메뉴 건너뛰기




Volumn 4377 LNCS, Issue , 2007, Pages 225-242

Predicting secret keys via branch prediction

Author keywords

Branch prediction; Modular exponentiation; Montgomery multiplication; RSA; Side channel analysis; Simultaneous multithreading

Indexed keywords

COMPUTER OPERATING SYSTEMS; FORECASTING; MULTITASKING; PROGRAM PROCESSORS;

EID: 84944627047     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/11967668_15     Document Type: Conference Paper
Times cited : (204)

References (32)
  • 2
    • 33744529805 scopus 로고    scopus 로고
    • Technical Report, April, Available at
    • D. J. Bernstein. Cache-timing attacks on AES. Technical Report, 37 pages, April 2005. Available at: http://cr.yp.to/antiforgery/cachetiming-20050414.pdf
    • (2005) Cache-Timing Attacks on AES , pp. 37
    • Bernstein, D.J.1
  • 5
    • 3042527150 scopus 로고    scopus 로고
    • Low-cost solutions for preventing simple side-channel analysis: Side-channel atomicity
    • B. Chevallier-Mames, M. Ciet, and M. Joye. Low-cost solutions for preventing simple side-channel analysis: side-channel atomicity. IEEE Transactions on Computers, volume 53, issue 6, pages 760-768, June 2004.
    • (2004) IEEE Transactions on Computers , vol.53 , Issue.6 , pp. 760-768
    • Chevallier-Mames, B.1    Ciet, M.2    Joye, M.3
  • 11
    • 85017093014 scopus 로고    scopus 로고
    • Strength of Two Data Encryption Standard Implementations under Timing Attacks
    • A. Hevia and M. Kiwi. Strength of Two Data Encryption Standard Implementations under Timing Attacks. ACM Transactions on Information and System Security 2(4):416-437, 1999.
    • (1999) ACM Transactions on Information and System Security , vol.2 , Issue.4 , pp. 416-437
    • Hevia, A.1    Kiwi, M.2
  • 14
    • 84943632039 scopus 로고    scopus 로고
    • Timing Attacks on Implementations of Diffie–Hellman, RSA, DSS, and Other Systems
    • N. Koblitz, Springer-Verlag, LNCS
    • P. C. Kocher. Timing Attacks on Implementations of Diffie–Hellman, RSA, DSS, and Other Systems. Advances in Cryptology - CRYPTO ’96, N. Koblitz, editors, pages 104-113, Springer-Verlag, LNCS vol. 1109, 1996.
    • (1996) Advances in Cryptology - CRYPTO ’96 , vol.1109 , pp. 104-113
    • Kocher, P.C.1
  • 16
    • 1842765540 scopus 로고    scopus 로고
    • Microbenchmarks for Determining Branch Predictor Organization
    • M. Milenkovic, A. Milenkovic, and J. Kulick. Microbenchmarks for Determining Branch Predictor Organization. Software Practice & Experience, volume 34, issue 5, pages 465-487, April 2004.
    • (2004) Software Practice & Experience , vol.34 , Issue.5 , pp. 465-487
    • Milenkovic, M.1    Milenkovic, A.2    Kulick, J.3
  • 17
    • 85025810706 scopus 로고    scopus 로고
    • Openssl: the open-source toolkit for ssl/tls
    • Openssl: the open-source toolkit for ssl/tls. Available online at: http://www.openssl.org/.
  • 20
    • 33745640963 scopus 로고    scopus 로고
    • Cache Attacks and Countermeasures: The Case of AES. Topics in Cryptology - CT-RSA 2006
    • D. Pointcheval, Springer-Verlag, LNCS
    • D. A. Osvik, A. Shamir, and E. Tromer. Cache Attacks and Countermeasures: The Case of AES. Topics in Cryptology - CT-RSA 2006, The Cryptographers’ Track at the RSA Conference 2006, D. Pointcheval, editor, pages 1-20, Springer-Verlag, LNCS vol. 3860, 2006.
    • (2006) The Cryptographers’ Track at the RSA Conference 2006 , vol.3860 , pp. 1-20
    • Osvik, D.A.1    Shamir, A.2    Tromer, E.3
  • 23
    • 33646805500 scopus 로고    scopus 로고
    • Cache missing for fun and profit
    • Ottawa, 2005, Available at
    • C. Percival. Cache missing for fun and profit. BSDCan 2005, Ottawa, 2005. Available at: http://www.daemonology.net/hyperthreading-considered-harmful/.
    • (2005) Bsdcan
    • Percival, C.1
  • 30
    • 85025808253 scopus 로고    scopus 로고
    • Trusted Computing Group, http://www.trustedcomputinggroup.org.
  • 32
    • 0033204468 scopus 로고    scopus 로고
    • Montgomery Exponentiation Needs No Final Subtractions
    • C. D. Walter. Montgomery Exponentiation Needs No Final Subtractions. IEE Electronics Letters, volume 35, number 21, pages 1831-1832, October 1999.
    • (1999) IEE Electronics Letters , vol.35 , Issue.21 , pp. 1831-1832
    • Walter, C.D.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.