Timing attacks are among the most devastating side-channel attacks, allowing remote attackers to retrieve secret material, including cryptographic keys, with relative ease. In …
A Geimer, M Vergnolle, F Recoules, LA Daniel… - Proceedings of the …, 2023 - dl.acm.org
To protect cryptographic implementations from side-channel vulnerabilities, developers must adopt constant-time programming practices. As these can be error-prone, many side …
F Hao, PC van Oorschot - Proceedings of the 2022 ACM on Asia …, 2022 - dl.acm.org
Password-authenticated key exchange (PAKE) is a major area of cryptographic protocol research and practice. Many PAKE proposals have emerged in the 30 years following the …
Cryptography secures our online interactions, transactions, and trust. To achieve this goal, not only do the cryptographic primitives and protocols need to be secure in theory, they also …
Wi-Fi devices routinely queue frames at various layers of the network stack before transmitting, for instance, when the receiver is in sleep mode. In this work, we investigate …
M Vanhoef - Proceedings of the 9th ACM on ASIA Public-Key …, 2022 - dl.acm.org
To increase the security of Wi-Fi hotspots, the Wi-Fi Alliance released the SAE-PK (Simultaneous Authentication of Equals-Public Key) protocol in December 2020. In this …
Protocols for password-based authenticated key exchange (PAKE) allow two users sharing only a short, low-entropy password to establish a secure session with a cryptographically …
M Vanhoef, J Robben - … Conference on Applied Cryptography and Network …, 2024 - Springer
Abstract Creating secure Wi-Fi hotspots has historically been challenging: when using an open network it is trivial for an adversary to eavesdrop traffic. Alternatively, when using a …
M Wang, F Zheng, J Lin, F Jiang… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Numerous cache side-channel attack techniques enable attackers to execute a cross-VM cache side-channel attack through the sharing of code pages with the targeted victim …