<--- Back to Details
First PageDocument Content
NIST hash function competition / SHA-3 / Power analysis / Institute for Applied Information Processing and Communications / Cryptography / Side-channel attack / Algorithm / Mathematics / Science and technology / Science
Date: 2015-11-30 11:00:03
NIST hash function competition
SHA-3
Power analysis
Institute for Applied Information Processing and Communications
Cryptography
Side-channel attack
Algorithm
Mathematics
Science and technology
Science

Parallel vs. Sequential Computations Do they Leak the Same? Advisor(s): Thomas Korak and Hannes Groß Institute for Applied Information Processing and Communications (IAIK) Graz University of Technology, Austria

Add to Reading List

Source URL: www.iaik.tugraz.at

Download Document from Source Website

File Size: 223,65 KB

Share Document on Facebook

Similar Documents

A High-Resolution Side-Channel Attack on Last-Level Cache Mehmet Kayaalp IBM Research   Nael Abu-Ghazaleh

A High-Resolution Side-Channel Attack on Last-Level Cache Mehmet Kayaalp IBM Research Nael Abu-Ghazaleh

DocID: 1uZro - View Document

May the Fourth Be With You: A Microarchitectural Side Channel Attack on Several Real-World Applications of Curve25519 Daniel Genkin Luke Valenta

May the Fourth Be With You: A Microarchitectural Side Channel Attack on Several Real-World Applications of Curve25519 Daniel Genkin Luke Valenta

DocID: 1tJ20 - View Document

BranchScope: A New Side-Channel Attack on Directional Branch Predictor

BranchScope: A New Side-Channel Attack on Directional Branch Predictor

DocID: 1tHEI - View Document

Side-channel Attack Standard Evaluation Board SASEBO-GIII Specification - VersionApril 26, 2013

Side-channel Attack Standard Evaluation Board SASEBO-GIII Specification - VersionApril 26, 2013

DocID: 1tnMc - View Document

Efficient Cache Attacks on AES, and Countermeasures Eran Tromer1 2 , Dag Arne Osvik3 and Adi Shamir2 1 Computer Science and Artificial Intelligence Laboratory, Massachusetts Institute of Technology,

Efficient Cache Attacks on AES, and Countermeasures Eran Tromer1 2 , Dag Arne Osvik3 and Adi Shamir2 1 Computer Science and Artificial Intelligence Laboratory, Massachusetts Institute of Technology,

DocID: 1rolT - View Document