-
2
-
-
33744529805
-
-
Technical Report, April, Available at
-
D. J. Bernstein. Cache-timing attacks on AES. Technical Report, 37 pages, April 2005. Available at: http://cr.yp.to/antiforgery/cachetiming-20050414.pdf
-
(2005)
Cache-Timing Attacks on AES
, pp. 37
-
-
Bernstein, D.J.1
-
4
-
-
33745803485
-
-
Technical Report, MSR-TR-2003-20, Microsoft Corporation, March
-
Y. Chen, P. England, M. Peinado, and B. Willman. High Assurance Computing on Open Hardware Architectures. Technical Report, MSR-TR-2003-20, 17 pages, Microsoft Corporation, March 2003. Available at: ftp://ftp.research.microsoft.com/pub/tr/tr-2003-20.ps
-
(2003)
High Assurance Computing on Open Hardware Architectures
, pp. 17
-
-
Chen, Y.1
England, P.2
Peinado, M.3
Willman, B.4
-
5
-
-
3042527150
-
Low-cost solutions for preventing simple side-channel analysis: Side-channel atomicity
-
B. Chevallier-Mames, M. Ciet, and M. Joye. Low-cost solutions for preventing simple side-channel analysis: side-channel atomicity. IEEE Transactions on Computers, volume 53, issue 6, pages 760-768, June 2004.
-
(2004)
IEEE Transactions on Computers
, vol.53
, Issue.6
, pp. 760-768
-
-
Chevallier-Mames, B.1
Ciet, M.2
Joye, M.3
-
6
-
-
24044554454
-
Statistics and Secret Leakage
-
J.-S. Coron, D. Naccache, and P. Kocher. Statistics and Secret Leakage. ACM Transactions on Embedded Computing Systems, volume 3, issue 3, pages 492-508, August 2004.
-
(2004)
ACM Transactions on Embedded Computing Systems
, vol.3
, Issue.3
, pp. 492-508
-
-
Coron, J.-S.1
Naccache, D.2
Kocher, P.3
-
7
-
-
0038110492
-
A Practical Implementation of the Timing Attack
-
J.-J. Quisquater and B. Schneier, editors, Springer-Verlag, LNCS, January
-
J. F. Dhem, F. Koeune, P. A. Leroux, P. Mestre, J.-J. Quisquater, and J. L. Willems. A Practical Implementation of the Timing Attack. Proceedings of the 3rd Working Conference on Smart Card Research and Advanced Applications - CARDIS 1998, J.-J. Quisquater and B. Schneier, editors, Springer-Verlag, LNCS vol. 1820, January 1998.
-
(1998)
Proceedings of the 3Rd Working Conference on Smart Card Research and Advanced Applications - CARDIS 1998
, vol.1820
-
-
Dhem, J.F.1
Koeune, F.2
Leroux, P.A.3
Mestre, P.4
Quisquater, J.-J.5
Willems, J.L.6
-
8
-
-
0042349623
-
-
P. England, B. Lampson, J. Manferdelli, M. Peinado, and B. Willman. A Trusted Open Platform. IEEE Computer, volume 36, issue 7, pages 55-62, July 2003.
-
(2003)
A Trusted Open Platform. IEEE Computer
, vol.36
, Issue.7
, pp. 55-62
-
-
England, P.1
Lampson, B.2
Manferdelli, J.3
Peinado, M.4
Willman, B.5
-
9
-
-
2342591856
-
The Intel Pentium M Processor: Microarchitecture and performance
-
May
-
S. Gochman, R. Ronen, I. Anati, A. Berkovits, T. Kurts, A. Naveh, A. Saeed, Z. Sperber, and R. Valentine. The Intel Pentium M Processor: Microarchitecture and performance. Intel Technology Journal, volume 7, issue 2, May 2003.
-
(2003)
Intel Technology Journal
, vol.7
, Issue.2
-
-
Gochman, S.1
Ronen, R.2
Anati, I.3
Berkovits, A.4
Kurts, T.5
Naveh, A.6
Saeed, A.7
Sperber, Z.8
Valentine, R.9
-
11
-
-
85017093014
-
Strength of Two Data Encryption Standard Implementations under Timing Attacks
-
A. Hevia and M. Kiwi. Strength of Two Data Encryption Standard Implementations under Timing Attacks. ACM Transactions on Information and System Security 2(4):416-437, 1999.
-
(1999)
ACM Transactions on Information and System Security
, vol.2
, Issue.4
, pp. 416-437
-
-
Hevia, A.1
Kiwi, M.2
-
13
-
-
35248874869
-
-
B. S. Kaliski Jr, Ç. K. Koç, and C. Paar, Springer-Verlag, LNCS
-
M. Joye and S.-M. Yen. The Montgomery powering ladder. Cryptographic Hardware and Embedded Systems - CHES 2002, B. S. Kaliski Jr, Ç. K. Koç, and C. Paar, editors, pages 291-302, Springer-Verlag, LNCS vol. 2523, 2003.
