![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Chapter and Conference Paper
Lattice-Based Fault Attacks on Deterministic Signature Schemes of ECDSA and EdDSA
The deterministic ECDSA and EdDSA signature schemes have found plenty of applications since their publication, e.g., block chain and Internet of Thing, and have been stated in RFC 6979 and RFC 8032 by IETF res...
-
Chapter and Conference Paper
Jitter Estimation with High Accuracy for Oscillator-Based TRNGs
Ring oscillator-based true random number generators (RO-based TRNGs) are widely used to provide unpredictable random numbers for cryptographic systems. The unpredictability of the output numbers, which can be ...
-
Chapter and Conference Paper
Lattice-Based Fault Attacks Against ECMQV
ECMQV is a standardized key agreement protocol based on ECC with an additional implicit signature authentication. In this paper we investigate the vulnerability of ECMQV against fault attacks and propose two e...
-
Chapter and Conference Paper
My Traces Learn What You Did in the Dark: Recovering Secret Signals Without Key Guesses
In side channel attack (SCA) studies, it is widely believed that unprotected implementations leak information about the intermediate states of the internal cryptographic process. However, directly recovering t...
-
Chapter and Conference Paper
Improved Fault Analysis on the Block Cipher SPECK by Injecting Faults in the Same Round
SPECK is a new family of lightweight block ciphers proposed by the U.S. National Security Agency in 2013. So far, there exist several fault analysis results on this family. In this paper, we propose an improve...
-
Chapter and Conference Paper
Linear Regression Attack with F-test: A New SCARE Technique for Secret Block Ciphers
The past ten years have seen tremendous progress in the uptake of side channel analysis in various applications. Among them, Side Channel Analysis for Reverse Engineering (SCARE) is an especially fruitful area...
-
Chapter and Conference Paper
A General Method to Evaluate the Correlation of Randomness Tests
This paper discusses the correlation of the randomness tests. In this paper, we propose a new general method to evaluate the correlation of randomness tests. Firstly, we deduce the distribution that independen...
-
Chapter and Conference Paper
Integral Based Fault Attack on LBlock
LBlock is a 32-round lightweight block cipher presented at ACNS2011. In this paper, the fault attack on LBlock is explored. The first fault attack on LBlock was presented at COSADE2012, which can reveal the ma...
-
Chapter and Conference Paper
Padding Oracle Attack on PKCS#1 v1.5: Can Non-standard Implementation Act as a Shelter?
In the past decade, Padding Oracle Attacks (POAs) have become a major threat to PKCS#1 v1.5. Although the updated scheme (OAEP) has solved this problem, PKCS#1 v1.5 is still widely deployed in various real-lif...
-
Chapter and Conference Paper
Web-based Coordination for E-Commerce
As the e-commerce environment becomes more pervasive and dynamic, coordination among companies are required more frequently than ever. We give the definition of coordination as well as the model of e-commerce ...