1![LNCSA New Framework for Constraint-Based Probabilistic Template Side Channel Attacks LNCSA New Framework for Constraint-Based Probabilistic Template Side Channel Attacks](https://www.pdfsearch.io/img/5bb83231b5dda4fd533155c9ba07d6cf.jpg) | Add to Reading ListSource URL: www.ofirweisse.comLanguage: English - Date: 2018-10-17 09:19:19
|
---|
2![Practical Template-Algebraic Side Channel Attacks with Extremely Low Data Complexity Yossef Oren, Ofir Weisse and Avishai Wool Cryptography and Network Security Lab School of Electrical Engineering Tel-Aviv University, R Practical Template-Algebraic Side Channel Attacks with Extremely Low Data Complexity Yossef Oren, Ofir Weisse and Avishai Wool Cryptography and Network Security Lab School of Electrical Engineering Tel-Aviv University, R](https://www.pdfsearch.io/img/b74c740213775c41b50ef0ecc432184c.jpg) | Add to Reading ListSource URL: www.ofirweisse.comLanguage: English - Date: 2018-10-17 09:19:20
|
---|
3![FPGA implementations of SPRING And their Countermeasures against Side-Channel Attacks Hai Brenner1 , Lubos Gaspar2 , Ga¨etan Leurent3 , Alon Rosen1 , Fran¸cois-Xavier Standaert2 1 FPGA implementations of SPRING And their Countermeasures against Side-Channel Attacks Hai Brenner1 , Lubos Gaspar2 , Ga¨etan Leurent3 , Alon Rosen1 , Fran¸cois-Xavier Standaert2 1](https://www.pdfsearch.io/img/01c66e8e51200a10d7bdaa2517f8324e.jpg) | Add to Reading ListSource URL: who.rocq.inria.frLanguage: English - Date: 2018-06-14 07:12:40
|
---|
4![TEMPEST attacks against AES Covertly stealing keys for €200 Overview Side-channel attacks can recover secret keys from cryptographic algorithms (including the pervasive AES) using measurements such as power use. Howeve TEMPEST attacks against AES Covertly stealing keys for €200 Overview Side-channel attacks can recover secret keys from cryptographic algorithms (including the pervasive AES) using measurements such as power use. Howeve](https://www.pdfsearch.io/img/6c5110e6e8f32af437e8dcbda813549d.jpg) | Add to Reading ListSource URL: www.fox-it.comLanguage: English - Date: 2018-04-20 09:19:48
|
---|
5![Attacking OpenSSL using Side-channel Attacks: the RSA case study Praveen Kumar Vadnala, Lukasz Chmielewski Riscure BV, Delft, The Netherlands Abstract. We show that RSA implementation present in OpenSSL can be successful Attacking OpenSSL using Side-channel Attacks: the RSA case study Praveen Kumar Vadnala, Lukasz Chmielewski Riscure BV, Delft, The Netherlands Abstract. We show that RSA implementation present in OpenSSL can be successful](https://www.pdfsearch.io/img/472267914dd6a4a895da6e18e912f8ae.jpg) | Add to Reading ListSource URL: program.sha2017.orgLanguage: English - Date: 2017-08-08 05:37:00
|
---|
6![Practical Mitigations for Timing-Based Side-Channel Attacks on Modern x86 Processors Bart Coppens∗ , Ingrid Verbauwhede‡ , Koen De Bosschere∗ , and Bjorn De Sutter∗† ∗ Electronics and Information Systems Depa Practical Mitigations for Timing-Based Side-Channel Attacks on Modern x86 Processors Bart Coppens∗ , Ingrid Verbauwhede‡ , Koen De Bosschere∗ , and Bjorn De Sutter∗† ∗ Electronics and Information Systems Depa](https://www.pdfsearch.io/img/f620b413060f3c4996df3f8b046ad776.jpg) | Add to Reading ListSource URL: users.elis.ugent.beLanguage: English - Date: 2009-07-23 13:04:51
|
---|
7![Post-quantum crypto and side-channel attacks – getting ready for the real world Tanja Lange 21 Jul 2016 ArcticCrypt Post-quantum crypto and side-channel attacks – getting ready for the real world Tanja Lange 21 Jul 2016 ArcticCrypt](https://www.pdfsearch.io/img/5eb98190015a9eaed84a4274923578d9.jpg) | Add to Reading ListSource URL: hyperelliptic.orgLanguage: English - Date: 2016-07-23 14:54:58
|
---|
8![Note on side-channel attacks and their countermeasures In the last few years ciphers making use of table-lookups in large tables—and most notably AES [12, 6]—have received a lot of bad publicity due to their vulnerab Note on side-channel attacks and their countermeasures In the last few years ciphers making use of table-lookups in large tables—and most notably AES [12, 6]—have received a lot of bad publicity due to their vulnerab](https://www.pdfsearch.io/img/5b0d1c99b9581b8eb679771a16111395.jpg) | Add to Reading ListSource URL: keccak.teamLanguage: English - Date: 2017-08-22 12:54:56
|
---|
9![An Information-Theoretic Model for Adaptive Side-Channel Attacks Boris Köpf David Basin An Information-Theoretic Model for Adaptive Side-Channel Attacks Boris Köpf David Basin](https://www.pdfsearch.io/img/2925f2897354f0b482a5c8e6ebfab98b.jpg) | Add to Reading ListSource URL: software.imdea.orgLanguage: English - Date: 2010-09-02 11:11:48
|
---|
10![Prefetch Side-Channel Attacks: Bypassing SMAP and Kernel ASLR Daniel Gruss∗ Clémentine Maurice∗ Moritz Lipp∗ Prefetch Side-Channel Attacks: Bypassing SMAP and Kernel ASLR Daniel Gruss∗ Clémentine Maurice∗ Moritz Lipp∗](https://www.pdfsearch.io/img/eaa323570cfc6118b9b05c336427f540.jpg) | Add to Reading ListSource URL: gruss.ccLanguage: English - Date: 2016-09-12 09:34:50
|
---|