-
1
-
-
79960321311
-
Trace-Driven Cache Attacks on AES
-
(Short Paper). Ning, P., Qing, S., Li, N. (eds.) ICICS 2006. Springer, Heidelberg
-
Aciiçmez, O., Koç, Ç.K.: Trace-Driven Cache Attacks on AES (Short Paper). In: Ning, P., Qing, S., Li, N. (eds.) ICICS 2006. LNCS, vol. 4307, pp. 112-121. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4307
, pp. 112-121
-
-
Aciiçmez, O.1
Koç, Ç.K.2
-
2
-
-
85022027006
-
Cache Based Remote Timing Attack on the AES
-
Abe, M. (ed.) CT-RSA 2007. Springer, Heidelberg
-
Aciiçmez, O., Schindler, W., Koç, Ç.K.: Cache Based Remote Timing Attack on the AES. In: Abe, M. (ed.) CT-RSA 2007. LNCS, vol. 4377, pp. 271-286. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4377
, pp. 271-286
-
-
Aciiçmez, O.1
Schindler, W.2
Koç, Ç.K.3
-
4
-
-
84865818780
-
-
Technical report. Global Platform Inc.
-
Bailey, S.A., Felton, D., Galindo, V., Hauswirth, F., Hirvimies, J., Fokle, M., Morenius, F., Colas, C., Galvan, J.-P.: The trusted execution environment: Delivering enhanced security at a lower cost to the mobile market. Technical report. Global Platform Inc. (2011)
-
(2011)
The Trusted Execution Environment: Delivering Enhanced Security at a Lower Cost to the Mobile Market
-
-
Bailey, S.A.1
Felton, D.2
Galindo, V.3
Hauswirth, F.4
Hirvimies, J.5
Fokle, M.6
Morenius, F.7
Colas, C.8
Galvan, J.-P.9
-
5
-
-
84865820057
-
-
Barreto, P., Bosselaers, A., Rijmen, V.: Optimised ANSI C code for the Rijndael cipher, now AES (2000), http://fastcrypto.org/front/misc/rijndael-alg- fst.c
-
(2000)
Optimised ANSI C Code for the Rijndael Cipher, Now AES
-
-
Barreto, P.1
Bosselaers, A.2
Rijmen, V.3
-
8
-
-
77952033303
-
Differential cache-collision timing attacks on aes with applications to embedded cpus
-
Bogdanov, A., Eisenbarth, T., Paar, C., Wienecke, M.: Differential cache-collision timing attacks on aes with applications to embedded cpus. In: The Cryptographer's Track at RSA Conference, pp. 235-251 (2010)
-
(2010)
The Cryptographer's Track at RSA Conference
, pp. 235-251
-
-
Bogdanov, A.1
Eisenbarth, T.2
Paar, C.3
Wienecke, M.4
-
9
-
-
33750814106
-
Cache-Collision Timing Attacks Against AES
-
Goubin, L., Matsui, M. (eds.) CHES 2006. Springer, Heidelberg
-
Bonneau, J., Mironov, I.: Cache-Collision Timing Attacks Against AES. In: Goubin, L., Matsui, M. (eds.) CHES 2006. LNCS, vol. 4249, pp. 201-215. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4249
, pp. 201-215
-
-
Bonneau, J.1
Mironov, I.2
-
10
-
-
72449122383
-
Cache-Timing Template Attacks
-
Matsui, M. (ed.) ASIACRYPT 2009. Springer, Heidelberg
-
Brumley, B.B., Hakala, R.M.: Cache-Timing Template Attacks. In: Matsui, M. (ed.) ASIACRYPT 2009. LNCS, vol. 5912, pp. 667-684. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5912
, pp. 667-684
-
-
Brumley, B.B.1
Hakala, R.M.2
-
11
-
-
84865807742
-
-
accessed September 15 (2011)
-
Intel Corporation. Intel R® virtualization technology list (accessed September 15 (2011), http://ark.intel.com/VTList.aspx
-
Intel R® Virtualization Technology List
-
-
-
12
-
-
84865820894
-
-
Brian Gladman (2008), http://gladman.plushost.co.uk/oldsite/AES/aes-byte- 29-08-08.zip
-
(2008)
-
-
Gladman, B.1
-
13
-
-
84865815611
-
-
GlobalPlatform Inc. Version 1.0 July
-
GlobalPlatform Inc. TEE Client API Specification Version 1.0 (July 2010)
-
(2010)
TEE Client API Specification
-
-
-
14
-
-
39849091652
-
Where does security stand? New vulnerabilities vs. trusted computing
-
Gueron, S., Stronqin, G., Seifert, J.-P., Chiou, D., Sendag, R., Yi, J.J.: Where does security stand? new vulnerabilities vs. trusted computing. IEEE Micro 27(6), 25-35 (2007)
-
(2007)
IEEE Micro
, vol.27
, Issue.6
, pp. 25-35
-
-
Gueron, S.1
Stronqin, G.2
Seifert, J.-P.3
Chiou, D.4
Sendag, R.5
Yi, J.J.6
-
15
-
-
80051974249
-
Cache Games - Bringing access-based cache attacks on AES to practice
-
IEEE Computer Society
-
Gullasch, D., Bangerter, E., Krenn, S.: Cache Games - Bringing access-based cache attacks on AES to practice. In: IEEE Symposium on Security and Privacy, S&P 2011. IEEE Computer Society (2011)
-
(2011)
IEEE Symposium on Security and Privacy, S&P 2011
-
-
Gullasch, D.1
Bangerter, E.2
Krenn, S.3
-
16
-
-
33750821066
-
A refined look at bernstein's aes side-channel analysis
-
Neve, M., Seifert, J.-P., Wang, Z.: A refined look at bernstein's aes side-channel analysis. In: ASIACCS, p. 369 (2006)
-
(2006)
ASIACCS
, pp. 369
-
-
Neve, M.1
Seifert, J.-P.2
Wang, Z.3
-
17
-
-
33745640963
-
Cache Attacks and Countermeasures: The Case of AES
-
Pointcheval, D. (ed.) CT-RSA 2006. Springer, Heidelberg
-
Osvik, D.A., Shamir, A., Tromer, E.: Cache Attacks and Countermeasures: The Case of AES. In: Pointcheval, D. (ed.) CT-RSA 2006. LNCS, vol. 3860, pp. 1-20. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.3860
, pp. 1-20
-
-
Osvik, D.A.1
Shamir, A.2
Tromer, E.3
-
20
-
-
74049152260
-
Hey, you, get off of my cloud: Exploring information leakage in third-party compute clouds
-
ACM, New York
-
Ristenpart, T., Tromer, E., Shacham, H., Savage, S.: Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds. In: Proceedings of the 16th ACM Conference on Computer and Communications Security, CCS 2009, pp. 199-212. ACM, New York (2009)
-
(2009)
Proceedings of the 16th ACM Conference on Computer and Communications Security, CCS 2009
, pp. 199-212
-
-
Ristenpart, T.1
Tromer, E.2
Shacham, H.3
Savage, S.4
-
23
-
-
84883286945
-
-
accessed April 6, 2011
-
TU Dresden Operating Systems Group. The Fiasco microkernel, http://os.inf.tu-dresden.de/fiasco/ (accessed April 6, 2011)
-
The Fiasco Microkernel
-
-
|