Side channel attack

Results: 129



#Item
31Computer architecture / Cache / CPU cache / Computing / Computer data storage / CPUID / Acumem SlowSpotter / AMD 10h / Computer memory / Computer hardware / Central processing unit

F LUSH +R ELOAD: a High Resolution, Low Noise, L3 Cache Side-Channel Attack Yuval Yarom Katrina Falkner The University of Adelaide

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-07-04 21:30:09
32Side channel attack / Diffie–Hellman key exchange / Advantage / Public-key cryptography / Semantic security / Cryptography / Cryptographic protocols / Random oracle

Continuous After-the-fact Leakage-Resilient eCK-secure Key Exchange Janaka Alawatugoda1 1 Colin Boyd3

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-14 00:49:04
33Cyberwarfare / Side channel attack / Smart card / Tamper resistance / Computer security / Cryptographic engineering / Power analysis / Security / Cryptography / Espionage

Side Channel Analysis and Embedded Systems Impact and Countermeasures Job de Haas

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2014-12-16 19:06:23
34Computer architecture / Cache / CPU cache / Computing / Computer data storage / CPUID / Acumem SlowSpotter / AMD 10h / Computer memory / Computer hardware / Central processing unit

F LUSH +R ELOAD: a High Resolution, Low Noise, L3 Cache Side-Channel Attack Yuval Yarom Katrina Falkner The University of Adelaide

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-07-04 21:30:09
35Side channel attack / Smart card / Tamper resistance / Security / Cryptographic engineering / Power analysis / Cryptography / Espionage / Cyberwarfare

PDF Document

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2014-12-16 19:06:27
36GPGPU / Nvidia / Graphics hardware / CUDA / Graphics processing unit / Memory protection / GeForce / Side channel attack / Cold boot attack / Computer hardware / Video cards / Computing

PDF Document

Add to Reading List

Source URL: www.syssec-project.eu

Language: English - Date: 2015-01-05 07:38:12
37Key management / Electronic commerce / RSA / Side channel attack / Public key fingerprint / Xen / Ciphertext / CPU cache / Key / Cryptography / Public-key cryptography / Cache

Cross-VM Side Channels and Their Use to Extract Private Keys Yinqian Zhang Ari Juels

Add to Reading List

Source URL: pages.cs.wisc.edu

Language: English - Date: 2012-12-24 14:28:56
38Power analysis / Side channel attack / Message authentication codes / Stream ciphers / Cryptographic hash functions / Differential cryptanalysis / Avalanche effect / VEST / Block cipher modes of operation / Cryptography / Espionage / Advanced Encryption Standard

J Cryptogr Eng:5–27 DOIs13389y REGULAR PAPER Introduction to differential power analysis

Add to Reading List

Source URL: ftp.cryptography.com

Language: English - Date: 2011-10-03 19:52:55
39Crime prevention / National security / Computer network security / Software testing / Formal sciences / Side channel attack / Fault injection / Cryptography / Cryptographic engineering / Security / Cyberwarfare / Computer security

“I only write numbers in base 10.” Pablo Rauzy Information Security PhD student Open Access advocate

Add to Reading List

Source URL: pablo.rauzy.name

Language: English - Date: 2015-03-28 18:02:06
40Pairing / Weil pairing / Elliptic curve cryptography / Tate pairing / BLS / Elliptic curve / ID-based encryption / Power analysis / Side channel attack / Cryptography / Abstract algebra / Algebra

Improved Side Channel Attacks on Pairing Based Cryptography Johannes Blömer∗ Peter Günther†

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-01-24 04:01:18
UPDATE