Skip to main content

Showing 1–3 of 3 results for author: Wisiol, N

.
  1. arXiv:2208.08906  [pdf, other

    physics.optics

    Exploiting structural nonlinearity of a reconfigurable multiple-scattering system

    Authors: Yaniv Eliezer, Ulrich Ruhrmair, Nils Wisiol, Stefan Bittner, Hui Cao

    Abstract: Nonlinear optics is a rapidly growing field that has found a wide range of applications. A major limitation, however, is the demand of high power, especially for high-order nonlinearities. Here, by reconfiguring a multiple-scattering system, we introduce 'structural nonlinearity' via a nonlinear map** between the scattering potential and the output light. Experimentally we demonstrate high-order… ▽ More

    Submitted 18 August, 2022; originally announced August 2022.

  2. Oh SSH-it, what's my fingerprint? A Large-Scale Analysis of SSH Host Key Fingerprint Verification Records in the DNS

    Authors: Sebastian Neef, Nils Wisiol

    Abstract: The SSH protocol is commonly used to access remote systems on the Internet, as it provides an encrypted and authenticated channel for communication. If upon establishing a new connection, the presented server key is unknown to the client, the user is asked to verify the key fingerprint manually, which is prone to errors and often blindly trusted. The SSH standard describes an alternative to such m… ▽ More

    Submitted 23 November, 2022; v1 submitted 18 August, 2022; originally announced August 2022.

    Comments: Preprint; submitted to CANS 2022; accepted at CANS 2022 and published in Springer LNCS vol 13641

    Journal ref: In: Beresford, A.R., Patra, A., Bellini, E. (eds) Cryptology and Network Security. CANS 2022. Lecture Notes in Computer Science, vol 13641. Springer, Cham

  3. Machine-Learning Side-Channel Attacks on the GALACTICS Constant-Time Implementation of BLISS

    Authors: Soundes Marzougui, Nils Wisiol, Patrick Gersch, Juliane Krämer, Jean-Pierre Seifert

    Abstract: Due to the advancing development of quantum computers, practical attacks on conventional public-key cryptography may become feasible in the next few decades. To address this risk, post-quantum schemes that are secure against quantum attacks are being developed. Lattice-based algorithms are promising replacements for conventional schemes, with BLISS being one of the earliest post-quantum signatur… ▽ More

    Submitted 8 June, 2022; v1 submitted 20 September, 2021; originally announced September 2021.

    Comments: 23 pages, 4 Figures, 7 algorithms

    Journal ref: The 17th International Conference on Availability, Reliability and Security (ARES 2022), August 23--26, 2022, Vienna, Austria