Side channel attack

Results: 129



#Item
41Cyberwarfare / ISO standards / Ubiquitous computing / Side channel attack / Smart card / Tamper resistance / Computer security / Cryptographic engineering / Power analysis / Security / Cryptography / Espionage

Side Channel Attacks and Countermeasures for Embedded Systems Job de Haas

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2014-12-16 19:06:37
42Public-key cryptography / Communications protocol / Advantage / Peer-to-peer / Side channel attack / Cryptography / Cryptographic protocols / Random oracle

A Unified Security Model of Authenticated Key Exchange with Specific Adversarial Capabilities Weiqiang Wena,b,1 , Libin Wanga,b,2 , Jiaxin Panc,3 a b

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-18 19:15:30
43RSA / Timing attack / Montgomery reduction / OpenSSL / Cipher / David Brumley / Multiplication algorithm / Side channel attack / Cryptography / Public-key cryptography / Electronic commerce

Remote Timing Attacks are Practical David Brumley Stanford University Abstract Timing attacks are usually used to attack weak computing devices such as smartcards. We show that timing

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2010-06-04 16:24:13
44Advanced Encryption Standard / Power analysis / Side channel attack / Microcontrollers / Stream ciphers / Message authentication codes / Joint Test Action Group / Field-programmable gate array / TI MSP430 / Cryptography / Electronic engineering / Electronics

In the blink of an eye: There goes your AES key (DRAFT of 28 MaySergei Skorobogatov Christopher Woods

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2012-05-28 10:41:12
45Randomness / Tamper resistance / Public-key cryptography / Key size / Side channel attack / Smart card / Key generation / Challenge-response authentication / Cryptography / Key management / Physical Unclonable Function

Read-Proof Hardware from Protective Coatings Pim Tuyls, Geert-Jan Schrijen, Boris Skoric Jan van Geloven, Nynke Verhaegh, Rob Wolters Philips Research Laboratories Prof. Holstlaan 4, 5656 AA Eindhoven, The Netherlands

Add to Reading List

Source URL: members.home.nl

Language: English - Date: 2008-12-09 00:54:25
46Systems engineering / Reliability engineering / Algorithm / Information flow / Side channel attack / Systems science / Applied mathematics / Abstract interpretation / Symbolic execution / Quicken Interchange Format

Quantifying Information Leaks using Reliability Analysis † ˘ areanu ˘ Quoc-Sang Phan∗ Pasquale Malacaria∗ Corina S. Pas Marcelo d’Amorim‡

Add to Reading List

Source URL: www.eecs.qmul.ac.uk

Language: English - Date: 2015-04-10 18:09:41
47ICE / Ciphertext / Stream cipher / Chosen-plaintext attack / Blowfish / Cryptanalysis / Linear cryptanalysis / Cipher / Symmetric-key algorithm / Cryptography / Block cipher / Differential cryptanalysis

Side Channel Cryptanalysis of Product Ciphers John Kelsey1 , Bruce Schneier1 , David Wagner2 , and Chris Hall3 1 Counterpane Internet Security 3031 Tisch Way, 100 Plaza East

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2014-03-02 23:18:31
48Blowfish / Ciphertext / Block cipher / Chosen-plaintext attack / Cipher / Cryptanalysis / Advanced Encryption Standard / Stream cipher / Cryptography / Differential cryptanalysis / ICE

Side Channel Cryptanalysis of Product Ciphers John Kelsey1 , Bruce Schneier1 , David Wagner2 , and Chris Hall1 1 Counterpane Systems {hall,kelsey,schneier}@counterpane.com 101 E. Minnehaha Pkwy

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2014-03-02 23:18:31
49Power analysis / Side channel attack / Timing attack / Tamper resistance / RSA / Differential fault analysis / KeeLoq / Computer security compromised by hardware failure / Cryptography / Espionage / Public-key cryptography

Hardware Attacks on Cryptographic Devices Implementation Attacks on Embedded Systems and Other Portable Hardware Jem Berkes University of Waterloo Prepared for ECE 628, Winter 2006

Add to Reading List

Source URL: www.berkes.ca

Language: English - Date: 2006-04-11 01:44:56
50Modular arithmetic / Cache / Electronic commerce / Public-key cryptography / RSA / CPU cache / Side channel attack / Timing attack / Montgomery reduction / Cryptography / Computer architecture / Central processing unit

A Major Vulnerability in RSA Implementations due to MicroArchitectural Analysis Threat (August 22, 2007) Onur Acıi¸cmez1 and Werner Schindler2 1

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2007-08-26 13:51:19
UPDATE