<--- Back to Details
First PageDocument Content
Cryptography / Cache / Computer memory / Advanced Encryption Standard / Side-channel attack / Data Encryption Standard / Cache memory / Lookup table / Cryptanalysis / Tiny Encryption Algorithm / Block cipher / CPU cache
Date: 2009-06-25 15:56:23
Cryptography
Cache
Computer memory
Advanced Encryption Standard
Side-channel attack
Data Encryption Standard
Cache memory
Lookup table
Cryptanalysis
Tiny Encryption Algorithm
Block cipher
CPU cache

Efficient Cache Attacks on AES, and Countermeasures Eran Tromer1 2 , Dag Arne Osvik3 and Adi Shamir2 1 Computer Science and Artificial Intelligence Laboratory, Massachusetts Institute of Technology,

Add to Reading List

Source URL: cs.tau.ac.il

Download Document from Source Website

File Size: 794,91 KB

Share Document on Facebook

Similar Documents

A High-Resolution Side-Channel Attack on Last-Level Cache Mehmet Kayaalp IBM Research   Nael Abu-Ghazaleh

A High-Resolution Side-Channel Attack on Last-Level Cache Mehmet Kayaalp IBM Research Nael Abu-Ghazaleh

DocID: 1uZro - View Document

May the Fourth Be With You: A Microarchitectural Side Channel Attack on Several Real-World Applications of Curve25519 Daniel Genkin Luke Valenta

May the Fourth Be With You: A Microarchitectural Side Channel Attack on Several Real-World Applications of Curve25519 Daniel Genkin Luke Valenta

DocID: 1tJ20 - View Document

BranchScope: A New Side-Channel Attack on Directional Branch Predictor

BranchScope: A New Side-Channel Attack on Directional Branch Predictor

DocID: 1tHEI - View Document

Side-channel Attack Standard Evaluation Board SASEBO-GIII Specification - VersionApril 26, 2013

Side-channel Attack Standard Evaluation Board SASEBO-GIII Specification - VersionApril 26, 2013

DocID: 1tnMc - View Document

Efficient Cache Attacks on AES, and Countermeasures Eran Tromer1 2 , Dag Arne Osvik3 and Adi Shamir2 1 Computer Science and Artificial Intelligence Laboratory, Massachusetts Institute of Technology,

Efficient Cache Attacks on AES, and Countermeasures Eran Tromer1 2 , Dag Arne Osvik3 and Adi Shamir2 1 Computer Science and Artificial Intelligence Laboratory, Massachusetts Institute of Technology,

DocID: 1rolT - View Document