Side channel attack

Results: 129



#Item
11NIST hash function competition / SHA-3 / Power analysis / Institute for Applied Information Processing and Communications / Cryptography / Side-channel attack / Algorithm / Mathematics / Science and technology / Science

Parallel vs. Sequential Computations Do they Leak the Same? Advisor(s): Thomas Korak and Hannes Groß Institute for Applied Information Processing and Communications (IAIK) Graz University of Technology, Austria

Add to Reading List

Source URL: www.iaik.tugraz.at

Language: English - Date: 2015-11-30 11:00:03
12Cryptography / NIST hash function competition / Cryptographic hash functions / SHA-3 / Side-channel attack / Power analysis / Crypt

Side-Channel Analysis of an Authenticated Encryption Algorithm Advisor(s): Thomas Korak Institute for Applied Information Processing and Communications (IAIK) Graz University of Technology, Austria

Add to Reading List

Source URL: www.iaik.tugraz.at

Language: English - Date: 2015-11-30 11:00:03
13Elliptic curve cryptography / Public-key cryptography / RSA / Common Criteria / Side-channel attack / Evaluation

Microsoft PowerPoint - Killmann_sca_ecc.ppt

Add to Reading List

Source URL: www.yourcreativesolutions.nl

Language: English - Date: 2010-08-31 09:40:00
14Advanced Encryption Standard / Flush / Side-channel attack / Tiny Encryption Algorithm

Trace Driven Cache Attacks against AES Advisor(s): Daniel Gruss Institute for Applied Information Processing and Communications (IAIK) Graz University of Technology, Austria Motivation

Add to Reading List

Source URL: www.iaik.tugraz.at

Language: English - Date: 2015-11-30 11:00:03
15Public-key cryptography / Cryptography / Public key infrastructure / Encryption / Attribute-based encryption / PKE / Digital signature / Side-channel attack / RSA

Hello everybody ! See you at the next conference!

Add to Reading List

Source URL: security-lab.jaist.ac.jp

Language: English - Date: 2015-11-22 02:25:24
16Cybercrime / E-commerce / Cyberwarfare / Computer network security / Address space layout randomization / Return-oriented programming / PaX / Computer security / Exploit / Timing attack / Side-channel attack / Phishing

Moving Target Techniques: Leveraging Uncertainty for Cyber Defense Hamed Okhravi, William W. Streilein, and Kevin S. Bauer Cyber moving target techniques involve

Add to Reading List

Source URL: www.ll.mit.edu

Language: English - Date: 2016-07-12 15:04:32
17

Torben: A Practical Side-Channel Attack for Deanonymizing Tor Communication Daniel Arp University of Göttingen Göttingen, Germany

Add to Reading List

Source URL: user.informatik.uni-goettingen.de

Language: English - Date: 2015-02-18 03:53:06
    18Cryptography / Stream ciphers / Advanced Encryption Standard / Differential fault analysis / Block cipher / VEST / Data Encryption Standard / Fault model / Fault injection / Side-channel attack / Common Scrambling Algorithm

    IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTING, SPECIAL ISSUE, VOL. 6, NO. 1, DECEMBERA Combined Design-Time/Test-Time Study of the Vulnerability of Sub-Threshold Devices to

    Add to Reading List

    Source URL: euler.ecs.umass.edu

    Language: English - Date: 2014-03-28 15:45:17
    19Cryptography / Modular arithmetic / Cryptographic software / E-commerce / OpenSSL / RSA / Public-key cryptography / Modular exponentiation / Montgomery modular multiplication / Timing attack / Side-channel attack / Data Encryption Standard

    Remote Timing Attacks are Practical David Brumley Stanford University Abstract Timing attacks are usually used to attack weak computing devices such as smartcards. We show that timing

    Add to Reading List

    Source URL: tls.mbed.org

    Language: English
    UPDATE