-
1
-
-
0009983757
-
A study of Internet round-trip delay
-
Tech. rep. CS-TR-3736, Department of Computer Science, University of Maryland
-
ACHARYA, A. AND SALTZ, J. 1996. A study of Internet round-trip delay. Tech. rep. CS-TR-3736, Department of Computer Science, University of Maryland.
-
(1996)
-
-
ACHARYA, A.1
SALTZ, J.2
-
3
-
-
84944627047
-
-
ACIIÇMEZ, O., ÇETIN KAYA KOÇ, AND SEIFERT, J.-P. 2007a. Predicting secret keys via branch prediction. In Proceedings of the Cryptographers' Track at the RSA Conference (CT-RSA'07). San Francisco, 225-242.
-
ACIIÇMEZ, O., ÇETIN KAYA KOÇ, AND SEIFERT, J.-P. 2007a. Predicting secret keys via branch prediction. In Proceedings of the Cryptographers' Track at the RSA Conference (CT-RSA'07). San Francisco, 225-242.
-
-
-
-
4
-
-
33745773656
-
-
ACIIÇMEZ, O., SCHINDLER, W., AND ÇETIN K. KOÇ. 2005. Improving brumley and boneh timing attack on unprotected ssl implementations. In Proceedings of the 12th ACM Conference on Computer and Communications Security (CCS'05). Alexandria, VA, 139-146.
-
ACIIÇMEZ, O., SCHINDLER, W., AND ÇETIN K. KOÇ. 2005. Improving brumley and boneh timing attack on unprotected ssl implementations. In Proceedings of the 12th ACM Conference on Computer and Communications Security (CCS'05). Alexandria, VA, 139-146.
-
-
-
-
6
-
-
34548031415
-
Micro-architectural cryptanalysis
-
ACIIÇMEZ, O., SEIFERT, J.-P., AND ÇETIN KAYA KOÇ. 2007c. Micro-architectural cryptanalysis. IEEE Secur. Privacy 5, 4, 62-64.
-
(2007)
IEEE Secur. Privacy 5
, vol.4
, pp. 62-64
-
-
ACIIÇMEZ, O.1
SEIFERT, J.-P.2
KAYA KOÇ, C.3
-
7
-
-
50249171782
-
Compromising reflections or how to read lcd monitors around the corner
-
Oakland, CA
-
BACKES, M., DÜRMUTH, M., AND UNRUH, D. 2008. Compromising reflections or how to read lcd monitors around the corner. In Proceedings of the IEEE Symposium on Security and Privacy (SP'08). Oakland, CA.
-
(2008)
Proceedings of the IEEE Symposium on Security and Privacy (SP'08)
-
-
BACKES, M.1
DÜRMUTH, M.2
UNRUH, D.3
-
8
-
-
0035361868
-
Critical path analysis of TCP transactions
-
BARFORD, P. AND CROVELLA, M. 2001. Critical path analysis of TCP transactions. IEEE / ACM Trans. Netw. 9, 3, 238-248.
-
(2001)
IEEE / ACM Trans. Netw
, vol.9
, Issue.3
, pp. 238-248
-
-
BARFORD, P.1
CROVELLA, M.2
-
10
-
-
84976485825
-
End-to-end packet delay and loss behavior in the Internet
-
San Francisco, CA
-
BOLOT, J.-C. 1993. End-to-end packet delay and loss behavior in the Internet. In Proceedings of the ACM SIGCOMM Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication (SIGCOMM'93). San Francisco, CA, 289-298.
-
(1993)
Proceedings of the ACM SIGCOMM Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication (SIGCOMM'93)
, pp. 289-298
-
-
BOLOT, J.-C.1
-
11
-
-
35348884907
-
Exposing private information by timing web applications
-
Banff, Alberta, Canada
-
BORTZ, A., BONEH, D., AND NANDY, P. 2007. Exposing private information by timing web applications. In ceedings of the 16th International World Wide Web Conference (WWW'07) Banff, Alberta, Canada.
-
(2007)
ceedings of the 16th International World Wide Web Conference (WWW'07)
-
-
BORTZ, A.1
BONEH, D.2
NANDY, P.3
-
13
-
-
35248836120
-
Password interception in a TLS/SSL channel
-
Proceedings of the Annual International Cryptology Conference CRYPTO'03, Springer-Verlag
-
CANVEL, B., HILTGEN, A., VUAGNOUX, M., AND VAUDENAY, S. 2003. Password interception in a TLS/SSL channel. In Proceedings of the Annual International Cryptology Conference (CRYPTO'03). Lecture Notes in Computer Science, vol. 2729. Springer-Verlag, 583-599.
