메뉴 건너뛰기




Volumn 48, Issue 5, 2005, Pages 701-716

Remote timing attacks are practical

Author keywords

Chinese remainder; Montgomery reductions; RSA; SSL; Timing attack

Indexed keywords

COMPUTER SOFTWARE; MOBILE COMPUTING; SECURITY SYSTEMS; SERVERS; TIMING DEVICES; WORLD WIDE WEB;

EID: 18844454571     PISSN: 13891286     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.comnet.2005.01.010     Document Type: Article
Times cited : (388)

References (24)
  • 2
    • 84957355967 scopus 로고    scopus 로고
    • On the importance of checking cryptographic protocols for faults
    • Springer Berlin
    • D. Boneh, R.A. DeMillo, and R.J. Lipton On the importance of checking cryptographic protocols for faults Lecture Notes in Computer Science vol. 1233 1997 Springer Berlin 37 51
    • (1997) Lecture Notes in Computer Science , vol.1233 , pp. 37-51
    • Boneh, D.1    Demillo, R.A.2    Lipton, R.J.3
  • 3
    • 0001494997 scopus 로고    scopus 로고
    • Small solutions to polynomial equations, and low exponent RSA vulnerabilities
    • D. Coppersmith Small solutions to polynomial equations, and low exponent RSA vulnerabilities Journal of Cryptology 10 1997 233 260
    • (1997) Journal of Cryptology , vol.10 , pp. 233-260
    • Coppersmith, D.1
  • 6
    • 84888203263 scopus 로고    scopus 로고
    • P. Gutmann, Cryptlib, Available from < http://www.cs.auckland.ac.nz/ pgut001/cryptlib/>
    • Cryptlib
    • Gutmann, P.1
  • 8
    • 0242521606 scopus 로고    scopus 로고
    • Using the RDTSC instruction for performance monitoring
    • Intel
    • Intel, Using the RDTSC instruction for performance monitoring, Technical report, Intel, 1997
    • (1997) Technical Report
  • 9
    • 2442540896 scopus 로고    scopus 로고
    • IA-32 intel architecture optimization reference manual
    • Intel
    • Intel, IA-32 intel architecture optimization reference manual, Technical report 248966-008, Intel, 2003
    • (2003) Technical Report 248966-008
  • 10
    • 84939573910 scopus 로고    scopus 로고
    • Differential power analysis: Leaking secrets
    • P. Kocher, J. Jaffe, B. Jun, Differential power analysis: Leaking secrets, in: Crypto 99, 1999, pp. 388-397
    • (1999) Crypto 99 , pp. 388-397
    • Kocher, P.1    Jaffe, J.2    Jun, B.3
  • 11
    • 84943632039 scopus 로고    scopus 로고
    • Timing attacks on implementations of diffie-hellman, RSA, DSS, and other systems
    • P. Kocher Timing attacks on implementations of diffie-hellman, RSA, DSS, and other systems Advances in Cryptology 1996 104 113
    • (1996) Advances in Cryptology , pp. 104-113
    • Kocher, P.1
  • 13
    • 18844418085 scopus 로고    scopus 로고
    • mod_SSL Project. mod_ssl, Available from < http://www.modssl.org>
  • 14
    • 84966243285 scopus 로고
    • Modular multiplication without trial division
    • P. Montgomery Modular multiplication without trial division Mathematics of Computation 44 170 1985 519 521
    • (1985) Mathematics of Computation , vol.44 , Issue.170 , pp. 519-521
    • Montgomery, P.1
  • 15
    • 18844403215 scopus 로고    scopus 로고
    • GNU Project. libgcrypt, Available from < http://www.gnu.org/directory/ security/libgcrypt.html>
    • Libgcrypt
  • 16
    • 18844443563 scopus 로고    scopus 로고
    • OpenSSL Project, Openssl, Available from < http://www.openssl.org>
  • 17
    • 18844386669 scopus 로고    scopus 로고
    • EMpowering side-channel attacks
    • IBM T.J. Watson Research Center
    • J.R. Rao, P. Rohatgi, EMpowering side-channel attacks, Technical report 2001/037, IBM T.J. Watson Research Center, 2001
    • (2001) Technical Report , vol.2001 , Issue.37
    • Rao, J.R.1    Rohatgi, P.2
  • 18
    • 18844423658 scopus 로고
    • RSA Press Release, Available from < http://www.otn.net/onthenet/rsaqa. htm>, 1995
    • (1995)
  • 19
    • 68549092451 scopus 로고    scopus 로고
    • A timing attack against RSA with the chinese remainder theorem
    • W. Schindler, A timing attack against RSA with the chinese remainder theorem, in: CHES 2000, 2000, pp. 109-124
    • (2000) CHES 2000 , pp. 109-124
    • Schindler, W.1
  • 20
    • 84958960266 scopus 로고    scopus 로고
    • A combined timing and power attack
    • Springer Berlin
    • W. Schindler A combined timing and power attack Lecture Notes in Computer Science vol. 2274 2002 Springer Berlin 263 279
    • (2002) Lecture Notes in Computer Science , vol.2274 , pp. 263-279
    • Schindler, W.1
  • 21
    • 84983436061 scopus 로고    scopus 로고
    • Optimized timing attacks against public key cryptosystems
    • W. Schindler Optimized timing attacks against public key cryptosystems Statistics and Decisions 20 2002 191 210
    • (2002) Statistics and Decisions , vol.20 , pp. 191-210
    • Schindler, W.1
  • 22
    • 84946828535 scopus 로고    scopus 로고
    • Improving divide and conquer attacks against cryptosystems by better error detection/correction strategies
    • Springer Berlin
    • W. Schindler, F. Koeune, and J. Quisquater Improving divide and conquer attacks against cryptosystems by better error detection/correction strategies Lecture Notes in Computer Science vol. 2260 2001 Springer Berlin 245 267
    • (2001) Lecture Notes in Computer Science , vol.2260 , pp. 245-267
    • Schindler, W.1    Koeune, F.2    Quisquater, J.3
  • 23
    • 18844409918 scopus 로고    scopus 로고
    • Unleashing the full power of timing attack
    • UCL Microelectronics Laboratory
    • W. Schindler, F. Koeune, J.-J. Quisquater, Unleashing the full power of timing attack, Technical report CG-2001/3, UCL Microelectronics Laboratory, 2001
    • (2001) Technical Report , vol.CG-2001-3
    • Schindler, W.1    Koeune, F.2    Quisquater, J.-J.3
  • 24
    • 18844405305 scopus 로고    scopus 로고
    • Stunnel project, Stunnel, Available from < http://www.stunnel.org>


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.