Skip to main content
European Commission logo
español español
CORDIS - Resultados de investigaciones de la UE
CORDIS

Side-Channel Aware Engineering

Resultado final

Publicaciones

Set It and Forget It! Turnkey ECC for Instant Integration

Autores: Dmitry Belyavsky, Billy Bob Brumley, Jesús-Javier Chi-Domínguez, Luis Rivera-Zamarripa, Igor Ustinov
Publicado en: Annual Computer Security Applications Conference, 2020, Página(s) 760-771, ISBN 9781450388580
Editor: ACM
DOI: 10.1145/3427228.3427291

Size, Speed, and Security: An Ed25519 Case Study

Autores: Cesar Pereida García, Sampo Sovio
Publicado en: Secure IT Systems - 26th Nordic Conference, NordSec 2021, Edición LNCS 13115, 2021
Editor: Springer
DOI: 10.1007/978-3-030-91625-1_2

Attestation Waves: Platform Trust via Remote Power Analysis

Autores: Ignacio M. Delgado-Lozano, Macarena C. Martínez-Rodríguez, Alexandros Bakas, Billy Bob Brumley, Antonis Michalas
Publicado en: Cryptology and Network Security - 20th International Conference, CANS 2021, Edición LNCS 13099, 2021, ISBN 978-3-030-92547-5
Editor: Springer
DOI: 10.1007/978-3-030-92548-2_24

Déjà Vu: Side-Channel Analysis of Mozilla's NSS

Autores: Sohaib ul Hassan, Iaroslav Gridin, Ignacio M. Delgado-Lozano, Cesar Pereida García, Jesús-Javier Chi-Domínguez, Alejandro Cabrera Aldaya, Billy Bob Brumley
Publicado en: Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020, Página(s) 1887-1902, ISBN 9781450370899
Editor: ACM
DOI: 10.1145/3372297.3421761

Start Your ENGINEs: Dynamically Loadable Contemporary Crypto

Autores: Nicola Tuveri, Billy Bob Brumley
Publicado en: 2019 IEEE Cybersecurity Development (SecDev), 2019, Página(s) 4-19, ISBN 978-1-5386-7289-1
Editor: IEEE
DOI: 10.1109/secdev.2019.00014

Port Contention for Fun and Profit

Autores: Alejandro Cabrera Aldaya, Billy Bob Brumley, Sohaib ul Hassan, Cesar Pereida Garcia, Nicola Tuveri
Publicado en: 2019 IEEE Symposium on Security and Privacy (SP), 2019, Página(s) 870-887, ISBN 978-1-5386-6660-9
Editor: IEEE
DOI: 10.1109/sp.2019.00066

Certified Side Channels

Autores: Cesar Pereida García, Sohaib ul Hassan, Nicola Tuveri, Iaroslav Gridin, Alejandro Cabrera Aldaya, and Billy Bob Brumley
Publicado en: Proceedings of the 29th USENIX Security Symposium, 2020
Editor: USENIX Association

A Formula for Disaster: A Unified Approach to Elliptic Curve Special-Point-Based Attacks

Autores: Vladimir Sedlacek, Jesús-Javier Chi-Domínguez, Jan Jancar, Billy Bob Brumley
Publicado en: Advances in Cryptology - ASIACRYPT 2021 - 27th International Conference on the Theory and Application of Cryptology and Information Security, Edición LNCS 13090, 2021
Editor: Springer
DOI: 10.1007/978-3-030-92062-3_5

Fully Projective Radical Isogenies in Constant-Time

Autores: Jesús-Javier Chi-Domínguez, Krijn Reijnders
Publicado en: Topics in Cryptology - CT-RSA 2022 - Cryptographers' Track at the RSA Conference 2022, Virtual Event, March 1-2, 2022, Proceedings, Edición LNCS 13161, 2022
Editor: Springer
DOI: 10.1007/978-3-030-95312-6_4

SoK: Remote Power Analysis

Autores: Macarena C. Martínez-Rodríguez; Ignacio M. Delgado-Lozano; Billy Bob Brumley
Publicado en: ARES 2021: The 16th International Conference on Availability, Reliability and Security, 2021
Editor: ACM
DOI: 10.1145/3465481.3465773

Implementation of RSA Signatures on GPU and CPU Architectures

Autores: Eduardo Ochoa-Jiménez, Luis Rivera-Zamarripa, Nareli Cruz Cortés, Francisco Rodríguez-Henríquez
Publicado en: IEEE Access, Edición 8, 2020, ISSN 2169-3536
Editor: Institute of Electrical and Electronics Engineers Inc.
DOI: 10.1109/access.2019.2963826

Extending the GLS endomorphism to speed up GHS Weil descent using Magma

Autores: Jesús-Javier Chi-Domínguez, Francisco Rodríguez-Henríquez, Benjamin Smith
Publicado en: Finite Fields Their Appl., Edición 75, 2021, ISSN 1071-5797
Editor: Academic Press
DOI: 10.1016/j.ffa.2021.101891