-
(2003)
The Montgomery Powering Ladder. Cryptographic Hardware and Embedded Systems - CHES 2002
, vol.2523
, pp. 291-302
-
-
Joye, M.1
Yen, S.-M.2
-
14
-
-
84943632039
-
Timing Attacks on Implementations of Diffie–Hellman, RSA, DSS, and Other Systems
-
N. Koblitz, Springer-Verlag, LNCS
-
P. C. Kocher. Timing Attacks on Implementations of Diffie–Hellman, RSA, DSS, and Other Systems. Advances in Cryptology - CRYPTO ’96, N. Koblitz, editors, pages 104-113, Springer-Verlag, LNCS vol. 1109, 1996.
-
(1996)
Advances in Cryptology - CRYPTO ’96
, vol.1109
, pp. 104-113
-
-
Kocher, P.C.1
-
16
-
-
1842765540
-
Microbenchmarks for Determining Branch Predictor Organization
-
M. Milenkovic, A. Milenkovic, and J. Kulick. Microbenchmarks for Determining Branch Predictor Organization. Software Practice & Experience, volume 34, issue 5, pages 465-487, April 2004.
-
(2004)
Software Practice & Experience
, vol.34
, Issue.5
, pp. 465-487
-
-
Milenkovic, M.1
Milenkovic, A.2
Kulick, J.3
-
17
-
-
85025810706
-
-
Openssl: the open-source toolkit for ssl/tls
-
Openssl: the open-source toolkit for ssl/tls. Available online at: http://www.openssl.org/.
-
-
-
-
20
-
-
33745640963
-
Cache Attacks and Countermeasures: The Case of AES. Topics in Cryptology - CT-RSA 2006
-
D. Pointcheval, Springer-Verlag, LNCS
-
D. A. Osvik, A. Shamir, and E. Tromer. Cache Attacks and Countermeasures: The Case of AES. Topics in Cryptology - CT-RSA 2006, The Cryptographers’ Track at the RSA Conference 2006, D. Pointcheval, editor, pages 1-20, Springer-Verlag, LNCS vol. 3860, 2006.
-
(2006)
The Cryptographers’ Track at the RSA Conference 2006
, vol.3860
, pp. 1-20
-
-
Osvik, D.A.1
Shamir, A.2
Tromer, E.3
-
23
-
-
33646805500
-
Cache missing for fun and profit
-
Ottawa, 2005, Available at
-
C. Percival. Cache missing for fun and profit. BSDCan 2005, Ottawa, 2005. Available at: http://www.daemonology.net/hyperthreading-considered-harmful/.
-
(2005)
Bsdcan
-
-
Percival, C.1
-
25
-
-
68549092451
-
-
Ç. K. Koç and C. Paar, Springer-Verlag, LNCS
-
W. Schindler. A Timing Attack against RSA with the Chinese Remainder Theorem. Cryptographic Hardware and Embedded Systems - CHES 2000, Ç. K. Koç and C. Paar, editors, pages 109-124, Springer-Verlag, LNCS vol. 1965, 2000.
-
(2000)
A Timing Attack against RSA with the Chinese Remainder Theorem. Cryptographic Hardware and Embedded Systems - CHES 2000
, vol.1965
, pp. 109-124
-
-
Schindler, W.1
-
30
-
-
85025808253
-
-
Trusted Computing Group, http://www.trustedcomputinggroup.org.
-
-
-
-
31
-
-
20344391930
-
Intel Virtualization Technology
-
R. Uhlig, G. Neiger, D. Rodgers, A. L. Santoni, F. C. M. Martins, A. V. Anderson, S. M. Bennett, A. Kagi, F. H. Leung, L. Smith. Intel Virtualization Technology, IEEE Computer, volume 38, number 5, pages 48-56, May 2005.
-
(2005)
IEEE Computer
, vol.38
, Issue.5
, pp. 48-56
-
-
Uhlig, R.1
Neiger, G.2
Rodgers, D.3
Santoni, A.L.4
Martins, F.C.M.5
Anderson, A.V.6
Bennett, S.M.7
Kagi, A.8
Leung, F.H.9
Smith, L.10
-
32
-
-
0033204468
-
Montgomery Exponentiation Needs No Final Subtractions
-
C. D. Walter. Montgomery Exponentiation Needs No Final Subtractions. IEE Electronics Letters, volume 35, number 21, pages 1831-1832, October 1999.
-
(1999)
IEE Electronics Letters
, vol.35
, Issue.21
, pp. 1831-1832
-
-
Walter, C.D.1
|