July 17, 2023, 6:54 a.m. |

IACR News www.iacr.org

ePrint Report: An End-to-end Plaintext-based Side-channel Collision Attack without Trace Segmentation

Lichao Wu, Sébastien Tiran, Guilherme Perin, Stjepan Picek


Side-channel Collision Attacks (SCCA) constitute a subset of non-profiling attacks that exploit information dependency leaked during cryptographic operations. Unlike traditional collision attacks, which seek instances where two different inputs to a cryptographic algorithm yield identical outputs, SCCAs specifically target the internal state, where identical outputs are more likely. In CHES 2023, Staib et al. presented a Deep Learning-based SCCA (DL-SCCA), which …

attack attacks channel collision dependency end end-to-end eprint report exploit information inputs leaked non operations plaintext profiling report segmentation side-channel trace

Consultant infrastructure sécurité H/F

@ Hifield | Sèvres, France

SOC Analyst

@ Wix | Tel Aviv, Israel

Information Security Operations Officer

@ International Labour Organization | Geneva, CH, 1200

PMO Cybersécurité H/F

@ Hifield | Sèvres, France

Third Party Risk Management - Consultant

@ KPMG India | Bengaluru, Karnataka, India

Consultant Cyber Sécurité H/F - Strasbourg

@ Hifield | Strasbourg, France