million
Autor:
Vladimir Sedlacek, Petr Blazek, Radek Fujdiak, Jan Slacik, Vaclav Uher, Petr Mlynek, Marina Volkova, Jiri Misurec, Petr Chmelar
Publikováno v:
ICUMT
This paper describes a network traffic generator which is based on a container virtualization technology, namely Docker. The aim of the generator is the simulation of TCP/IP layer 7 (L7) traffic and attacks. The main advantages of the proposed soluti
Publikováno v:
JOM. 17:386-388
The reduction of copper by blowing with gaseous ammonia has proved promising in Czechoslovakia, and exhibits certain advantages over the conventional pling practice.