Skip to main content

and
  1. No Access

    Chapter and Conference Paper

    CNN Architecture Extraction on Edge GPU

    Neural networks have become popular due to their versatility and state-of-the-art results in many applications, such as image classification, natural language processing, speech recognition, forecasting, etc. ...

    Péter Horváth, Lukasz Chmielewski in Applied Cryptography and Network Security … (2024)

  2. No Access

    Chapter and Conference Paper

    Side-Channeling the Kalyna Key Expansion

    In 2015, the block cipher Kalyna has been approved as the new encryption standard of Ukraine. The cipher is a substitution-permutation network, whose design is based on AES, but includes several different feat...

    Chitchanok Chuengsatiansup, Daniel Genkin in Topics in Cryptology – CT-RSA 2022 (2022)

  3. No Access

    Chapter and Conference Paper

    RSA Key Recovery from Digit Equivalence Information

    The seminal work of Heninger and Shacham (Crypto 2009) demonstrated a method for reconstructing secret RSA keys from partial information of the key components. In this paper we further investigate this approa...

    Chitchanok Chuengsatiansup, Andrew Feutrill in Applied Cryptography and Network Security (2022)

  4. No Access

    Chapter and Conference Paper

    Security Architecture Framework for Enterprises

    Security is a complex issue for organisations, with its management now a fiduciary responsibility as well as a moral one. Without a holistic robust security structure that considers human, organisational and t...

    Michelle Graham, Katrina Falkner, Claudia Szabo in Enterprise Information Systems (2021)

  5. No Access

    Article

    A survey of microarchitectural timing attacks and countermeasures on contemporary hardware

    Microarchitectural timing channels expose hidden hardware states though timing. We survey recent attacks that exploit microarchitectural features in shared hardware, especially as they are relevant for cloud c...

    Qian Ge, Yuval Yarom, David Cock, Gernot Heiser in Journal of Cryptographic Engineering (2018)

  6. No Access

    Book and Conference Proceedings

    Security, Privacy, and Applied Cryptography Engineering

    8th International Conference, SPACE 2018, Kanpur, India, December 15-19, 2018, Proceedings

    Anupam Chattopadhyay, Chester Rebeiro in Lecture Notes in Computer Science (2018)

  7. Chapter and Conference Paper

    Drive-By Key-Extraction Cache Attacks from Portable Code

    We show how malicious web content can extract cryptographic secret keys from the user’s computer. The attack uses portable scripting languages supported by modern browsers to induce contention for CPU cache re...

    Daniel Genkin, Lev Pachmanov, Eran Tromer in Applied Cryptography and Network Security (2018)

  8. No Access

    Article

    CacheBleed: a timing attack on OpenSSL constant-time RSA

    The scatter–gather technique is a commonly implemented approach to prevent cache-based timing attacks. In this paper, we show that scatter–gather is not constant time. We implement a cache timing attack agains...

    Yuval Yarom, Daniel Genkin, Nadia Heninger in Journal of Cryptographic Engineering (2017)

  9. Article

    Open Access

    Replacing Sanger with Next Generation Sequencing to improve coverage and quality of reference DNA barcodes for plants

    We estimate the global BOLD Systems database holds core DNA barcodes (rbcL + matK) for about 15% of land plant species and that comprehensive species coverage is still many decades away. Interim performance of th...

    Mike J. Wilkinson, Claudia Szabo, Caroline S. Ford, Yuval Yarom in Scientific Reports (2017)

  10. Chapter and Conference Paper

    Modifying an Enciphering Scheme After Deployment

    Assume that a symmetric encryption scheme has been deployed and used with a secret key. We later must change the encryption scheme in a way that preserves the ability to decrypt (a subset of) previously encryp...

    Paul Grubbs, Thomas Ristenpart, Yuval Yarom in Advances in Cryptology – EUROCRYPT 2017 (2017)

  11. Chapter and Conference Paper

    Sliding Right into Disaster: Left-to-Right Sliding Windows Leak

    It is well known that constant-time implementations of modular exponentiation cannot use sliding windows. However, software libraries such as Libgcrypt, used by GnuPG, continue to use sliding windows. It is wi...

    Daniel J. Bernstein, Joachim Breitner in Cryptographic Hardware and Embedded System… (2017)

  12. Chapter and Conference Paper

    Flush, Gauss, and Reload – A Cache Attack on the BLISS Lattice-Based Signature Scheme

    We present the first side-channel attack on a lattice-based signature scheme, using the Flush+Reload cache-attack. The attack is targeted at the discrete Gaussian sampler, an important step in the Bimodal Lattice...

    Leon Groot Bruinderink, Andreas Hülsing in Cryptographic Hardware and Embedded System… (2016)

  13. Chapter and Conference Paper

    CacheBleed: A Timing Attack on OpenSSL Constant Time RSA

    The scatter-gather technique is a commonly implemented approach to prevent cache-based timing attacks. In this paper we show that scatter-gather is not constant time. We implement a cache timing attack against...

    Yuval Yarom, Daniel Genkin, Nadia Heninger in Cryptographic Hardware and Embedded System… (2016)

  14. No Access

    Chapter and Conference Paper

    Just a Little Bit More

    We extend the Flush+Reload side-channel attack of Benger et al. to extract a significantly larger number of bits of information per observed signature when using OpenSSL. This means that by observing only 25 sign...

    Joop van de Pol, Nigel P. Smart, Yuval Yarom in Topics in Cryptology –- CT-RSA 2015 (2015)

  15. Chapter and Conference Paper

    Evaluation and Cryptanalysis of the Pandaka Lightweight Cipher

    There is a growing need to develop lightweight cryptographic primitives suitable for resource-constrained devices permeating in increasing numbers into the fabric of life. Such devices are exemplified none mor...

    Yuval Yarom, Gefei Li, Damith C. Ranasinghe in Applied Cryptography and Network Security (2015)

  16. Chapter and Conference Paper

    “Ooh Aah... Just a Little Bit” : A Small Amount of Side Channel Can Go a Long Way

    We apply the Flush+Reload side-channel attack based on cache hits/misses to extract a small amount of data from OpenSSL ECDSA signature requests. We then apply a “standard” lattice technique to extract the privat...

    Naomi Benger, Joop van de Pol in Cryptographic Hardware and Embedded System… (2014)