메뉴 건너뛰기




Volumn 4307 LNCS, Issue , 2006, Pages 112-121

Trace-driven cache attacks on AES

Author keywords

AES; Cache attacks; Side channel analysis; Trace driven attacks

Indexed keywords

COST BENEFIT ANALYSIS;

EID: 79960321311     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/11935308_9     Document Type: Conference Paper
Times cited : (120)

References (20)
  • 8
    • 85025592809 scopus 로고    scopus 로고
    • Cryptographic Key Length Recommendation. Available at: http://www.keylength.com
  • 11
    • 84943632039 scopus 로고    scopus 로고
    • Timing Attacks on Implementations of Diffie–Hellman, RSA, DSS, and Other Systems
    • N. Koblitz, editors, pages, Springer-Verlag, LNCS Nr. 1109
    • P. C. Kocher. Timing Attacks on Implementations of Diffie–Hellman, RSA, DSS, and Other Systems. Advances in Cryptology - CRYPTO ’96, N. Koblitz, editors, pages 104-113, Springer-Verlag, LNCS Nr. 1109, 1996.
    • (1996) Advances in Cryptology - CRYPTO ’96 , pp. 104-113
    • Kocher, P.C.1
  • 12
    • 84896824646 scopus 로고    scopus 로고
    • Collision attacks on processors with cache and countermeasures
    • C. Wolf, S. Lucks, and P.-W. Yau, editors, pages
    • C. Lauradoux. Collision attacks on processors with cache and countermeasures. Western European Workshop on Research in Cryptology - WEWoRC 2005, C. Wolf, S. Lucks, and P.-W. Yau, editors, pages 76-85, 2005.
    • (2005) Western European Workshop on Research in Cryptology - Weworc 2005 , pp. 76-85
    • Lauradoux, C.1
  • 16
    • 1942457187 scopus 로고    scopus 로고
    • Theoretical Use of Cache Memory as a Cryptanalytic Side-Channel. Technical Report CSTR-02-003, Department of Computer Science
    • D. Page. Theoretical Use of Cache Memory as a Cryptanalytic Side-Channel. Technical Report CSTR-02-003, Department of Computer Science, University of Bristol, June 2002.
    • (2002) University of Bristol , vol.June
    • Page, D.1
  • 18
    • 35248855964 scopus 로고    scopus 로고
    • Cryptographic Hardware and Embedded Systems - CHES 2003, C. D. Walter, Ç. K. Koç, and C. Paar, editors, pages, Springer-Verlag, LNCS Nr. 2779
    • Y. Tsunoo, T. Saito, T. Suzaki, M. Shigeri, and H. Miyauchi. Cryptanalysis of DES Implemented on Computers with Cache. Cryptographic Hardware and Embedded Systems - CHES 2003, C. D. Walter, Ç. K. Koç, and C. Paar, editors, pages 62-76, Springer-Verlag, LNCS Nr. 2779, 2003.
    • (2003) Cryptanalysis of DES Implemented on Computers with Cache , pp. 62-76
    • Tsunoo, Y.1    Saito, T.2    Suzaki, T.3    Shigeri, M.4    Miyauchi, H.5
  • 19
    • 33750825939 scopus 로고    scopus 로고
    • Cryptanalysis of Block Ciphers Implemented on Computers with Cache
    • Y. Tsunoo, E. Tsujihara, K. Minematsu, and H. Miyauchi. Cryptanalysis of Block Ciphers Implemented on Computers with Cache. ISITA 2002, 2002.
    • (2002) ISITA , vol.2002
    • Tsunoo, Y.1    Tsujihara, E.2    Minematsu, K.3    Miyauchi, H.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.