-
(2003)
Lecture Notes in Computer Science
, vol.2729
, pp. 583-599
-
-
CANVEL, B.1
HILTGEN, A.2
VUAGNOUX, M.3
VAUDENAY, S.4
-
14
-
-
0018456171
-
Universal classes of hash functions
-
CARTER, J. L. AND WEGMAN, M. N. 1979. Universal classes of hash functions. J. Comput. Syst. Sci. 18, 2, 143-154.
-
(1979)
J. Comput. Syst. Sci
, vol.18
, Issue.2
, pp. 143-154
-
-
CARTER, J.L.1
WEGMAN, M.N.2
-
15
-
-
14844350422
-
A fine-grained view of high-performance networking
-
CASNER, S., ALAETTINOGLU, C., AND KUAN, C.-C. 2001. A fine-grained view of high-performance networking. NANOG22 meeting. http://www.nanog.org/mtg-0105/casner.html.
-
(2001)
NANOG22 meeting
-
-
CASNER, S.1
ALAETTINOGLU, C.2
KUAN, C.-C.3
-
16
-
-
10444287344
-
PlanetLab: An overlay testbed for broad-coverage services
-
CHUN, B., CULLER, D., ROSCOE, T., BAVIER, A., PETERSON, L., WAWRZONIAK, M., AND BOWMAN, M. 2003. PlanetLab: An overlay testbed for broad-coverage services. Comput. Comm. Rev. 33, 3.
-
(2003)
Comput. Comm. Rev
, vol.33
, pp. 3
-
-
CHUN, B.1
CULLER, D.2
ROSCOE, T.3
BAVIER, A.4
PETERSON, L.5
WAWRZONIAK, M.6
BOWMAN, M.7
-
17
-
-
0000524071
-
Measurement considerations for assessing unidirectional latencies
-
CLAFFY, K. C., POLYZOS, G. C., AND BRAUN, H.-W. 1993. Measurement considerations for assessing unidirectional latencies. Internetw.: Resear. Exper. 4, 3, 121-132.
-
(1993)
Internetw.: Resear. Exper
, vol.4
, Issue.3
, pp. 121-132
-
-
CLAFFY, K.C.1
POLYZOS, G.C.2
BRAUN, H.-W.3
-
22
-
-
0033705991
-
Side channel cryptanalysis of product ciphers
-
KELSEY, J., SCHNEIER, B., WAGNER, D., AND HALL, C. 2000. Side channel cryptanalysis of product ciphers. J. Comput. Secur. 8, 2-3, 141-158.
-
(2000)
J. Comput. Secur
, vol.8
, Issue.2-3
, pp. 141-158
-
-
KELSEY, J.1
SCHNEIER, B.2
WAGNER, D.3
HALL, C.4
-
23
-
-
84943632039
-
Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems
-
Proceedings of the Annual International Cryptology Conference CRYPTO'96, N. Koblitz, Ed, Springer-Verlag, Santa Barbara, CA
-
KOCHER, P. 1996. Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems. In Proceedings of the Annual International Cryptology Conference (CRYPTO'96). N. Koblitz, Ed. Lecture Notes in Computer Science, vol. 1109. Springer-Verlag, Santa Barbara, CA.
-
(1996)
Lecture Notes in Computer Science
, vol.1109
-
-
KOCHER, P.1
-
24
-
-
84939573910
-
Differential power analysis
-
Proceedings of the Annual International Cryptology Conference CRYPTO'99, Wiener, 1666. Springer-Verlag, Santa Barbara, CA
-
KOCHER, P., JAFFE, J., AND JUN, B. 1999. Differential power analysis. In Proceedings of the Annual International Cryptology Conference (CRYPTO'99). M. Wiener, Ed. Lecture Notes in Computer Science, vol. 1666. Springer-Verlag, Santa Barbara, CA.
-
(1999)
Ed. Lecture Notes in Computer Science
, vol.1000
-
-
KOCHER, P.1
JAFFE, J.2
JUN, B.3
-
25
-
-
24344507334
-
Remote physical device fingerprinting
-
Oakland, CA
-
KOHNO, T., BROIDO, A., AND CLAFFY, K. 2005. Remote physical device fingerprinting. In Proceedings of the IEEE Symposium on Security and Privacy (SP'05). Oakland, CA.
-
(2005)
Proceedings of the IEEE Symposium on Security and Privacy (SP'05)
-
-
KOHNO, T.1
BROIDO, A.2
CLAFFY, K.3
-
28
-
-
84984039280
-
-
LAMPSON, B. W. 1983. Hints for computer system design. SIGOPS Oper. Syst. Rev. 15, 5, 33-48. IEEE Softw. 1, 1, 11-28.
