CipherH: Automated Detection of Ciphertext Side-channel Vulnerabilities in Cryptographic Implementations.
Sen DengMengyuan LiYining TangShuai WangShoumeng YanYinqian ZhangPublished in: USENIX Security Symposium (2023)
Keyphrases
- automated detection
- ciphertext
- secret key
- encryption scheme
- smart card
- information security
- countermeasures
- public key encryption
- secure communication
- standard model
- security mechanisms
- automated analysis
- cca secure
- hash functions
- key management
- s box
- public key
- proxy re encryption
- security analysis
- lung cancer
- authentication scheme
- digital signature
- diffie hellman
- security issues
- security requirements
- encryption algorithm
- private key
- power analysis
- security properties
- public key cryptosystem
- similarity search
- data sharing
- low cost
- lossless compression