Timing attack

Results: 67



#Item
1

Remote Timing Attacks are Practical David Brumley Stanford University Abstract Timing attacks are usually used to attack weak computing devices such as smartcards. We show that timing

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2010-06-04 16:24:13
    2

    Timing Attack against protected RSA-CRT implementation used in PolarSSL Cyril Arnaud1 and Pierre-Alain Fouque2 1 ´ Ecole de l’Air,

    Add to Reading List

    Source URL: tls.mbed.org

    Language: English - Date: 2016-01-19 07:39:30
      3

      RCoal: Mitigating GPU Timing Attack via Subwarp-based Randomized Coalescing Techniques Gurunath Kadam Danfeng Zhang

      Add to Reading List

      Source URL: adwaitjog.github.io

      - Date: 2018-04-03 12:08:14
        4Cryptography / E-commerce / Cryptographic software / RSA / OpenSSL / Modular arithmetic / Timing attack / Side-channel attack / Montgomery modular multiplication / David Brumley / Karatsuba algorithm / Data Encryption Standard

        Computer Networks–716 www.elsevier.com/locate/comnet Remote timing attacks are practical David Brumley a

        Add to Reading List

        Source URL: users.ece.cmu.edu

        Language: English - Date: 2014-05-29 15:38:01
        5Cryptography / Computing / Scrypt / Key management / PBKDF2 / Key derivation function / CPU cache / Password / Cache / Timing attack / Lookup table

        Cache-Timing Attack Against a Password-based Key Derivation Function Advisor(s): Raphael Spreitzer and Daniel Gruss Institute for Applied Information Processing and Communications (IAIK) Graz University of Technology, Au

        Add to Reading List

        Source URL: www.iaik.tugraz.at

        Language: English - Date: 2015-09-08 06:00:03
        6Cryptography / Modular arithmetic / Cryptographic software / E-commerce / OpenSSL / RSA / Public-key cryptography / Modular exponentiation / Montgomery modular multiplication / Timing attack / Side-channel attack / Data Encryption Standard

        Remote Timing Attacks are Practical David Brumley Stanford University Abstract Timing attacks are usually used to attack weak computing devices such as smartcards. We show that timing

        Add to Reading List

        Source URL: users.ece.cmu.edu

        Language: English - Date: 2014-05-29 15:38:01
        7Cybercrime / E-commerce / Cyberwarfare / Computer network security / Address space layout randomization / Return-oriented programming / PaX / Computer security / Exploit / Timing attack / Side-channel attack / Phishing

        Moving Target Techniques: Leveraging Uncertainty for Cyber Defense Hamed Okhravi, William W. Streilein, and Kevin S. Bauer Cyber moving target techniques involve

        Add to Reading List

        Source URL: www.ll.mit.edu

        Language: English - Date: 2016-07-12 15:04:32
        8

        Remote Timing Attacks are Practical David Brumley Stanford University Abstract Timing attacks are usually used to attack weak computing devices such as smartcards. We show that timing

        Add to Reading List

        Source URL: css.csail.mit.edu

        Language: English - Date: 2016-01-29 11:50:05
          9Computer arithmetic / Modular arithmetic / Finite fields / Multiplication / E-commerce / RSA / Exponentiation by squaring / Montgomery modular multiplication / Modular exponentiation / Timing attack / Multiplication algorithm / XTR

          Improving Brumley and Boneh Timing Attack on Unprotected SSL Implementations Onur Acıic¸mez Werner Schindler

          Add to Reading List

          Source URL: tls.mbed.org

          Language: English - Date: 2016-01-19 07:39:30
          10Cryptography / Modular arithmetic / Cryptographic software / E-commerce / OpenSSL / RSA / Public-key cryptography / Modular exponentiation / Montgomery modular multiplication / Timing attack / Side-channel attack / Data Encryption Standard

          Remote Timing Attacks are Practical David Brumley Stanford University Abstract Timing attacks are usually used to attack weak computing devices such as smartcards. We show that timing

          Add to Reading List

          Source URL: tls.mbed.org

          Language: English
          UPDATE