Optimal strategies for CSIDH

Autores: Jesús-Javier Chi-Domínguez, Francisco Rodríguez-Henríquez
Publicado en: Advances in Mathematics of Communications, Edición 16:2, 2022, ISSN 1930-5346
Editor: American Institute of Mathematical Sciences
DOI: 10.3934/amc.2020116

Projection of Dual-Rail DPA Countermeasures in Future FinFET and Emerging TFET Technologies

Autores: Ignacio M. Delgado-Lozano, Erica Tena-Sánchez, Juan Núñez, Antonio J. Acosta
Publicado en: ACM J. Emerg. Technol. Comput. Syst., Edición 16:3, 2020, ISSN 1550-4832
Editor: Association for Computing Machinary, Inc.
DOI: 10.1145/3381857

Design and Analysis of Secure Emerging Crypto-Hardware Using HyperFET Devices

Autores: Ignacio M. Delgado-Lozano, Erica Tena-Sánchez, Juan Núñez, Antonio J. Acosta
Publicado en: IEEE Trans. Emerg. Top. Comput., Edición 9:2, 2021, ISSN 2168-6750
Editor: IEEE Computer Society
DOI: 10.1109/tetc.2020.2977735

When one vulnerable primitive turns viral: Novel single-trace attacks on ECDSA and RSA

Autores: Alejandro Cabrera Aldaya, Billy Bob Brumley
Publicado en: IACR Trans. Cryptogr. Hardw. Embed. Syst., Edición 2020:2, 2020, Página(s) 196-221, ISSN 2569-2925
Editor: Ruhr-Universität Bochum
DOI: 10.13154/tches.v2020.i2.196-221

From A to Z: Projective coordinates leakage in the wild

Autores: Alejandro Cabrera Aldaya, Cesar Pereida García, Billy Bob Brumley
Publicado en: IACR Trans. Cryptogr. Hardw. Embed. Syst., Edición 2020:3, 2020, Página(s) 428-453, ISSN 2569-2925
Editor: Ruhr-Universität Bochum
DOI: 10.13154/tches.v2020.i3.428-453

Memory Tampering Attack on Binary GCD Based Inversion Algorithms

Autores: Alejandro Cabrera Aldaya, Billy Bob Brumley, Alejandro J. Cabrera Sarmiento, Santiago Sánchez-Solano
Publicado en: International Journal of Parallel Programming, Edición 47/4, 2019, Página(s) 621-640, ISSN 0885-7458
Editor: Kluwer Academic Publishers
DOI: 10.1007/s10766-018-0610-x

Cache-Timing Attacks on RSA Key Generation

Autores: Alejandro Cabrera Aldaya, Cesar Pereida García, Luis Manuel Alvarez Tapia
Publicado en: IACR Trans. Cryptogr. Hardw. Embed. Syst., Edición 2019:4, 2019, Página(s) 213-242, ISSN 2569-2925
Editor: Ruhr-Universität Bochum
DOI: 10.13154/tches.v2019.i4.213-242

The SQALE of CSIDH: sublinear Vélu quantum-resistant isogeny action with low exponents

Autores: Jorge Chávez-Saab; Jesús-Javier Chi-Domínguez; Samuel Jaques; Francisco Rodríguez-Henríquez
Publicado en: Journal of Cryptographic Engineering, 2021, ISSN 2190-8508
Editor: Springer Science + Business Media
DOI: 10.1007/s13389-021-00271-w

Online Template Attacks: Revisited

Autores: Alejandro Cabrera Aldaya; Billy Bob Brumley
Publicado en: IACR Transactions on Cryptographic Hardware and Embedded Systems, Edición 2021:3, 2021, ISSN 2569-2925
Editor: Ruhr-Universität Bochum
DOI: 10.46586/tches.v2021.i3.28-59

Batch Binary Weierstrass

Autores: Billy Bob Brumley, Sohaib ul Hassan, Alex Shaindlin, Nicola Tuveri, Kide Vuojärvi
Publicado en: Progress in Cryptology – LATINCRYPT 2019 - 6th International Conference on Cryptology and Information Security in Latin America, Santiago de Chile, Chile, October 2–4, 2019, Proceedings, Edición 11774, 2019, Página(s) 364-384, ISBN 978-3-030-30529-1
Editor: Springer International Publishing
DOI: 10.1007/978-3-030-30530-7_18

Triggerflow: Regression Testing by Advanced Execution Path Inspection

Autores: Iaroslav Gridin, Cesar Pereida García, Nicola Tuveri, Billy Bob Brumley
Publicado en: Detection of Intrusions and Malware, and Vulnerability Assessment - 16th International Conference, DIMVA 2019, Gothenburg, Sweden, June 19–20, 2019, Proceedings, Edición 11543, 2019, Página(s) 330-350, ISBN 978-3-030-22037-2
Editor: Springer International Publishing
DOI: 10.1007/978-3-030-22038-9_16

Buscando datos de OpenAIRE...

Se ha producido un error en la búsqueda de datos de OpenAIRE

No hay resultados disponibles