-
1
-
-
33745773656
-
Improving Brumley and Boneh Timing Attack on Unprotected SSL Implementations
-
Alexandria, Virginia, November 7-11
-
th ACM Conference on Computer and Communications Security, pages 139-146, Alexandria, Virginia, November 7-11, 2005.
-
(2005)
th ACM Conference on Computer and Communications Security
, pp. 139-146
-
-
Acıiçmez, O.1
Schindler, W.2
Koç, Ç.K.3
-
5
-
-
24744459871
-
AES Power Attack Based on Induced Cache Miss and Countermeasure
-
4-6 April 2005, Las Vegas, Nevada, USA
-
G. Bertoni, V. Zaccaria, L. Breveglieri, M. Monchiero, and G. Palermo. AES Power Attack Based on Induced Cache Miss and Countermeasure. International Symposium on Information Technology: Coding and Computing - ITCC 2005, Volume 1, 4-6 April 2005, Las Vegas, Nevada, USA.
-
(2005)
International Symposium on Information Technology: Coding and Computing - ITCC
, vol.1
-
-
Bertoni, G.1
Zaccaria, V.2
Breveglieri, L.3
Monchiero, M.4
Palermo, G.5
-
8
-
-
85025592809
-
-
Cryptographic Key Length Recommendation. Available at: http://www.keylength.com
-
-
-
-
10
-
-
0033705991
-
Side Channel Cryptanalysis of Product Ciphers
-
J. Kelsey, B. Schneier, D. Wagner, and C. Hall. Side Channel Cryptanalysis of Product Ciphers. Journal of Computer Security, vol.8, pages 141-158, 2000.
-
(2000)
Journal of Computer Security
, vol.8
, pp. 141-158
-
-
Kelsey, J.1
Schneier, B.2
Wagner, D.3
Hall, C.4
-
11
-
-
84943632039
-
Timing Attacks on Implementations of Diffie–Hellman, RSA, DSS, and Other Systems
-
N. Koblitz, editors, pages, Springer-Verlag, LNCS Nr. 1109
-
P. C. Kocher. Timing Attacks on Implementations of Diffie–Hellman, RSA, DSS, and Other Systems. Advances in Cryptology - CRYPTO ’96, N. Koblitz, editors, pages 104-113, Springer-Verlag, LNCS Nr. 1109, 1996.
-
(1996)
Advances in Cryptology - CRYPTO ’96
, pp. 104-113
-
-
Kocher, P.C.1
-
12
-
-
84896824646
-
Collision attacks on processors with cache and countermeasures
-
C. Wolf, S. Lucks, and P.-W. Yau, editors, pages
-
C. Lauradoux. Collision attacks on processors with cache and countermeasures. Western European Workshop on Research in Cryptology - WEWoRC 2005, C. Wolf, S. Lucks, and P.-W. Yau, editors, pages 76-85, 2005.
-
(2005)
Western European Workshop on Research in Cryptology - Weworc 2005
, pp. 76-85
-
-
Lauradoux, C.1
-
13
-
-
33750821066
-
A refined look at Bernstein’s AES side-channel analysis
-
Taiwan, March
-
M. Neve, J.-P. Seifert, and Z. Wang. A refined look at Bernstein’s AES side-channel analysis. Proceedings of ACM Symposium on Information, Computer and Communications Security - ASIACCS’06, Taipei, Taiwan, March 21-24, 2006.
-
(2006)
Proceedings of ACM Symposium on Information, Computer and Communications Security - ASIACCS’06, Taipei
, pp. 21-24
-
-
Neve, M.1
Seifert, J.-P.2
Wang, Z.3
-
15
-
-
33745640963
-
Cache Attacks and Countermeasures: The Case of AES
-
D. Pointcheval, editor, pages 1-20, Springer-Verlag, LNCS Nr. 3860, 2006
-
D. A. Osvik, A. Shamir, and E. Tromer. Cache Attacks and Countermeasures: The Case of AES. Topics in Cryptology - CT-RSA 2006, The Cryptographers’ Track at the RSA Conference 2006, D. Pointcheval, editor, pages 1-20, Springer-Verlag, LNCS Nr. 3860, 2006.
-
(2006)
Topics in Cryptology - CT-RSA 2006, the Cryptographers’ Track at the RSA Conference
-
-
Osvik, D.A.1
Shamir, A.2
Tromer, E.3
-
16
-
-
1942457187
-
Theoretical Use of Cache Memory as a Cryptanalytic Side-Channel. Technical Report CSTR-02-003, Department of Computer Science
-
D. Page. Theoretical Use of Cache Memory as a Cryptanalytic Side-Channel. Technical Report CSTR-02-003, Department of Computer Science, University of Bristol, June 2002.
-
(2002)
University of Bristol
, vol.June
-
-
Page, D.1
-
18
-
-
35248855964
-
-
Cryptographic Hardware and Embedded Systems - CHES 2003, C. D. Walter, Ç. K. Koç, and C. Paar, editors, pages, Springer-Verlag, LNCS Nr. 2779
-
Y. Tsunoo, T. Saito, T. Suzaki, M. Shigeri, and H. Miyauchi. Cryptanalysis of DES Implemented on Computers with Cache. Cryptographic Hardware and Embedded Systems - CHES 2003, C. D. Walter, Ç. K. Koç, and C. Paar, editors, pages 62-76, Springer-Verlag, LNCS Nr. 2779, 2003.
-
(2003)
Cryptanalysis of DES Implemented on Computers with Cache
, pp. 62-76
-
-
Tsunoo, Y.1
Saito, T.2
Suzaki, T.3
Shigeri, M.4
Miyauchi, H.5
-
19
-
-
33750825939
-
Cryptanalysis of Block Ciphers Implemented on Computers with Cache
-
Y. Tsunoo, E. Tsujihara, K. Minematsu, and H. Miyauchi. Cryptanalysis of Block Ciphers Implemented on Computers with Cache. ISITA 2002, 2002.
-
(2002)
ISITA
, vol.2002
-
-
Tsunoo, Y.1
Tsujihara, E.2
Minematsu, K.3
Miyauchi, H.4
-
20
-
-
33745145787
-
Improving cache attacks by considering cipher structure
-
Y. Tsunoo, E. Tsujihara, M. Shigeri, H. Kubo, and K. Minematsu. Improving cache attacks by considering cipher structure. International Journal of Information Security, February 2006.
-
(2006)
International Journal of Information Security
, vol.February
-
-
Tsunoo, Y.1
Tsujihara, E.2
Shigeri, M.3
Kubo, H.4
Minematsu, K.5
|