<--- Back to Details
First PageDocument Content
Cryptography / Modular arithmetic / Cryptographic software / E-commerce / OpenSSL / RSA / Public-key cryptography / Modular exponentiation / Montgomery modular multiplication / Timing attack / Side-channel attack / Data Encryption Standard
Date: 2014-05-29 15:38:01
Cryptography
Modular arithmetic
Cryptographic software
E-commerce
OpenSSL
RSA
Public-key cryptography
Modular exponentiation
Montgomery modular multiplication
Timing attack
Side-channel attack
Data Encryption Standard

Remote Timing Attacks are Practical David Brumley Stanford University Abstract Timing attacks are usually used to attack weak computing devices such as smartcards. We show that timing

Add to Reading List

Source URL: users.ece.cmu.edu

Download Document from Source Website

File Size: 144,22 KB

Share Document on Facebook

Similar Documents

A High-Resolution Side-Channel Attack on Last-Level Cache Mehmet Kayaalp IBM Research   Nael Abu-Ghazaleh

A High-Resolution Side-Channel Attack on Last-Level Cache Mehmet Kayaalp IBM Research Nael Abu-Ghazaleh

DocID: 1uZro - View Document

May the Fourth Be With You: A Microarchitectural Side Channel Attack on Several Real-World Applications of Curve25519 Daniel Genkin Luke Valenta

May the Fourth Be With You: A Microarchitectural Side Channel Attack on Several Real-World Applications of Curve25519 Daniel Genkin Luke Valenta

DocID: 1tJ20 - View Document

BranchScope: A New Side-Channel Attack on Directional Branch Predictor

BranchScope: A New Side-Channel Attack on Directional Branch Predictor

DocID: 1tHEI - View Document

Side-channel Attack Standard Evaluation Board SASEBO-GIII Specification - VersionApril 26, 2013

Side-channel Attack Standard Evaluation Board SASEBO-GIII Specification - VersionApril 26, 2013

DocID: 1tnMc - View Document

Efficient Cache Attacks on AES, and Countermeasures Eran Tromer1 2 , Dag Arne Osvik3 and Adi Shamir2 1 Computer Science and Artificial Intelligence Laboratory, Massachusetts Institute of Technology,

Efficient Cache Attacks on AES, and Countermeasures Eran Tromer1 2 , Dag Arne Osvik3 and Adi Shamir2 1 Computer Science and Artificial Intelligence Laboratory, Massachusetts Institute of Technology,

DocID: 1rolT - View Document