- Home
- Search Results
- Page 1 of 1
Search for: All records
-
Total Resources3
- Resource Type
-
0003000000000000
- More
- Availability
-
21
- Author / Contributor
- Filter by Author / Creator
-
-
Dang, Thinh (3)
-
Genkin, Daniel (3)
-
Kippen, Hunter (3)
-
Kwong, Andrew (3)
-
Nelson, Alexander (3)
-
Yerukhimovich, Arkady (3)
-
Apon, Daniel (2)
-
Dachman-Soled, Dana (2)
-
Lichtinger, Jacob (2)
-
Perlner, Ray (2)
-
Amer, Samy (1)
-
Fahr Jr, Michael (1)
-
Fahr, Michael (1)
-
Wang, Yingchen (1)
-
#Tyler Phillips, Kenneth E. (0)
-
#Willis, Ciara (0)
-
& Abreu-Ramos, E. D. (0)
-
& Abramson, C. I. (0)
-
& Abreu-Ramos, E. D. (0)
-
& Adams, S.G. (0)
-
- Filter by Editor
-
-
& Spizer, S. M. (0)
-
& . Spizer, S. (0)
-
& Ahn, J. (0)
-
& Bateiha, S. (0)
-
& Bosch, N. (0)
-
& Brennan K. (0)
-
& Brennan, K. (0)
-
& Chen, B. (0)
-
& Chen, Bodong (0)
-
& Drown, S. (0)
-
& Ferretti, F. (0)
-
& Higgins, A. (0)
-
& J. Peters (0)
-
& Kali, Y. (0)
-
& Ruiz-Arias, P.M. (0)
-
& S. Spitzer (0)
-
& Sahin. I. (0)
-
& Spitzer, S. (0)
-
& Spitzer, S.M. (0)
-
(submitted - in Review for IEEE ICASSP-2024) (0)
-
-
Have feedback or suggestions for a way to improve these results?
!
Note: When clicking on a Digital Object Identifier (DOI) number, you will be taken to an external site maintained by the publisher.
Some full text articles may not yet be available without a charge during the embargo (administrative interval).
What is a DOI Number?
Some links on this page may take you to non-federal websites. Their policies may differ from this site.
-
As post-quantum cryptography (PQC) nears standardization and eventual deployment, it is increasingly important to understand the security of the implementations of selected schemes. In this paper, we conduct such an investigation, uncovering concerning findings about many of the finalists of the NIST PQC standardization competition. Specifically, we show Rowhammer-based attacks on the Kyber and BIKE Key Exchange Mechanisms and the Dilithium Digital Signature scheme that enable complete recovery of the secret key with only a moderate amount of effort – no supercomputers, or months of precomputation. Moreover, we experimentally carry out our attacks using a combination of Rowhammer, performance degradation, and memory massaging techniques, showing that our attacks are practically feasible. Our results show that such side-channel based attacks are a critical concern and need to be considered when new cryptographic schemes are standardized, when standard implementations are developed, and when instances are deployed. We conclude with recommendations on implementation techniques that harden cryptographic schemes against Rowhammer attacks.more » « lessFree, publicly-accessible full text available November 4, 2025
-
Fahr, Michael; Kippen, Hunter; Kwong, Andrew; Dang, Thinh; Lichtinger, Jacob; Dachman-Soled, Dana; Genkin, Daniel; Nelson, Alexander; Perlner, Ray; Yerukhimovich, Arkady; et al (, Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security)
-
Fahr Jr, Michael; Kippen, Hunter; Kwong, Andrew; Dang, Thinh; Lichtinger, Jacob; Dachman-Soled, Dana; Genkin, Daniel; Nelson, Alexander; Perlner, Ray; Yerukhimovich, Arkady; et al (, ACM Conference on Computer Security)
An official website of the United States government

Full Text Available