搜索结果: 1-15 共查到“军队指挥学 attack”相关记录503条 . 查询时间(0.171 秒)
Breaking the Bluetooth Pairing – The Fixed Coordinate Invalid Curve Attack
Bluetooth elliptic curve cryptosystem Diffie-Hellman
2019/9/19
Bluetooth is a widely deployed standard for wireless communications between mobile devices. It uses authenticated Elliptic Curve Diffie-Hellman for its key exchange. In this paper we show that the aut...
A New Attack on RSA and Demytko's Elliptic Curve Cryptosystem
RSA Cryptanalysis Coppersmith's method
2019/9/19
Let N=pqN=pq be an RSA modulus and ee be a public exponent. Numerous attacks on RSA exploit the arithmetical properties of the key equation ed−k(p−1)(q−1)=1ed−k(p−1)(q...
A Critical Analysis of ISO 17825 (`Testing methods for the mitigation of non-invasive attack classes against cryptographic modules')
side-channel analysis leakage detection security certification
2019/9/16
The ISO standardisation of `Testing methods for the mitigation of non-invasive attack classes against cryptographic modules' (ISO/IEC 17825:2016) specifies the use of the Test Vector Leakage Assessmen...
Revisiting the Hybrid attack on sparse and ternary secret LWE
Lattice-based Cryptography Learning with Errors Homomorphic Encryption
2019/9/16
In the practical use of the Learning With Error (LWE) based cryptosystems, it is quite common to choose the secret to be extremely small: one popular choice is ternary (±1,0±1,0) coefficient vector, a...
In 1998, Jerey Hostein, Jill Pipher, and Joseph H. Silverman introduced the famous Ntru cryptosystem, and called it "A ring-based public key cryptosystem". Actually it turns out to be a lattice based ...
Related-Key Differential Slide Attack Against Fountain V1
lightweight cryptography Fountain slide attacks
2019/8/14
The stream cipher FOUNTAIN was introduced in April 2019 as one of the candidates in the NIST lightweight crypto standardization process. In this paper we introduce a slide attack that leads to the con...
A Practicable Timing Attack Against HQC and its Countermeasure
HQC BCH decoding Timing attack
2019/8/8
In this paper, we present a practicable chosen ciphertext timing attack retrieving the secret key of HQC. The attack exploits a correlation between the weight of the error to be decoded and the runnin...
One Bit is All It Takes: A Devastating Timing Attack on BLISS’s Non-Constant Time Sign Flips
Lattice-Based Cryptography Cryptanalysis BLISS
2019/8/7
As one of the most efficient lattice-based signature schemes, and one of the only ones to have seen deployment beyond an academic setting (e.g., as part of the VPN software suite strongSwan), BLISS ha...
In this note, we present a polynomial time and memory adaptive attack on the 2-SIDH protocol. The 2-SIDH protocol is a special instance of the countermeasure proposed by Azarderakhsh, Jao and Leonardi...
The Singularity Attack to the Multivariate Signature Scheme Himq-3
Multivariate public key cryptosystem Cryptanalysis Oil Vinegar Signature Scheme
2019/8/6
In 2017 Kyung-Ah Shim et al proposed a multivariate signature scheme called Himq-3 which is a submission to National Institute of Standards and Technology (NIST) standardization process of post-quantu...
Lilliput-AE is a tweakable block cipher submitted as a candidate to the NIST lightweight cryptography standardization process. It is based upon the lightweight block cipher Lilliput, whose cryptanalys...
A Tale of Three Signatures: practical attack of ECDSA with wNAF
ECDSA lattice techniques cryptanalysis
2019/7/25
Attacking ECDSA with wNAF implementation for the scalar multiplication first requires some side channel analysis to collect information, then lattice based methods to recover the secret key. In this p...
A Reaction Attack against Cryptosystems based on LRPC Codes
Rank-based cryptography Code-based cryptography LRPC cryptosystems
2019/7/22
Rank metric is a very promising research direction for code-based cryptography. In fact, thanks to the high complexity of generic decoding attacks against codes in this metric, it is possible to easil...
X-DeepSCA: Cross-Device Deep Learning Side Channel Attack
Side-channel Attacks Profiling attacks Cross-device Attack
2019/7/17
This article, for the first time, demonstrates Cross-device Deep Learning Side-Channel Attack (X-DeepSCA), achieving an accuracy of >99.9%>99.9%, even in presence of significantly higher inter-device ...
A Chosen Random Value Attack on WPA3 SAE authentication protocol
SAE WPA3 Dragonfly key exchange
2019/7/15
SAE (Simultaneous Authentication of Equals), is a password authenticated key exchange protocol, which is designed to replace the WPA2-PSK based authentication. The SAE Authentication Protocol supports...