First Page | Document Content | |
---|---|---|
Date: 2015-11-30 11:00:03NIST hash function competition SHA-3 Power analysis Institute for Applied Information Processing and Communications Cryptography Side-channel attack Algorithm Mathematics Science and technology Science | Parallel vs. Sequential Computations Do they Leak the Same? Advisor(s): Thomas Korak and Hannes Groß Institute for Applied Information Processing and Communications (IAIK) Graz University of Technology, AustriaAdd to Reading ListSource URL: www.iaik.tugraz.atDownload Document from Source WebsiteFile Size: 223,65 KBShare Document on Facebook |
A High-Resolution Side-Channel Attack on Last-Level Cache Mehmet Kayaalp IBM Research Nael Abu-GhazalehDocID: 1uZro - View Document | |
May the Fourth Be With You: A Microarchitectural Side Channel Attack on Several Real-World Applications of Curve25519 Daniel Genkin Luke ValentaDocID: 1tJ20 - View Document | |
BranchScope: A New Side-Channel Attack on Directional Branch PredictorDocID: 1tHEI - View Document | |
Side-channel Attack Standard Evaluation Board SASEBO-GIII Specification - VersionApril 26, 2013DocID: 1tnMc - View Document | |
Efficient Cache Attacks on AES, and Countermeasures Eran Tromer1 2 , Dag Arne Osvik3 and Adi Shamir2 1 Computer Science and Artificial Intelligence Laboratory, Massachusetts Institute of Technology,DocID: 1rolT - View Document |