A Message Recovery Attack on LWE/LWR-Based PKE/KEMs Using Amplitude-Modulated EM Emanations

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:International Conference on Information Security and Cryptology (25. : 2022 : Seoul) Information security and cryptology – ICISC 2022
1. Verfasser: Wang, Ruize (VerfasserIn)
Weitere Verfasser: Ngo, Kalle (VerfasserIn), Dubrova, Elena (VerfasserIn)
Pages:2022
Format: UnknownFormat
Sprache:eng
Veröffentlicht: 2023
Schlagworte:
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Titel Jahr Verfasser
Differential Testing of Cryptographic Libraries with Hybrid Fuzzing 2023 Jin, Hoyong
Key-Recovery by Side-Channel Information on the Matrix-Vector Product in Code-Based CryptoSystems 2023 Seck, Boly
Trapdoor Sanitizable and Redactable Signatures with Unlinkability, Invisibility and Strong Context-Hiding 2023 Ishizaka, Masahito
Exploring Encrypted Keyboards to Defeat Client-Side Scanning in End-to-End Encryption Systems 2023 Alatawi, Mashari
Public Key Encryption with Hierarchical Authorized Keyword Search 2023 Liu, Zi-Yuan
Reputation at Stake! A Trust Layer over Decentralized Ledger for Multiparty Computation and Reputation-Fair Lottery 2023 Larangeira, Mario
Private Evaluation of a Decision Tree Based on Secret Sharing 2023 Ahmed, Mohammad Nabil
An Ultrafast Cryptographically Secure Pseudorandom Number Generator 2023 Zheng, Jianliang
Group Testing Aggregate Signatures with Soundness 2023 Sato, Shingo
Pointcheval-Sanders Signature-Based Synchronized Aggregate Signature 2023 Tezuka, Masayuki
WOTSwana: A Generalized Seeve Construction for Multiple Proofs of Ownership 2023 Chaum, David
See-In-The-Middle Attacks on Blockciphers ARIA and DEFAULT 2023 Park, Jonghyun
Implicit Key-Stretching Security of Encryption Schemes 2023 Bossert, Jannis
Impossible Differential Cryptanalysis on Reduced-Round PRINCEcore 2023 Zhang, Li
Time-Efficient Finite Field Microarchitecture Design for Curve448 and Ed448 on Cortex-M4 2023 Anastasova, Mila
Attribute-Based Signatures for Range of Inner Product and Its Applications 2023 Ishizaka, Masahito
Related-Key Differential Cryptanalysis of GMiIMC Used in Post-Quantum Signatures 2023 Chen, Shiyao
Towards Constructing Consistent Pattern Strength Meters with User’s Visual Perception 2023 Park, Leo Hyun
Differential Fault Attack on AES Using Maximum Four Bytes Faulty CIphertexts 2023 Huh, Jae-Won
A Performance Evaluation of IPsec with Post-Quantum Cryptography 2023 Bae, Seungyeon
Alle Artikel auflisten