메뉴 건너뛰기




Volumn , Issue , 2005, Pages 139-146

Improving brumley and boneh timing attack on unprotected SSL implementations

Author keywords

RSA; side channel cryptanalysis; timing attacks

Indexed keywords

COMMUNICATION CHANNELS (INFORMATION THEORY); INFORMATION ANALYSIS; SECURITY OF DATA; TIME VARYING SYSTEMS;

EID: 33745773656     PISSN: 15437221     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1102120.1102140     Document Type: Conference Paper
Times cited : (53)

References (14)
  • 1
    • 84957693225 scopus 로고    scopus 로고
    • Chosen ciphertext attacks against protocols baaed on the RSA encryption standard PKCS #1
    • H. Krawczyk (Ed.): Crypto 1998, Springer
    • D. Bleichenbacher: Chosen Ciphertext Attacks Against Protocols Baaed on the RSA Encryption Standard PKCS #1. In: H. Krawczyk (Ed.): Crypto 1998, Springer, Lecture Notes in Computer Science 1462, 1998, 1-12.
    • (1998) Lecture Notes in Computer Science , vol.1462 , pp. 1-12
    • Bleichenbacher, D.1
  • 3
    • 35248836120 scopus 로고    scopus 로고
    • Password interception in a SSL/TSL channel
    • D. Boneh (ed.): Crypto 2003, Springer, Heidelberg
    • B. Canvel, A. Hiltgen, S. Vaudenay, M. Vuagnoux: Password Interception in a SSL/TSL Channel. In: D. Boneh (ed.): Crypto 2003, Lecture Notes in Computer Science 2729, Springer, Heidelberg (2003), 583-599.
    • (2003) Lecture Notes in Computer Science , vol.2729 , pp. 583-599
    • Canvel, B.1    Hiltgen, A.2    Vaudenay, S.3    Vuagnoux, M.4
  • 4
    • 0001494997 scopus 로고    scopus 로고
    • Small solutions to polynomial equations, and low exponent RSA vulnerabilities
    • D. Coppersmith: Small Solutions to Polynomial Equations, and Low Exponent RSA Vulnerabilities. J. Cryptology 10 (no. 4) (1997) 233-260.
    • (1997) J. Cryptology , vol.10 , Issue.4 , pp. 233-260
    • Coppersmith, D.1
  • 5
    • 84954462346 scopus 로고    scopus 로고
    • A practical implementation of the timing attack
    • J.-J. Quisquater and B. Schneier (eds.): Smart Card - Research and Applications, Springer, Berlin
    • J.-F. Dhem, F. Koeune, P.-A. Leroux, P.-A. Mestré, J.-J. Quisquater, J.-L. Willems: A Practical Implementation of the Timing Attack. In: J.-J. Quisquater and B. Schneier (eds.): Smart Card - Research and Applications, Springer, Lecture Notes in Computer Science 1820, Berlin (2000), 175-191.
    • (2000) Lecture Notes in Computer Science , vol.1820 , pp. 175-191
    • Dhem, J.-F.1    Koeune, F.2    Leroux, P.-A.3    Mestré, P.-A.4    Quisquater, J.-J.5    Willems, J.-L.6
  • 7
    • 84943632039 scopus 로고    scopus 로고
    • Timing attacks on implementations of diffie-hellman, RSA, DSS and other systems
    • N. Koblitz (ed.): Crypto 1996, Springer, Heidelberg
    • P. Kocher: Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS and Other Systems. In: N. Koblitz (ed.): Crypto 1996, Springer, Lecture Notes in Computer Science 1100, Heidelberg (1996), 104-113.
    • (1996) Lecture Notes in Computer Science , vol.1100 , pp. 104-113
    • Kocher, P.1
  • 10
    • 68549092451 scopus 로고    scopus 로고
    • A timing attack against RSA with the chinese remainder theorem
    • Ç.K. Koç, C. Paar (eds.): Cryptographic Hardware and Embedded Systems - CHES 2000, Springer, Berlin
    • W. Schindler: A Timing Attack against RSA with the Chinese Remainder Theorem. In: Ç.K. Koç, C. Paar (eds.): Cryptographic Hardware and Embedded Systems - CHES 2000, Springer, Lecture Notes in Computer Science 1965, Berlin (2000), 110-125.
    • (2000) Lecture Notes in Computer Science , vol.1965 , pp. 110-125
    • Schindler, W.1
  • 11
    • 84946828535 scopus 로고    scopus 로고
    • Improving divide and conquer attacks against cryptosystems by better error detection / correction strategies
    • B. Honary (ed.): Cryptography and Coding - IMA 2001, Springer, Berlin
    • W. Schindler, F. Koeune, J.-J. Quisquater: Improving Divide and Conquer Attacks Against Cryptosystems by Better Error Detection / Correction Strategies. In: B. Honary (ed.): Cryptography and Coding - IMA 2001, Springer, Lecture Notes in Computer Science 2280, Berlin (2001), 245-267.
    • (2001) Lecture Notes in Computer Science , vol.2280 , pp. 245-267
    • Schindler, W.1    Koeune, F.2    Quisquater, J.-J.3
  • 12
    • 24144473659 scopus 로고    scopus 로고
    • On the optimization of side-channel attacks by advanced stochastic methods
    • , In: S. Vaudenay (ed.): Public Key Cryptography - PKC 2005, Springer, Berlin
    • W. Schindler: On the Optimization of Side-Channel Attacks by Advanced Stochastic Methods, In: S. Vaudenay (ed.): Public Key Cryptography - PKC 2005, Springer, Lecture Notes in Computer Science 3386, Berlin 2005, 85-103.
    • (2005) Lecture Notes in Computer Science , vol.3386 , pp. 85-103
    • Schindler, W.1
  • 13
    • 33745773553 scopus 로고    scopus 로고
    • GNU Project: GMP: http://www.swox.com/gmp/.
  • 14
    • 33745791387 scopus 로고    scopus 로고
    • OpenSSL Project: OpenSSL: http://www.openssl.org.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.