Skip to main content

and
  1. Chapter and Conference Paper

    Modifying an Enciphering Scheme After Deployment

    Assume that a symmetric encryption scheme has been deployed and used with a secret key. We later must change the encryption scheme in a way that preserves the ability to decrypt (a subset of) previously encryp...

    Paul Grubbs, Thomas Ristenpart, Yuval Yarom in Advances in Cryptology – EUROCRYPT 2017 (2017)

  2. Chapter and Conference Paper

    Flush, Gauss, and Reload – A Cache Attack on the BLISS Lattice-Based Signature Scheme

    We present the first side-channel attack on a lattice-based signature scheme, using the Flush+Reload cache-attack. The attack is targeted at the discrete Gaussian sampler, an important step in the Bimodal Lattice...

    Leon Groot Bruinderink, Andreas Hülsing in Cryptographic Hardware and Embedded System… (2016)

  3. Chapter and Conference Paper

    CacheBleed: A Timing Attack on OpenSSL Constant Time RSA

    The scatter-gather technique is a commonly implemented approach to prevent cache-based timing attacks. In this paper we show that scatter-gather is not constant time. We implement a cache timing attack against...

    Yuval Yarom, Daniel Genkin, Nadia Heninger in Cryptographic Hardware and Embedded System… (2016)

  4. Chapter and Conference Paper

    Evaluation and Cryptanalysis of the Pandaka Lightweight Cipher

    There is a growing need to develop lightweight cryptographic primitives suitable for resource-constrained devices permeating in increasing numbers into the fabric of life. Such devices are exemplified none mor...

    Yuval Yarom, Gefei Li, Damith C. Ranasinghe in Applied Cryptography and Network Security (2015)