all InfoSec news
An End-to-end Plaintext-based Side-channel Collision Attack without Trace Segmentation
July 17, 2023, 6:54 a.m. |
IACR News www.iacr.org
ePrint Report: An End-to-end Plaintext-based Side-channel Collision Attack without Trace Segmentation
Lichao Wu, Sébastien Tiran, Guilherme Perin, Stjepan Picek
Side-channel Collision Attacks (SCCA) constitute a subset of non-profiling attacks that exploit information dependency leaked during cryptographic operations. Unlike traditional collision attacks, which seek instances where two different inputs to a cryptographic algorithm yield identical outputs, SCCAs specifically target the internal state, where identical outputs are more likely. In CHES 2023, Staib et al. presented a Deep Learning-based SCCA (DL-SCCA), which …
attack attacks channel collision dependency end end-to-end eprint report exploit information inputs leaked non operations plaintext profiling report segmentation side-channel trace
More from www.iacr.org / IACR News
Compact Key Storage: A Modern Approach to Key Backup and Delegation
1 day, 17 hours ago |
www.iacr.org
Quantum Evolving Secret Sharing for General Access Structures
1 day, 17 hours ago |
www.iacr.org
Preliminary Analysis of Ascon-Xof and Ascon-Hash
1 day, 17 hours ago |
www.iacr.org
PhD Student in Cryptography
1 day, 21 hours ago |
www.iacr.org
Jobs in InfoSec / Cybersecurity
CyberSOC Technical Lead
@ Integrity360 | Sandyford, Dublin, Ireland
Cyber Security Strategy Consultant
@ Capco | New York City
Cyber Security Senior Consultant
@ Capco | Chicago, IL
Senior Security Researcher - Linux MacOS EDR (Cortex)
@ Palo Alto Networks | Tel Aviv-Yafo, Israel
Sr. Manager, NetSec GTM Programs
@ Palo Alto Networks | Santa Clara, CA, United States
SOC Analyst I
@ Fortress Security Risk Management | Cleveland, OH, United States