Post-Quantum Cryptography for Embedded Systems: Standards, Performance, and Secure Implementation
As quantum computing advances, the security of traditional cryptographic algorithms like RSA and ECC is increasingly at risk. While quantum computers capable of breaking these algorithms are not ...
Don’t Get Knocked Off the Curve: An Overview of Fault Injection Attacks on Elliptic Curve Cryptosystems
Elliptic curve cryptography (ECC) is ubiquitous and used to secure everything from internet traffic to embedded devices. Fault injection (FI) attacks are a powerful class of attack capable of ...
Exploring genomic sequence alignment for improving side-channel analysis
This paper explores a novel approach to improving Side-Channel Analysis (SCA) alignment, drawing inspiration from molecular biology and employing Multiple Sequence Alignment techniques to align ...
Glitching the Keepkey Crypto Wallet
In this session, we will be glitching the KeepKey Crypto Wallet to illustrate a cyber-attack, meticulously examining the attack's intricacies and the extent of damage an exploitative hacker can cause.
Lowering the bar: deep learning for side-channel analysis
We show we can break a lightly protected AES, an AES implementation with masking countermeasures and a protected ECC implementation using Deep Learning.
Fast and Memory-Efficient Key Recovery in Side-Channel Attacks
This work aims to bridge the gap between theory and practice in key enumeration and puts forward the importance of the practical metrics for estimating implementation attack complexity.
Unboxing the White-Box
This publication discusses the nuances and challenges associated with white-box testing methodologies and looks at practical attacks against obfuscated ciphers.