메뉴 건너뛰기




Volumn 5, Issue 4, 2007, Pages 62-64

Micro-architectural cryptanalysis

Author keywords

[No Author keywords available]

Indexed keywords

ALGORITHMS; COMPUTER ARCHITECTURE; INFORMATION RETRIEVAL; MICROPROCESSOR CHIPS;

EID: 34548031415     PISSN: 15407993     EISSN: None     Source Type: Journal    
DOI: 10.1109/MSP.2007.91     Document Type: Article
Times cited : (24)

References (12)
  • 1
    • 84943632039 scopus 로고    scopus 로고
    • Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems
    • Advances in Cryptology CRYPTO 96, N. Koblitz, ed, Springer-Verlag
    • P.C. Kocher, "Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems," Advances in Cryptology (CRYPTO 96), LNCS 1109, N. Koblitz, ed., Springer-Verlag, 1996, pp. 104-113.
    • (1996) LNCS , vol.1109 , pp. 104-113
    • Kocher, P.C.1
  • 2
    • 84939573910 scopus 로고    scopus 로고
    • P.C. Kocher, J. Jaffe, and B. Jun, Differential Power Analysis, Advances in Cryptology (CRYPTO 99), LNCS 1666, M. Wiener, ed., Springer-Verlag, 1999, pp. 388-397.
    • P.C. Kocher, J. Jaffe, and B. Jun, "Differential Power Analysis," Advances in Cryptology (CRYPTO 99), LNCS 1666, M. Wiener, ed., Springer-Verlag, 1999, pp. 388-397.
  • 3
    • 35248862449 scopus 로고    scopus 로고
    • Electromagnetic Analysis: Concrete Results
    • Cryptographic Hardware and Embedded Systems CHES 01, Ç.K. Koç, D Naccache, and C. Paar, eds, Springer-Verlag
    • K. Gandolfi, C. Mourtel, and F. Olivier, "Electromagnetic Analysis: Concrete Results," Cryptographic Hardware and Embedded Systems (CHES 01), LNCS 2162, Ç.K. Koç, D Naccache, and C. Paar, eds., Springer-Verlag, 2001, pp. 251-261.
    • (2001) LNCS , vol.2162 , pp. 251-261
    • Gandolfi, K.1    Mourtel, C.2    Olivier, F.3
  • 4
    • 85032541897 scopus 로고    scopus 로고
    • Remote Timing Attacks are Practical
    • Usenix Assoc
    • D Brumley and D. Boneh, "Remote Timing Attacks are Practical," Proc. 12th Usenix Security Symp., Usenix Assoc., 2003, pp. 1-14.
    • (2003) Proc. 12th Usenix Security Symp , pp. 1-14
    • Brumley, D.1    Boneh, D.2
  • 5
    • 33745773656 scopus 로고    scopus 로고
    • O. Actiçmez, W Schindler, and Ç.K. Koç, Improving Brumley and Boneh Timing Attack on Unprotected SSL Implementations, Proc. 12th ACM Conf. Computer and Comm. Security (ACM-CCS 05), C. Meadows and P. Syverson, eds., ACM Press, 2005, pp. 139-146.
    • O. Actiçmez, W Schindler, and Ç.K. Koç, "Improving Brumley and Boneh Timing Attack on Unprotected SSL Implementations," Proc. 12th ACM Conf. Computer and Comm. Security (ACM-CCS 05), C. Meadows and P. Syverson, eds., ACM Press, 2005, pp. 139-146.
  • 6
    • 85022027006 scopus 로고    scopus 로고
    • O. Aciiçmez, W Schindler, and Ç.K. Koç, Cache-Based Remote Timing Attack on the AES, Cryptographers' Track at the RSA Conf (CT-RSA 07), LNCS 4377, M. Abe, ed., Springer-Verlag, 2007, pp. 271-286.
    • O. Aciiçmez, W Schindler, and Ç.K. Koç, "Cache-Based Remote Timing Attack on the AES," Cryptographers' Track at the RSA Conf (CT-RSA 07), LNCS 4377, M. Abe, ed., Springer-Verlag, 2007, pp. 271-286.
  • 8
    • 79959534939 scopus 로고    scopus 로고
    • Yet Another Micro-Architectural Attack: Exploiting I-Cache
    • May
    • O. Aciiçmez, "Yet Another Micro-Architectural Attack: Exploiting I-Cache," Cryptology ePrint Archive, report 2007/164, May 2007.
    • (2007) Cryptology ePrint Archive, report , vol.2007 , Issue.164
    • Aciiçmez, O.1
  • 10
    • 43149085683 scopus 로고    scopus 로고
    • O. Aciiçmez and J.-P. Seifert, Cheap Hardware Parallelism Implies Cheap Security, to be published in Fault Diagnosis and Tolerance in Cryptography (FDCT 07), IEEE CS Press, 2007.
    • O. Aciiçmez and J.-P. Seifert, "Cheap Hardware Parallelism Implies Cheap Security," to be published in Fault Diagnosis and Tolerance in Cryptography (FDCT 07), IEEE CS Press, 2007.
  • 11
    • 84944627047 scopus 로고    scopus 로고
    • O. Aciiçmez, Ç.K. Koç, and J.-P. Seifert, Predicting Secret Keys via Branch Prediction, Cryptographers' Track at the RSA Conf. (CT-RSA 07), LNCS 4377, M. Abe, ed., Springer-Verlag, 2007, pp. 225-242.
    • O. Aciiçmez, Ç.K. Koç, and J.-P. Seifert, "Predicting Secret Keys via Branch Prediction," Cryptographers' Track at the RSA Conf. (CT-RSA 07), LNCS 4377, M. Abe, ed., Springer-Verlag, 2007, pp. 225-242.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.