Cryptography

Post-Quantum Cryptography for Embedded Systems: Standards, Performance, and Secure Implementation

Post-Quantum Cryptography for Embedded Systems: Standards, Performance, and Secure Implementation

As quantum computing advances, the security of traditional cryptographic algorithms like RSA and ECC is increasingly at risk. While quantum computers capable of breaking these algorithms are not ...
Don’t Get Knocked Off the Curve: An Overview of Fault Injection Attacks on Elliptic Curve Cryptosystems

Don’t Get Knocked Off the Curve: An Overview of Fault Injection Attacks on Elliptic Curve Cryptosystems

Elliptic curve cryptography (ECC) is ubiquitous and used to secure everything from internet traffic to embedded devices. Fault injection (FI) attacks are a powerful class of attack capable of ...
Exploring genomic sequence alignment for improving side-channel analysis

Exploring genomic sequence alignment for improving side-channel analysis

This paper explores a novel approach to improving Side-Channel Analysis (SCA) alignment, drawing inspiration from molecular biology and employing Multiple Sequence Alignment techniques to align ...
Glitching the Keepkey Crypto Wallet

Glitching the Keepkey Crypto Wallet

In this session, we will be glitching the KeepKey Crypto Wallet to illustrate a cyber-attack, meticulously examining the attack's intricacies and the extent of damage an exploitative hacker can cause.
Lowering the bar: deep learning for side-channel analysis

Lowering the bar: deep learning for side-channel analysis

We show we can break a lightly protected AES, an AES implementation with masking countermeasures and a protected ECC implementation using Deep Learning.
Fast and Memory-Efficient Key Recovery in Side-Channel Attacks

Fast and Memory-Efficient Key Recovery in Side-Channel Attacks

This work aims to bridge the gap between theory and practice in key enumeration and puts forward the importance of the practical metrics for estimating implementation attack complexity.
Unboxing the White-Box

Unboxing the White-Box

This publication discusses the nuances and challenges associated with white-box testing methodologies and looks at practical attacks against obfuscated ciphers.