-
1
-
-
78049348331
-
New results on instruction cache attacks
-
O. Aciicmez, B.B. Brumley, P. Grabher, New results on instruction cache attacks, in: Cryptographic Hardware and Embedded Systems-CHES 2010, LNCS, vol. 6225, 2010, pp. 110-124.
-
(2010)
Cryptographic Hardware and Embedded Systems-CHES 2010, LNCS
, vol.6225
, pp. 110-124
-
-
Aciicmez, O.1
Brumley, B.B.2
Grabher, P.3
-
3
-
-
72449122383
-
Cache-timing template attacks
-
B.B. Brumley, R.M. Hakala, Cache-timing template attacks, in: Advances in Cryptology-ASIACRYPT 2009, LNCS, vol. 5912, 2009, pp. 677-684.
-
(2009)
Advances in Cryptology-ASIACRYPT 2009, LNCS
, vol.5912
, pp. 677-684
-
-
Brumley, B.B.1
Hakala, R.M.2
-
4
-
-
18844454571
-
Remote timing attacks are practical
-
D. Brumley, and D. Boneh Remote timing attacks are practical Computer Networks 48 5 2005 701 716
-
(2005)
Computer Networks
, vol.48
, Issue.5
, pp. 701-716
-
-
Brumley, D.1
Boneh, D.2
-
6
-
-
0001494997
-
Small solutions to polynomial equations and low exponent RSA vulnerabilities
-
D. Coppersmith Small solutions to polynomial equations and low exponent RSA vulnerabilities Journal of Cryptology 10 4 1997 233 260
-
(1997)
Journal of Cryptology
, vol.10
, Issue.4
, pp. 233-260
-
-
Coppersmith, D.1
-
7
-
-
1342285565
-
Cryptanalysis of short secret exponents modulo RSA primes
-
C.Y. Chen, C.Y. Ku, and D.C. Yen Cryptanalysis of short secret exponents modulo RSA primes Information Sciences 160 4 2004 225 233
-
(2004)
Information Sciences
, vol.160
, Issue.4
, pp. 225-233
-
-
Chen, C.Y.1
Ku, C.Y.2
Yen, D.C.3
-
8
-
-
84954462346
-
A practical implementation of the timing attack
-
J.F. Dhem, F. Koeune, P.A. Leroux, et al., A practical implementation of the timing attack, in: International Conference on Smart Card Research and Advanced Applications-CARDIS 2000, LNCS, vol. 1820, 2000, pp. 167-182.
-
(2000)
International Conference on Smart Card Research and Advanced Applications-CARDIS 2000, LNCS
, vol.1820
, pp. 167-182
-
-
Dhem, J.F.1
Koeune, F.2
Leroux, P.A.3
-
9
-
-
0242521606
-
-
Intel Technical Report, Intel Corporation
-
Intel, Using the RDTSC Instruction for Performance Monitoring, Technical Report, Intel Corporation, 1997. < http://www.ccsl.carletin.ca/∼jamuir/ rdtscpm1.pdf >.
-
(1997)
Using the RDTSC Instruction for Performance Monitoring
-
-
-
10
-
-
33646432474
-
A CRT-based RSA countermeasure against physical cryptanalysis
-
C. Kim, J. Ha, S. Moon, et al., A CRT-based RSA countermeasure against physical cryptanalysis, in: High Performance Computing and Communications-HPCC 2005, LNCS, vol. 3726, 2005, pp. 549-554.
-
(2005)
High Performance Computing and Communications-HPCC 2005, LNCS
, vol.3726
, pp. 549-554
-
-
Kim, C.1
Ha, J.2
Moon, S.3
-
11
-
-
84943632039
-
Timing attack on implementations of Diffie-Hellman, RSA, DSS, and other systems
-
P. Kocher, Timing attack on implementations of Diffie-Hellman, RSA, DSS, and other systems, in: Advances in Cryptology-CRYPTO'96, LNCS, vol. 1109, 1996, pp. 104-113.
-
(1996)
Advances in Cryptology-CRYPTO'96, LNCS
, vol.1109
, pp. 104-113
-
-
Kocher, P.1
-
12
-
-
47849097207
-
Differential fault analysis on the ARIA algorithm
-
W. Li, D. W Gu, and J. R Li Differential fault analysis on the ARIA algorithm Information Sciences 178 19 2008 3727 3737
-
(2008)
Information Sciences
, vol.178
, Issue.19
, pp. 3727-3737
-
-
Li, W.1
Gu D, W.2
Li J, R.3
-
13
-
-
33845422157
-
Side-channel attacks on smartcards
-
A. Matthews Side-channel attacks on smartcards Network Security 12 2006 18 20
-
(2006)
Network Security
, Issue.12
, pp. 18-20
-
-
Matthews, A.1
-
15
-
-
84966243285
-
Modular multiplication without trial division
-
P.L. Montgomery Modular multiplication without trial division Mathematics of Computation 44 170 1985 519 521
-
(1985)
Mathematics of Computation
, vol.44
, Issue.170
, pp. 519-521
-
-
Montgomery, P.L.1
-
18
-
-
33747196393
-
The complexity of DPA type side channel attacks and their dependency on the algorithm design
-
J. Ruedinger The complexity of DPA type side channel attacks and their dependency on the algorithm design Information Security Technical Report 11 3 2006 154 158
-
(2006)
Information Security Technical Report
, vol.11
, Issue.3
, pp. 154-158
-
-
Ruedinger, J.1
-
19
-
-
68549092451
-
A timing attack against RSA with the Chinese Remainder Theorem
-
W. Schindler, A timing attack against RSA with the Chinese Remainder Theorem, in: Cryptographic Hardware and Embedded Systems-CHES 2000, LNCS, vol. 1965, 2000, p. 109.
-
(2000)
Cryptographic Hardware and Embedded Systems-CHES 2000, LNCS
, vol.1965
, pp. 109
-
-
Schindler, W.1
-
20
-
-
79952681076
-
An advanced timing attack scheme on RSA
-
IEEE Computer Society
-
R. Toth, Z. Faigl, M. Szalay, S. Imre, An advanced timing attack scheme on RSA, in: Proceedings of the 13th International Telecommunications Network Strategy and Planning Symposium-NETWORKS 2008, IEEE Computer Society, 2008, pp. 1-24.
-
(2008)
Proceedings of the 13th International Telecommunications Network Strategy and Planning Symposium-NETWORKS 2008
, pp. 1-24
-
-
Toth, R.1
Faigl, Z.2
Szalay, M.3
Imre, S.4
-
22
-
-
56949089563
-
An efficient common-multiplicand-multiplication method to the Montgomery algorithm for speeding up exponentiation
-
C.L. Wu An efficient common-multiplicand-multiplication method to the Montgomery algorithm for speeding up exponentiation Information Sciences 179 4 2009 410 421
-
(2009)
Information Sciences
, vol.179
, Issue.4
, pp. 410-421
-
-
Wu, C.L.1
-
23
-
-
33847655248
-
Efficient elliptic curve scalar multiplication algorithms resistant to power analysis
-
N. Zhang, Z.X. Chen, and G.Z. Xiao Efficient elliptic curve scalar multiplication algorithms resistant to power analysis Information Sciences 177 10 2007 2119 2129
-
(2007)
Information Sciences
, vol.177
, Issue.10
, pp. 2119-2129
-
-
Zhang, N.1
Chen, Z.X.2
Xiao, G.Z.3
|