Timing attack

Results: 67



#Item
41Timing attack / Timing channel / Parallel computing / Thread / Counter / Computing / Cloud computing / Kahn process networks

Determinating Timing Channels in Compute Clouds Amittai Aviram, Sen Hu, Bryan Ford Ramakrishna Gummadi Yale University

Add to Reading List

Source URL: dedis.cs.yale.edu

Language: English - Date: 2013-11-09 13:56:19
42Timing attack / Timing channel / Parallel computing / Thread / Counter / Computing / Cloud computing / Kahn process networks

Determinating Timing Channels in Compute Clouds Amittai Aviram, Sen Hu, Bryan Ford Ramakrishna Gummadi Yale University

Add to Reading List

Source URL: dedis.cs.yale.edu

Language: English - Date: 2010-09-29 09:32:27
43Computer networking / Covert channel / Steganography / Keystroke logging / Channel / Transmission Control Protocol / Timing attack / Jitter / Overt channel / Computing / Espionage / Electronics

Keyboards and Covert Channels Gaurav Shah, Andres Molina and Matt Blaze Department of Computer and Information Science University of Pennsylvania {gauravsh, andresmf, blaze}@cis.upenn.edu

Add to Reading List

Source URL: www.crypto.com

Language: English - Date: 2006-08-07 14:09:37
44CPU cache / Dynamic random-access memory / Synchronous dynamic random-access memory / Side channel attack / Microarchitecture / DIMM / CAS latency / Static random-access memory / SDRAM latency / Computer memory / Computer hardware / Computing

Suppressing the Oblivious RAM Timing Channel While Making Information Leakage and Program Efficiency Trade-offs Christopher W. Fletcher†∗, Ling Ren† , Xiangyao Yu† , Marten Van Dijk‡ , Omer Khan‡ , Srinivas D

Add to Reading List

Source URL: people.csail.mit.edu

Language: English - Date: 2014-01-23 18:47:27
45Telecommunications engineering / Latency / Clock skew / Electromagnetism / Timing attack / Clock signal / Transmission Control Protocol / Electronics / Synchronization / Jitter

Opportunities and Limits of Remote Timing Attacks SCOTT A. CROSBY, DAN S. WALLACH and RUDOLF H. RIEDI Rice University Many algorithms can take a variable amount of time to complete depending on the data being

Add to Reading List

Source URL: www.cs.rice.edu

Language: English - Date: 2009-06-18 12:23:26
46

SICILIA TIMING [removed[removed] EXPERT - Time Attack

Add to Reading List

Source URL: www.sicilyonbike.it

Language: Italian - Date: 2013-06-15 15:47:11
    47

    SICILIA TIMING [removed[removed] AMATORI - Time Attack

    Add to Reading List

    Source URL: www.sicilyonbike.it

    Language: Italian - Date: 2013-06-15 15:45:05
      48

      SICILIA TIMING [removed[removed]AMATORI - Time Attack

      Add to Reading List

      Source URL: www.sicilyonbike.it

      Language: Italian - Date: 2013-06-15 15:43:58
        49

        SICILIA TIMING [removed[removed]EXPERT - Time Attack

        Add to Reading List

        Source URL: www.sicilyonbike.it

        Language: Italian - Date: 2013-06-15 15:44:27
          50Elliptic curve cryptography / Key size / OpenSSL / CPU cache / Advanced Encryption Standard / Cryptographic nonce / Side channel attack / Timing attack / Lookup table / Cryptography / Key management / Elliptic Curve DSA

          Recovering OpenSSL ECDSA Nonces Using the F LUSH +R ELOAD Cache Side-channel Attack Yuval Yarom The University of Adelaide Naomi Benger

          Add to Reading List

          Source URL: eprint.iacr.org

          Language: English - Date: 2014-02-24 05:24:23
          UPDATE