Side-channel attack

Results: 129



#Item
1

A High-Resolution Side-Channel Attack on Last-Level Cache Mehmet Kayaalp IBM Research Nael Abu-Ghazaleh

Add to Reading List

Source URL: www.cs.ucr.edu

Language: English - Date: 2016-02-23 16:36:47
    2

    May the Fourth Be With You: A Microarchitectural Side Channel Attack on Several Real-World Applications of Curve25519 Daniel Genkin Luke Valenta

    Add to Reading List

    Source URL: eprint.iacr.org

    - Date: 2017-08-27 19:43:58
      3

      BranchScope: A New Side-Channel Attack on Directional Branch Predictor

      Add to Reading List

      Source URL: www.cs.ucr.edu

      - Date: 2018-03-24 11:37:13
        4

        Side-channel Attack Standard Evaluation Board SASEBO-GIII Specification - VersionApril 26, 2013

        Add to Reading List

        Source URL: www.risec.aist.go.jp

        - Date: 2013-05-13 02:21:55
          5Cryptography / Cache / Computer memory / Advanced Encryption Standard / Side-channel attack / Data Encryption Standard / Cache memory / Lookup table / Cryptanalysis / Tiny Encryption Algorithm / Block cipher / CPU cache

          Efficient Cache Attacks on AES, and Countermeasures Eran Tromer1 2 , Dag Arne Osvik3 and Adi Shamir2 1 Computer Science and Artificial Intelligence Laboratory, Massachusetts Institute of Technology,

          Add to Reading List

          Source URL: cs.tau.ac.il

          Language: English - Date: 2009-06-25 15:56:23
          6Cryptography / E-commerce / Cryptographic software / RSA / OpenSSL / Modular arithmetic / Timing attack / Side-channel attack / Montgomery modular multiplication / David Brumley / Karatsuba algorithm / Data Encryption Standard

          Computer Networks–716 www.elsevier.com/locate/comnet Remote timing attacks are practical David Brumley a

          Add to Reading List

          Source URL: users.ece.cmu.edu

          Language: English - Date: 2014-05-29 15:38:01
          7Cryptography / Advanced Encryption Standard / X86 instructions / Rambus / Side-channel attack / AES instruction set / Cryptography Research / Masking / Technology / Computing

          Microarchitectures Undo Software Security Measures • To implement secure algorithms, software based cryptography utilizes the ISA through instructions or cryptographic extensions.

          Add to Reading List

          Source URL: www.hotchips.org

          Language: English - Date: 2015-08-21 02:18:30
          8Computer hardware / Computing / Motherboard / Computer buses / Side-channel attacks / DMA attack / Direct memory access / PC Card / IEEE / X86-64 / Field-programmable gate array

          Subverting Windows 7 x64 Kernel with DMA attacks Damien Aumaitre Christophe Devine Physical attacks

          Add to Reading List

          Source URL: esec-lab.sogeti.com

          Language: English - Date: 2016-07-01 12:08:46
          9Cryptography / Cryptographic software / OpenPGP / Side-channel attacks / E-commerce / RSA / Modular exponentiation / Chosen-ciphertext attack / ElGamal encryption / Adaptive chosen-ciphertext attack / Electromagnetic attack / Public-key cryptography

          Stealing Keys from PCs using a Radio: Cheap Electromagnetic Attacks on Windowed Exponentiation (extended version) Daniel Genkin Lev Pachmanov

          Add to Reading List

          Source URL: www.cs.tau.ac.il

          Language: English - Date: 2015-03-03 02:38:59
          10Cryptography / Modular arithmetic / Cryptographic software / E-commerce / OpenSSL / RSA / Public-key cryptography / Modular exponentiation / Montgomery modular multiplication / Timing attack / Side-channel attack / Data Encryption Standard

          Remote Timing Attacks are Practical David Brumley Stanford University Abstract Timing attacks are usually used to attack weak computing devices such as smartcards. We show that timing

          Add to Reading List

          Source URL: users.ece.cmu.edu

          Language: English - Date: 2014-05-29 15:38:01
          UPDATE