-
Chapter and Conference Paper
Side-Channel Analysis on Lattice-Based KEM Using Multi-feature Recognition - The Case Study of Kyber
Kyber, selected as the next-generation standard for key encapsulation mechanism in the third round of the NIST post-quantum cryptography standardization process, has naturally raised concerns regarding its res...
-
Chapter and Conference Paper
A Command-Activated Hardware Trojan Detection Method Based on LUNAR Framework
Hardware Trojans have become a major challenge to ICs due to their serious damage to the reliability and security. However, hardware Trojans can be activated in a variety of ways, making accurate activation of...
-
Article
Improved attacks against reduced-round Whirlwind
The Whirlwind hash function was proposed by Barreto et al. (Des Codes Cryptogr 56(2–3):141–162, 2010, https://doi.org/10.1007/s10623-010-9391-y). In this paper, we...
-
Chapter and Conference Paper
Using Convolutional Neural Network to Redress Outliers in Clustering Based Side-Channel Analysis on Cryptosystem
Blockchain, designed with cryptographic technology, is widely used in the financial area, such as digital billing and cross-border payments. Digital signature is the core technology in it. However, digital sig...
-
Chapter and Conference Paper
Preimage Attacks on 4-Round Keccak by Solving Multivariate Quadratic Systems
In this paper, we present preimage attacks on 4-round Keccak-224/256 as well as 4-round Keccak[ \(r = 640,c = 160,l = 80\) ...
-
Chapter and Conference Paper
Automatic Classical and Quantum Rebound Attacks on AES-Like Hashing by Exploiting Related-Key Differentials
Collision attacks on AES-like hashing (hash functions constructed by plugging AES-like ciphers or permutations into the famous PGV modes or their variants) can be reduced to the problem of finding a pair of in...