Skip to content

Single-Trace Side-Channel Attack on SEAL Homomorphic Encryption Library

Photo of Rand Hindi
Hosted By
Rand H. and Jeremy Z.
Single-Trace Side-Channel Attack on SEAL Homomorphic Encryption Library

Details

# Abstract

In this talk, Furkan will talk about the first side-channel attack on homomorphic encryption, which allows computing on encrypted data.

The attack targets the Gaussian sampling in the SEAL's encryption phase and can extract the entire secret message with a single power measurement.

# About the speaker

Furkan Aydin is pursuing a Ph.D. in Electrical and Computer Engineering at North Carolina State University (NC State) under the guidance of Dr. Aydin Aysu.

He is a member of HECTOR - Hardware and Embedded Cyber-Threat Research lab at NC State.

His research interests include the areas of side-channel attacks, countermeasures, and implementation of cryptographic algorithms.

# Link

https://zama-ai.zoom.us/j/81793675423

# Never miss an update

  1. The newsletter where we will post announcements: https://fheorg.substack.com/
  2. The discord server where you can discuss FHE related topics with the community: https://discord.fhe.org

Make sure to join either (or both) of these to stay informed about future events!

Photo of FHE.org - Homomorphic Encryption & Secure Computation group
FHE.org - Homomorphic Encryption & Secure Computation
See more events