Cryptographic competitions

DJ Bernstein - Journal of Cryptology, 2024 - Springer
Cryptographic Competitions | Journal of Cryptology Skip to main content SpringerLink Account
Menu Find a journal Publish with us Search Cart 1.Home 2.Journal of Cryptology 3.Article …

The gates of time: Improving cache attacks with transient execution

D Katzman, W Kosasih, C Chuengsatiansup… - 32nd USENIX Security …, 2023 - usenix.org
For over two decades, cache attacks have been shown to pose a significant risk to the
security of computer systems. In particular, a large number of works show that cache attacks …

A systematic evaluation of automated tools for side-channel vulnerabilities detection in cryptographic libraries

A Geimer, M Vergnolle, F Recoules, LA Daniel… - Proceedings of the …, 2023 - dl.acm.org
To protect cryptographic implementations from side-channel vulnerabilities, developers must
adopt constant-time programming practices. As these can be error-prone, many side …

Don't mesh around:{Side-Channel} attacks and mitigations on mesh interconnects

M Dai, R Paccagnella, M Gomez-Garcia… - 31st USENIX Security …, 2022 - usenix.org
This paper studies microarchitectural side-channel attacks and mitigations on the on-chip
mesh interconnect used in modern, server-class Intel processors. We find that, though …

Spook. js: Attacking Chrome strict site isolation via speculative execution

A Agarwal, S O'Connell, J Kim… - … IEEE Symposium on …, 2022 - ieeexplore.ieee.org
The discovery of the Spectre attack in 2018 has sent shockwaves through the computer
industry, affecting processor vendors, OS providers, programming language developers …

Checking Passwords on Leaky Computers: A Side Channel Analysis of Chrome's Password Leak Detect Protocol

A Kwong, W Wang, J Kim, J Berger, D Genkin… - 32nd USENIX Security …, 2023 - usenix.org
The scale and frequency of password database compromises has led to widespread and
persistent credential stuffing attacks, in which attackers attempt to use credentials leaked …

With Great Power Come Great Side Channels: Statistical Timing {Side-Channel} Analyses with Bounded Type-1 Errors

M Dunsche, M Maehren, N Erinola, R Merget… - 33rd USENIX Security …, 2024 - usenix.org
Constant-time implementations are essential to guarantee the security of secret-key
operations. According to Jancar et al.[42], most cryptographic developers do not use …

Bending microarchitectural weird machines towards practicality

PL Wang, R Paccagnella, RS Wahby… - 33rd USENIX Security …, 2024 - usenix.org
A large body of work has demonstrated attacks that rely on the difference between CPUs'
nominal instruction set architectures and their actual (microarchitectural) implementations …

Screen gleaning: A screen reading TEMPEST attack on mobile devices exploiting an electromagnetic side channel

Z Liu, N Samwel, L Weissbart, Z Zhao, D Lauret… - arXiv preprint arXiv …, 2020 - arxiv.org
We introduce screen gleaning, a TEMPEST attack in which the screen of a mobile device is
read without a visual line of sight, revealing sensitive information displayed on the phone …

Modelling cryptographic distinguishers using machine learning

C Brunetta, P Picazo-Sanchez - Journal of Cryptographic Engineering, 2022 - Springer
Cryptanalysis is the development and study of attacks against cryptographic primitives and
protocols. Many cryptographic properties rely on the difficulty of generating an adversary …