Timing attack

Results: 67



#Item
21Power analysis / Side channel attack / Timing attack / Tamper resistance / RSA / Differential fault analysis / KeeLoq / Computer security compromised by hardware failure / Cryptography / Espionage / Public-key cryptography

Hardware Attacks on Cryptographic Devices Implementation Attacks on Embedded Systems and Other Portable Hardware Jem Berkes University of Waterloo Prepared for ECE 628, Winter 2006

Add to Reading List

Source URL: www.berkes.ca

Language: English - Date: 2006-04-11 01:44:56
22Computer memory / Central processing unit / CPU cache / Virtual memory / Computer architecture / Timing attack / Memory management unit / JavaScript / Cache algorithms / Cache / Computing / Computer hardware

The Spy in the Sandbox – Practical Cache Attacks in Javascript arXiv:1502.07373v2 [cs.CR] 1 Mar 2015 Yossef Oren, Vasileios P. Kemerlis, Simha Sethumadhavan and Angelos D. Keromytis Computer Science Department, Columb

Add to Reading List

Source URL: arxiv.org

Language: English - Date: 2015-03-02 21:40:58
23Modular arithmetic / Cache / Electronic commerce / Public-key cryptography / RSA / CPU cache / Side channel attack / Timing attack / Montgomery reduction / Cryptography / Computer architecture / Central processing unit

A Major Vulnerability in RSA Implementations due to MicroArchitectural Analysis Threat (August 22, 2007) Onur Acıi¸cmez1 and Werner Schindler2 1

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2007-08-26 13:51:19
24Central processing unit / Computer memory / Computing / Advanced Encryption Standard / CPU cache / Side channel attack / Timing attack / Hyper-V / Cryptography / Cache / Computer hardware

Wait a minute! A fast, Cross-VM attack on AES Gorka Irazoqui, Mehmet Sinan Inci, Thomas Eisenbarth, and Berk Sunar Worcester Polytechnic Institute, Worcester, MA, USA {girazoki,msinci,teisenbarth,sunar}@wpi.edu Abstract

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-11-20 16:16:58
25Cyberwarfare / Side channel attack / Power analysis / Cryptographic engineering / Timing attack / Randomness / Lecture Notes in Computer Science / Computer security / Espionage / Cryptography / Security

Formal Study of a Countermeasure Against Side-Channel Attacks Location. SEN group of the COMELEC department at Telecom ParisTech (37 rue Dareau, 75014, Paris). This internship can lead to a PhD thesis. Advisors.

Add to Reading List

Source URL: perso.telecom-paristech.fr

Language: English - Date: 2015-01-06 18:40:44
26RSA / Timing attack / Montgomery reduction / OpenSSL / Cipher / David Brumley / Multiplication algorithm / Side channel attack / Cryptography / Public-key cryptography / Electronic commerce

Remote Timing Attacks are Practical David Brumley Stanford University [removed] Abstract Timing attacks are usually used to attack weak computing devices such as smartcards. We show that timing

Add to Reading List

Source URL: users.ece.cmu.edu

Language: English - Date: 2014-05-29 15:38:01
27RSA / Finite fields / Timing attack / Montgomery reduction / David Brumley / Cipher / Dan Boneh / OpenSSL / XTR / Cryptography / Public-key cryptography / Electronic commerce

Computer Networks[removed]–716 www.elsevier.com/locate/comnet Remote timing attacks are practical David Brumley a

Add to Reading List

Source URL: users.ece.cmu.edu

Language: English - Date: 2014-05-29 15:38:01
28Block ciphers / Galois/Counter Mode / AES instruction set / AES implementations / CPU cache / Tiny Encryption Algorithm / Serpent / Block cipher modes of operation / Block cipher / Cryptography / Advanced Encryption Standard / Message authentication codes

Faster and Timing-Attack Resistant AES-GCM Emilia K¨ asper1 and Peter Schwabe2 ⋆

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2009-06-16 09:09:11
29Computer security / Computer network security / Time Stamp Counter / X86 architecture / Rootkit / QEMU / Honeypot / Gaël / Timing attack / Software / System software / Computing

Hostile environment detection with Timing measures Gaël Delalleau

Add to Reading List

Source URL: cansecwest.com

Language: English - Date: 2008-06-07 19:38:54
30Power analysis / Cryptographic hash functions / Timing attack / Symmetric-key algorithm / Hamming weight / Triple DES / Crypt / RSA / VEST / Cryptography / Data Encryption Standard / Public-key cryptography

Di erential Power Analysis Paul Kocher, Joshua Ja e, and Benjamin Jun Cryptography Research, Inc. 607 Market Street, 5th Floor San Francisco, CA 94105, USA. http://www.cryptography.com

Add to Reading List

Source URL: gauss.ececs.uc.edu

Language: English - Date: 2010-06-01 13:28:51
UPDATE