Articles with "key recovery" as a keyword



Photo by sharonmccutcheon from unsplash

A Way to Improve the Key Recovery Accuracy Based on Dynamic Programming

Sign Up to like & get
recommendations!
Published in 2018 at "Wuhan University Journal of Natural Sciences"

DOI: 10.1007/s11859-018-1359-1

Abstract: Key-recovery technology is often used by an adversary to attempt to recover the cryptographic key of an encryption scheme. The most obvious key-recovery attack is the exhaustive key-search attack. But modern ciphers often have a… read more here.

Keywords: attack; recovery; way improve; side channel ... See more keywords
Photo by jayson_hinrichsen from unsplash

Cold Boot Attacks on the Supersingular Isogeny Key Encapsulation (SIKE) Mechanism

Sign Up to like & get
recommendations!
Published in 2020 at "Applied Sciences"

DOI: 10.3390/app11010193

Abstract: This research paper evaluates the feasibility of cold boot attacks on the Supersingular Isogeny Key Encapsulation (SIKE) mechanism. This key encapsulation mechanism has been included in the list of alternate candidates of the third round… read more here.

Keywords: sike; key encapsulation; boot attacks; recovery algorithm ... See more keywords