-
LAMPSON, B. W. 1983. Hints for computer system design. SIGOPS Oper. Syst. Rev. 15, 5, 33-48. IEEE Softw. 1, 1, 11-28.
-
-
-
-
29
-
-
0026242010
-
Internet time synchronization: The Network Time Protocol
-
MILLS, D. L. 1991. Internet time synchronization: The Network Time Protocol. IEEE Trans. Comm. 39, 10, 1482-1493.
-
(1991)
IEEE Trans. Comm
, vol.39
, Issue.10
, pp. 1482-1493
-
-
MILLS, D.L.1
-
32
-
-
0028758682
-
On the dynamics and significance of low frequency components of Internet load
-
MUKHERJEE, A. 1994. On the dynamics and significance of low frequency components of Internet load. Internetw.: Resear. Exper. 5, 4, 163-205.
-
(1994)
Internetw.: Resear. Exper
, vol.5
, Issue.4
, pp. 163-205
-
-
MUKHERJEE, A.1
-
33
-
-
33745640963
-
Cache attacks and countermeasures: The case of AES
-
Proceedings of the Cryptographers' Track at the RSA Conference CT-RSA'06, Springer
-
OSVIK, D. A., SHAMIR, A., AND TROMER, E. 2006. Cache attacks and countermeasures: The case of AES. In Proceedings of the Cryptographers' Track at the RSA Conference (CT-RSA'06). Lecture Notes in Computer Science, vol. 3860. Springer, 1-20.
-
(2006)
Lecture Notes in Computer Science
, vol.3860
, pp. 1-20
-
-
OSVIK, D.A.1
SHAMIR, A.2
TROMER, E.3
-
34
-
-
1942457187
-
Theoretical use of cache memory as a cryptanalytic side-channel
-
Tech. rep. CSTR-02-003, Department of Computer Science, University of Bristol
-
PAGE, D. 2002. Theoretical use of cache memory as a cryptanalytic side-channel. Tech. rep. CSTR-02-003, Department of Computer Science, University of Bristol.
-
(2002)
-
-
PAGE, D.1
-
39
-
-
0027311480
-
Experimental assessment of end-to-end behavior on Internet
-
San Francisco, CA
-
SANGHI, D., AGRAWALA, A. K., GUDMUNDSSON, O., AND JAIN, B. N. 1993. Experimental assessment of end-to-end behavior on Internet. In Proceedings of the 12th Annual Joint Conference of the IEEE Computer and Communications Societies (CCS'93). San Francisco, CA. 867-874.
-
(1993)
Proceedings of the 12th Annual Joint Conference of the IEEE Computer and Communications Societies (CCS'93)
, pp. 867-874
-
-
SANGHI, D.1
AGRAWALA, A.K.2
GUDMUNDSSON, O.3
JAIN, B.N.4
-
41
-
-
84983436061
-
Optimized timing attacks against public key cryptosystems
-
SCHINDLERW. 2002. Optimized timing attacks against public key cryptosystems. Statistics Decisions 20, 191-210.
-
(2002)
Statistics Decisions
, vol.20
, pp. 191-210
-
-
SCHINDLERW1
-
43
-
-
85084161110
-
Timing analysis of keystrokes and timing attacks on SSH
-
Washington, DC
-
SONG, D. X., WAGNER, D., AND TIAN, X. 2001. Timing analysis of keystrokes and timing attacks on SSH. In Proceedings of the 10th USENIX Security Symposium (SECURITT'01). Washington, DC.
-
(2001)
Proceedings of the 10th USENIX Security Symposium (SECURITT'01)
-
-
SONG, D.X.1
WAGNER, D.2
TIAN, X.3
-
44
-
-
14944359938
-
Robust synchronization of software clocks across the Internet
-
Taormina, Sicily, Italy
-
VEITCH, D., BABU, S., AND PASZTOR, A. 2004. Robust synchronization of software clocks across the Internet. In Proceedings of the 4th ACM SIGCOMM Conference on Internet Measurement. Taormina, Sicily, Italy, 219-232.
-
(2004)
Proceedings of the 4th ACM SIGCOMM Conference on Internet Measurement
, pp. 219-232
-
-
VEITCH, D.1
BABU, S.2
PASZTOR, A.3
-
45
-
-
33646704796
-
Challenges and lessons learned in measuring path RTT for proximity-based applications
-
San Diego, CA
-
WANG, Z., ZEITOUN, A., AND JAMIN, S. 2003. Challenges and lessons learned in measuring path RTT for proximity-based applications. In Proceedings of the Passive and Active Measurement Workshop (PAM'03). San Diego, CA.
-
(2003)
Proceedings of the Passive and Active Measurement Workshop (PAM'03)
-
-
WANG, Z.1
ZEITOUN, A.2
JAMIN, S.3
|