Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Hertzbleed: Turning power {Side-Channel} attacks into remote timing attacks on x86
Power side-channel attacks exploit data-dependent variations in a CPU's power
consumption to leak secrets. In this paper, we show that on modern Intel (and AMD) x86 …
consumption to leak secrets. In this paper, we show that on modern Intel (and AMD) x86 …
Strong non-interference and type-directed higher-order masking
Differential power analysis (DPA) is a side-channel attack in which an adversary retrieves
cryptographic material by measuring and analyzing the power consumption of the device on …
cryptographic material by measuring and analyzing the power consumption of the device on …
A side-channel-resistant implementation of SABER
The candidates for the NIST Post-Quantum Cryptography standardization have undergone
extensive studies on efficiency and theoretical security, but research on their side-channel …
extensive studies on efficiency and theoretical security, but research on their side-channel …
Bitslicing arithmetic/boolean masking conversions for fun and profit: with application to lattice-based kems
The performance of higher-order masked implementations of lattice-based based key
encapsulation mechanisms (KEM) is currently limited by the costly conversions between …
encapsulation mechanisms (KEM) is currently limited by the costly conversions between …
Side-channel attacks on BLISS lattice-based signatures: Exploiting branch tracing against strongswan and electromagnetic emanations in microcontrollers
In this paper, we investigate the security of the BLISS lattice-based signature scheme, one of
the most promising candidates for postquantum-secure signatures, against side-channel …
the most promising candidates for postquantum-secure signatures, against side-channel …
Practical CCA2-secure and masked ring-LWE implementation
During the last years public-key encryption schemes based on the hardness of ring-LWE
have gained significant popularity. For real-world security applications assuming strong …
have gained significant popularity. For real-world security applications assuming strong …
Improved gadgets for the high-order masking of dilithium
We present novel and improved high-order masking gadgets for Dilithium, a post-quantum
signature scheme that has been standardized by the National Institute of Standards and …
signature scheme that has been standardized by the National Institute of Standards and …
Lightweight AEAD and hashing using the sparkle permutation family
We introduce the Sparkle family of permutations operating on 256, 384 and 512 bits. These
are combined with the Beetle mode to construct a family of authenticated ciphers …
are combined with the Beetle mode to construct a family of authenticated ciphers …
Masking the GLP lattice-based signature scheme at any order
Recently, numerous physical attacks have been demonstrated against lattice-based
schemes, often exploiting their unique properties such as the reliance on Gaussian …
schemes, often exploiting their unique properties such as the reliance on Gaussian …
[PDF][PDF] Schwaemm and esch: lightweight authenticated encryption and hashing using the sparkle permutation family
With the advent of the Internet of Things (IoT), a myriad of devices are being connected to
one another in order to exchange information. This information has to be secured …
one another in order to exchange information. This information has to be secured …