Side channel attack

Results: 129



#Item
21Cryptography / Py / Differential cryptanalysis / Advanced Encryption Standard / Block cipher / Bart Preneel / Side-channel attack / Cryptanalysis / ICE

ISCOn Security of a White-Box Implementation of SHARK Yang SHI and Hongfei FAN

Add to Reading List

Source URL: isc2015.item.ntnu.no

Language: English - Date: 2015-09-20 14:17:24
22Computer architecture / Computing / Computer engineering / Central processing unit / Computer memory / Instruction set architectures / Cache / Advanced Encryption Standard / CPU cache / Side-channel attack / ARM architecture / Reduced instruction set computing

Low-Cost Software Countermeasures Against Fault Attacks: Implementation and Performances Trade Offs Alessandro Barenghi Luca Breveglieri

Add to Reading List

Source URL: euler.ecs.umass.edu

Language: English - Date: 2011-03-24 10:57:36
23Information theory / Philosophy of thermal and statistical physics / Pseudorandom number generators / Thermodynamic entropy / Information Age / Information flow / Side-channel attack / Entropy / Quicken Interchange Format / Information

FCS 2013 Workshop on Foundations of Computer Security (Informal Proceedings) June 29, 2013 Tulane University

Add to Reading List

Source URL: prosecco.gforge.inria.fr

Language: English - Date: 2013-06-11 09:16:04
24Semantic security / Optimal asymmetric encryption padding / Cipher / RSA / Advantage / Encryption / Side channel attack / Ciphertext indistinguishability / Cryptography / Public-key cryptography / Electronic commerce

main_CameraReadyFormatting.dvi

Add to Reading List

Source URL: www.eng.biu.ac.il

Language: English - Date: 2012-05-14 19:11:08
25Cross-platform software / Platform as a service / Cross-site request forgery / Timing attack / Password / Advantage / JavaScript / RSA / HTTP cookie / Cryptography / Computing / Cloud computing

Cross-Tenant Side-Channel Attacks in PaaS Clouds Yinqian Zhang Ari Juels University of North Carolina

Add to Reading List

Source URL: pages.cs.wisc.edu

Language: English - Date: 2014-12-20 11:41:32
26Brute-force attack / Side channel attack / Workshop on Cryptographic Hardware and Embedded Systems / MIFARE / Cryptography / Espionage / Advanced Encryption Standard

Real world AES key extraction CHES-2010 Rump Session, Santa Barbara, USA, 19 August 2010 Real world AES key extraction Sergei Skorobogatov

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2010-09-09 06:37:08
27Surveillance / Signals intelligence / TEMPEST / United States government secrecy / Cyberwarfare / Side channel attack / Power analysis / Electromagnetic interference / Shielded cable / Espionage / National security / Security

CHAPTER 17 Emission Security The hum of either army stilly sounds, That the fixed sentinels almost receive

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2011-12-05 05:50:25
28Physical Unclonable Function / Randomness / Elliptic curve cryptography / Side channel attack / PUF / LEX / Hardware Trojan / Digital rights management / Joint Test Action Group / Cryptography / Advanced Encryption Standard / Trojan horses

HOST-2010 3rd Annual IEEE International Symposium on Hardware-Oriented Security and Trust June 13-14, 2010 – Anaheim Convention Center, Anaheim, CA Sunday, June 13th

Add to Reading List

Source URL: www.engr.uconn.edu

Language: English - Date: 2010-10-16 10:23:01
29Security / Hardware Trojan / Physical Unclonable Function / Side channel attack / Computer security / Power analysis / Threat / Cryptography / Cyberwarfare / Computer network security

ODETTE: A Non-Scan Design-for-Test Methodology for Trojan Detection in ICs M. Banga and M. Hsiao (Virginia Tech) 11:45 - 1:00: Lunch 1:00 - 2:00: Poster Session Session Chair: Patrick Schaumont

Add to Reading List

Source URL: www.engr.uconn.edu

Language: English - Date: 2011-05-27 10:02:27
30Computer security / Fault injection / Booz Allen Hamilton / Side channel attack / Cyberwarfare / Espionage / Security / Trojan horses / Hardware Trojan

Microsoft Word - HOST2015_Program_v10.docx

Add to Reading List

Source URL: www.engr.uconn.edu

Language: English - Date: 2015-05-05 13:55:29
UPDATE