Skip to main content

and
  1. Chapter and Conference Paper

    Drive-By Key-Extraction Cache Attacks from Portable Code

    We show how malicious web content can extract cryptographic secret keys from the user’s computer. The attack uses portable scripting languages supported by modern browsers to induce contention for CPU cache re...

    Daniel Genkin, Lev Pachmanov, Eran Tromer in Applied Cryptography and Network Security (2018)

  2. No Access

    Chapter and Conference Paper

    ECDH Key-Extraction via Low-Bandwidth Electromagnetic Attacks on PCs

    We present the first physical side-channel attack on elliptic curve cryptography running on a PC. The attack targets the ECDH public-key encryption algorithm, as implemented in the latest version of GnuPG. By ...

    Daniel Genkin, Lev Pachmanov, Itamar Pipman in Topics in Cryptology - CT-RSA 2016 (2016)

  3. Chapter and Conference Paper

    Stealing Keys from PCs Using a Radio: Cheap Electromagnetic Attacks on Windowed Exponentiation

    We present new side-channel attacks on RSA and ElGamal implementations that use sliding-window or fixed-window (m-ary) modular exponentiation. The attacks extract decryption keys using a very low measurement band...

    Daniel Genkin, Lev Pachmanov, Itamar Pipman in Cryptographic Hardware and Embedded System… (2015)