TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

Side channel attacks against ECDSA/EdDSA signature generation in smart cards

10 点作者 HugoHobling超过 5 年前

1 comment

nullc超过 5 年前
It would be nice if these reports also listed implementations they analyzed carefully and concluded were not likely vulnerable.<p>In this case, they do show openssl-- but it&#x27;s burred under a generic titled click through. I would guess they also found other apparently secure implementations, but none are listed.<p>Providing this information would have several benefits:<p>(1) People could look and the correct implementations and learn what choices they made which helped them avoid the issue.<p>(2) The incentive for making secure implementations would be increased.<p>(3) Effort could be conserved in identifying already correct implementations. In particular, correct implementations get asked over and over again if they&#x27;re vulnerable ... and it can be a bit exposed-feeling to give an emphatic &#x27;no&#x27; without the benefit of the assistance of the researchers and their test setup.<p>Also, if an error was made in identifying a correct implementation, then someone writing another paper refuting the that sub-result would likely have an easier time getting published than someone who just did the same attack against more implementations-- increasing the incentive to continue this line of research.<p>Anyone know why they bother listing github &quot;stars&quot; on the vulnerable software list?
评论 #21150218 未加载