<--- Back to Details
First PageDocument Content
Cryptography / E-commerce / Cryptographic software / RSA / OpenSSL / Modular arithmetic / Timing attack / Side-channel attack / Montgomery modular multiplication / David Brumley / Karatsuba algorithm / Data Encryption Standard
Date: 2014-05-29 15:38:01
Cryptography
E-commerce
Cryptographic software
RSA
OpenSSL
Modular arithmetic
Timing attack
Side-channel attack
Montgomery modular multiplication
David Brumley
Karatsuba algorithm
Data Encryption Standard

Computer Networks–716 www.elsevier.com/locate/comnet Remote timing attacks are practical David Brumley a

Add to Reading List

Source URL: users.ece.cmu.edu

Download Document from Source Website

File Size: 388,16 KB

Share Document on Facebook

Similar Documents

An Empirical Study of Cryptographic Misuse in Android Applications Manuel Egele, David Brumley Yanick Fratantonio, Christopher Kruegel

An Empirical Study of Cryptographic Misuse in Android Applications Manuel Egele, David Brumley Yanick Fratantonio, Christopher Kruegel

DocID: 1uSpX - View Document

Remote Timing Attacks are Practical David Brumley Stanford University  Abstract Timing attacks are usually used to attack weak computing devices such as smartcards. We show that timing

Remote Timing Attacks are Practical David Brumley Stanford University Abstract Timing attacks are usually used to attack weak computing devices such as smartcards. We show that timing

DocID: 1uDcN - View Document

AEG: Automatic Exploit Generation Thanassis Avgerinos, Sang Kil Cha, Brent Lim Tze Hao and David Brumley Carnegie Mellon University, Pittsburgh, PA {thanassis, sangkilc, brentlim, dbrumley}@cmu.edu  Abstract

AEG: Automatic Exploit Generation Thanassis Avgerinos, Sang Kil Cha, Brent Lim Tze Hao and David Brumley Carnegie Mellon University, Pittsburgh, PA {thanassis, sangkilc, brentlim, dbrumley}@cmu.edu Abstract

DocID: 1sGTI - View Document

Alias Analysis for Assembly  David Brumley and James Newsome December 15, 2006 CMU-CS-06-180R

Alias Analysis for Assembly David Brumley and James Newsome December 15, 2006 CMU-CS-06-180R

DocID: 1svwo - View Document

All You Ever Wanted to Know About Dynamic Taint Analysis and Forward Symbolic Execution (but might have been afraid to ask) Edward J. Schwartz, Thanassis Avgerinos, David Brumley Carnegie Mellon University Pittsburgh, PA

All You Ever Wanted to Know About Dynamic Taint Analysis and Forward Symbolic Execution (but might have been afraid to ask) Edward J. Schwartz, Thanassis Avgerinos, David Brumley Carnegie Mellon University Pittsburgh, PA

DocID: 1ssUT - View Document