Timing attack

Results: 67



#Item
11Abstract algebra / Algebra / Mathematics / Modular arithmetic / Computer arithmetic / Binary operations / E-commerce / RSA / Modular exponentiation / Montgomery modular multiplication / Vienna U-Bahn / Modulo operation

A Timing Attack against RSA with the Chinese Remainder Theorem Werner Schindler Bundesamt f¨ ur Sicherheit in der Informationstechnik (BSI) Godesberger Allee 183, 53175 Bonn, Germany

Add to Reading List

Source URL: tls.mbed.org

Language: English
12

A Timing Attack on Hyperelliptic Curve Cryptosystems

Add to Reading List

Source URL: conf.ncku.edu.tw

Language: English - Date: 2003-12-19 01:13:44
    13

    A Cache Timing Attack on AES in Virtualization Environments Michael Weiß? , Benedikt Heinz? , and Frederic Stumpf? Fraunhofer Research Institution AISEC, Garching (near Munich), Germany {michael.weiss, benedikt.heinz, f

    Add to Reading List

    Source URL: fc12.ifca.ai

    Language: English - Date: 2012-02-18 14:35:35
      14Cross-platform software / Platform as a service / Cross-site request forgery / Timing attack / Password / Advantage / JavaScript / RSA / HTTP cookie / Cryptography / Computing / Cloud computing

      Cross-Tenant Side-Channel Attacks in PaaS Clouds Yinqian Zhang Ari Juels University of North Carolina

      Add to Reading List

      Source URL: pages.cs.wisc.edu

      Language: English - Date: 2014-12-20 11:41:32
      15System software / Htree / Ext3 / Ext2 / File system / Unix File System / B-tree / Timing attack / Disk file systems / Data management / Computing

      Filesystems timing attacks ZeroNights, Moscow, research

      Add to Reading List

      Source URL: 2013.zeronights.org

      Language: English - Date: 2013-11-13 04:03:01
      16Cache / Computer memory / Computer architecture / Scheduling / Thread / Timing attack / Computing / Central processing unit / CPU cache

      Eliminating Cache-Based Timing Attacks with Instruction-Based Scheduling Deian Stefan1 , Pablo Buiras2 , Edward Yang1 , Amit Levy1 , David Terei1 , Alejandro Russo2 , and David Mazières 1

      Add to Reading List

      Source URL: www.amitlevy.com

      Language: English - Date: 2013-09-13 15:42:52
      17Tamper resistance / Public-key cryptography / Power analysis / Encryption / Computer security / Timing attack / Password / Key size / Secure cryptoprocessor / Cryptography / Security / Espionage

      Fairy dust, secrets, and the real world - Security & Privacy Magazine, IEEE

      Add to Reading List

      Source URL: www.cs.dartmouth.edu

      Language: English - Date: 2005-08-19 15:38:40
      18Advanced Encryption Standard / Central processing unit / Computer memory / Virtual machines / CPU cache / Hyper-V / Timing attack / AES instruction set / Xen / System software / Software / Computing

      Fine grain Cross-VM Attacks on Xen and VMware are possible! Gorka Irazoqui Apecechea, Mehmet Sinan Inci, Thomas Eisenbarth, Berk Sunar ∗ Worcester Polytechnic Institute {girazoki,msinci,teisenbarth,sunar}@wpi.edu Abst

      Add to Reading List

      Source URL: eprint.iacr.org

      Language: English - Date: 2014-04-07 18:32:56
      19RSA / Timing attack / Montgomery reduction / OpenSSL / Cipher / David Brumley / Multiplication algorithm / Side channel attack / Cryptography / Public-key cryptography / Electronic commerce

      Remote Timing Attacks are Practical David Brumley Stanford University Abstract Timing attacks are usually used to attack weak computing devices such as smartcards. We show that timing

      Add to Reading List

      Source URL: crypto.stanford.edu

      Language: English - Date: 2010-06-04 16:24:13
      20Power analysis / Cryptographic hash functions / Timing attack / Symmetric-key algorithm / Hamming weight / Triple DES / Crypt / RSA / VEST / Cryptography / Data Encryption Standard / Public-key cryptography

      Di erential Power Analysis Paul Kocher, Joshua Ja e, and Benjamin Jun Cryptography Research, Inc. 607 Market Street, 5th Floor San Francisco, CA 94105, USA. http://www.cryptography.com

      Add to Reading List

      Source URL: www.cis.upenn.edu

      Language: English - Date: 2013-08-26 17:02:16
      UPDATE