all InfoSec news
An End-to-end Plaintext-based Side-channel Collision Attack without Trace Segmentation
July 17, 2023, 6:54 a.m. |
IACR News www.iacr.org
ePrint Report: An End-to-end Plaintext-based Side-channel Collision Attack without Trace Segmentation
Lichao Wu, Sébastien Tiran, Guilherme Perin, Stjepan Picek
Side-channel Collision Attacks (SCCA) constitute a subset of non-profiling attacks that exploit information dependency leaked during cryptographic operations. Unlike traditional collision attacks, which seek instances where two different inputs to a cryptographic algorithm yield identical outputs, SCCAs specifically target the internal state, where identical outputs are more likely. In CHES 2023, Staib et al. presented a Deep Learning-based SCCA (DL-SCCA), which …
attack attacks channel collision dependency end end-to-end eprint report exploit information inputs leaked non operations plaintext profiling report segmentation side-channel trace
More from www.iacr.org / IACR News
Jobs in InfoSec / Cybersecurity
Consultant infrastructure sécurité H/F
@ Hifield | Sèvres, France
SOC Analyst
@ Wix | Tel Aviv, Israel
Information Security Operations Officer
@ International Labour Organization | Geneva, CH, 1200
PMO Cybersécurité H/F
@ Hifield | Sèvres, France
Third Party Risk Management - Consultant
@ KPMG India | Bengaluru, Karnataka, India
Consultant Cyber Sécurité H/F - Strasbourg
@ Hifield | Strasbourg, France