Side channel attack

Results: 129



#Item
81Coding theory / Advanced Encryption Standard / Side channel attack / Block cipher / Ciphertext / Known-plaintext attack / Hamming weight / Cryptanalysis / Cube attack / Cryptography / Espionage / Cyberwarfare

Error-Tolerant Algebraic Side-Channel Attacks Using BEE Ling Song1,2 , Lei Hu1,2 , Siwei Sun1,2 , Zhang Zhang2 ,Danping Shi1,2 , Ronglin Hao1,3 1 State Key Laboratory of Information Security,

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-09-01 04:34:57
82Cryptographic engineering / Security / Side channel attack / Tamper resistance / Cryptography / Espionage / Workshop on Cryptographic Hardware and Embedded Systems

Workshop on Cryptographic Hardware and Embedded Systems (CHES) Call for Papers The annual CHES workshop highlights new results in the design and analysis of cryptographic hardware and software implementations. CHES provi

Add to Reading List

Source URL: www.chesworkshop.org

Language: English - Date: 2013-11-25 23:46:19
83Side channel attack / Advanced Encryption Standard / Espionage / Algorithm / Block cipher / Fault injection / Applied mathematics / Cryptography / Theoretical computer science / Software testing

A Unified Formalism for Physical Attacks H´el`ene Le Bouder1,2 , Ronan Lashermes1,3 , Yanis Linge4 , Bruno Robisson1,3 , and Assia Tria1,3 2 1

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-09-03 11:07:10
84Advanced Encryption Standard / Cloud computing / MOD / Timing channel / IFC / Computing / Timing attack / Information flow

Plugging Side-Channel Leaks with Timing Information Flow Control Bryan Ford Yale University http://dedis.cs.yale.edu/

Add to Reading List

Source URL: dedis.cs.yale.edu

Language: English - Date: 2013-11-09 13:56:52
85Scheduling / Timing attack / Timing channel / Computing / Scheduling algorithms / Operations research / Planning

Plugging Side-Channel Leaks with Timing Information Flow Control Bryan Ford Yale University http://bford.info/ Abstract

Add to Reading List

Source URL: dedis.cs.yale.edu

Language: English - Date: 2012-05-24 16:26:28
86Scheduling / Timing attack / Timing channel / Computing / Scheduling algorithms / Operations research / Planning

Plugging Side-Channel Leaks with Timing Information Flow Control Bryan Ford Yale University http://bford.info/ Abstract

Add to Reading List

Source URL: dedis.cs.yale.edu

Language: English - Date: 2013-11-09 13:56:52
87Ciphertext / CPU cache / Side channel attack / AES implementations / Cryptography / Advanced Encryption Standard / Chosen-plaintext attack

Cache Attacks and Countermeasures: the Case of AES (Extended Version) revised[removed]Dag Arne Osvik1 , Adi Shamir2 and Eran Tromer2 1

Add to Reading List

Source URL: www.tau.ac.il

Language: English - Date: 2005-11-21 15:40:56
88Computer network security / Software bugs / Hacking / Software testing / Side channel attack / Vulnerability / Uncontrolled format string / Power analysis / Embedded system / Cyberwarfare / Computer security / Security

Des Autom Embed Syst[removed]: 173–183 DOI[removed]s10617[removed]x Embedded systems security—an overview Sri Parameswaran · Tilman Wolf

Add to Reading List

Source URL: www.ecs.umass.edu

Language: English - Date: 2013-12-04 11:29:25
89Side channel attack / Luc / Cryptography Research / RSA / Fault injection / Cryptography / Power analysis / Institute for Applied Information Processing and Communications

The Non-Invasive Attack Testing Workshop (NIAT[removed]Accepted Papers Choosing Distinguishers for Differential Power Analysis Attacks Elisabeth Oswald, Luke Mather, and Carolyn Whitnall University of Bristol, Department o

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2011-09-13 14:29:00
UPDATE