Sofie's notes and trash
88 subscribers
22 photos
14 files
76 links
Download Telegram
ну штош финальные штрихи
🤡3👍21🖕1
🙈
🖕21
prouff_e_renault_g_rivain_m_oflynn_c_embedded_cryptography_1.pdf
25.1 MB
Preface
Software Side-Channel Attacks
Timing Attacks
Microarchitectural Attacks
Hardware Side-Channel Attacks
Leakage and Attack Tools
Supervised Attacks
Unsupervised Attacks
Quantities to Judge Side Channel Resilience
Countermeasures and Advanced Attacks
Mode-Level Side-Channel Countermeasures
Fault Injection Attacks
An Introduction to Fault Injection Attacks
Fault Attacks on Symmetric Cryptography
Fault Attacks on Public-key Cryptographic Algorithms
Fault Countermeasures
List of Authors
Index
prouff_e_renault_g_rivain_m_oflynn_c_embedded_cryptography_2.pdf
17.3 MB
Preface
Masking
Introduction to Masking
Masking Schemes
Hardware Masking
Masking Security Proofs
Masking Verification
Cryptographic Implementations
Hardware Acceleration of Cryptographic Algorithms ..
Constant-Time Implementations
Protected AES Implementations
Protected RSA Implementations
Protected ECC Implementations
Post-Quantum Implementations
Hardware Security
Hardware Reverse Engineering and Invasive Attacks
Gate-Level Protection
Physically Unclonable Functions
List of Authors
Index
prouff_emmanuel_renault_guenael_rivain_mattieu_oflynn_colin.pdf
31.4 MB
+- contents:

Introduction to WhiteBox Cryptography
GrayBox Attacks against
Tools for WhiteBox Cryptanalysis
Code Obfuscation
True Random Number Generation
Pseudorandom Number Generation
Prime Number Generation and RSA Keys
Nonce Generation for Discrete
Random Error Distributions
RealWorld Applications
Security of Automotive Systems
Practical Full Key Recovery on
An Introduction to Intentional Electromagnetic
Attacking IoT Light Bulbs
List of Authors
Index
1🤡1
CVE-2025-31324-Exploits.zip
4.2 KB
SAP NetWeaver Visual Composer Metadata Uploader is not protected with a proper authorization, allowing unauthenticated agent to upload potentially malicious executable binaries that could severely harm the host system. This could significantly affect the confidentiality, integrity, and availability of the targeted system.
When a SSRF is enough: Full Docker Escape on Windows Docker Desktop (CVE-2025-9074)
https://blog.qwertysecurity.com/Articles/blog3.html