-
1
-
-
33745773656
-
Improving Brumley and Boneh Timing Attack on Unprotected SSL Implementations
-
C. Meadows, P. Syverson, editors, Virginia
-
O. Acıiçmez, W. Schindler, Ç. K. Koç. Improving Brumley and Boneh Timing Attack on Unprotected SSL Implementations. ACM CCS’05, C. Meadows, P. Syverson, editors, 139-146, Virginia, 2005.
-
(2005)
ACM CCS’05
, pp. 139-146
-
-
Acıiçmez, O.1
Schindler, W.2
Koç, Ç.K.3
-
2
-
-
79951797131
-
Trace-Driven Cache Attacks on AES
-
Report 2006/138, Available at
-
O. Acıiçmez and Ç. K. Koç. Trace-Driven Cache Attacks on AES. Cryptology ePrint Archive, Report 2006/138, 2006. Available at: http://eprint.iacr.org/2006/138
-
(2006)
Cryptology Eprint Archive
-
-
Acıiçmez, O.1
Koç, Ç.K.2
-
4
-
-
35248817849
-
-
CHES’02, B. S. Kaliski, Ç. K. Koç and C. Paar, editors, Springer, LNCS 2523, Berlin
-
D. Agrawal, B. Archambeault, J. R. Rao, P. Rohatgi. The EM Side-Channel(s). CHES’02, B. S. Kaliski, Ç. K. Koç and C. Paar, editors, 29-45, Springer, LNCS 2523, Berlin 2003.
-
(2003)
The EM Side-Channel(S)
, pp. 29-45
-
-
Agrawal, D.1
Archambeault, B.2
Rao, J.R.3
Rohatgi, P.4
-
6
-
-
24744459871
-
Based on Induced Cache Miss and Countermeasure
-
G. Bertoni, V. Zaccaria, L. Breveglieri, M. Monchiero, G. Palermo. AES Power Attack Based on Induced Cache Miss and Countermeasure. ITCC’05, 586 - 591, IEEE Computer Society, 2005.
-
(2005)
ITCC’05, 586 - 591, IEEE Computer Society
-
-
Bertoni, G.1
Zaccaria, V.2
Breveglieri, L.3
Monchiero, M.4
Palermo, G.5
Power Attack, A.E.S.6
-
7
-
-
84957693225
-
Chosen Ciphertext Attacks Against Protocols Based on the RSA Encryption Standard PKCS #1
-
H. Krawczyk, editor, 1-12, Springer, LNCS 1462, Berlin
-
D. Bleichenbacher. Chosen Ciphertext Attacks Against Protocols Based on the RSA Encryption Standard PKCS #1. CRYPTO 98, H. Krawczyk, editor, 1-12, Springer, LNCS 1462, Berlin 1998.
-
(1998)
CRYPTO 98
-
-
Bleichenbacher, D.1
-
8
-
-
77955204687
-
Cache-Collision Timing Attacks against AES
-
Springer, LNCS, Berlin
-
J. Bonneau and I. Mironov. Cache-Collision Timing Attacks against AES. CHES’06, Springer, LNCS, Berlin 2006.
-
(2006)
CHES’06
-
-
Bonneau, J.1
Mironov, I.2
-
9
-
-
38549138136
-
Software mitigations to hedge AES against cache-based software side channel vulnerabilities
-
Report 2006/052, Available at
-
E. Brickell, G. Graunke, M. Neve, J.-P. Seifert. Software mitigations to hedge AES against cache-based software side channel vulnerabilities. Cryptology ePrint Archive, Report 2006/052, 2006. Available at: http://eprint.iacr.org/2006/052
-
(2006)
Cryptology Eprint Archive
-
-
Brickell, E.1
Graunke, G.2
Neve, M.3
Seifert, J.-P.4
-
13
-
-
35248862449
-
-
CHES’01, Ç. K. Koç, D. Naccache, and C. Paar, editors, Springer, LNCS 2162, Berlin
-
K. Gandolfi, C. Mourtel, F. Olivier. Electromagnetic Analysis: Concrete Results. CHES’01, Ç. K. Koç, D. Naccache, and C. Paar, editors, 251-261, Springer, LNCS 2162, Berlin 2001.
-
(2001)
Electromagnetic Analysis: Concrete Results
, pp. 251-261
-
-
Gandolfi, K.1
Mourtel, C.2
Olivier, F.3
-
14
-
-
0033705991
-
Side Channel Cryptanalysis of Product Ciphers
-
J. Kelsey, B. Schneier, D. Wagner, C. Hall. Side Channel Cryptanalysis of Product Ciphers. Journal of Computer Security, vol.8, 141-158, 2000.
-
(2000)
Journal of Computer Security
, vol.8
, pp. 141-158
-
-
Kelsey, J.1
Schneier, B.2
Wagner, D.3
Hall, C.4
-
15
-
-
84943632039
-
Timing Attacks on Implementations of Diffie–Hellman, RSA, DSS, and Other Systems
-
N. Koblitz, editor, 104-113, Springer, LNCS 1109, Berlin
-
P. C. Kocher. Timing Attacks on Implementations of Diffie–Hellman, RSA, DSS, and Other Systems. CRYPTO ’96, N. Koblitz, editor, 104-113, Springer, LNCS 1109, Berlin 1996.
-
(1996)
CRYPTO ’96
-
-
Kocher, P.C.1
-
16
-
-
84939573910
-
Differential Power Analysis
-
M. Wiener, editor, 388-397, Springer, LNCS 1666, Berlin
-
P. C. Kocher, J. Jaffe, B. Jun. Differential Power Analysis. CRYPTO ’99, M. Wiener, editor, 388-397, Springer, LNCS 1666, Berlin 1999.
-
(1999)
CRYPTO ’99
-
-
Kocher, P.C.1
Jaffe, J.2
Jun, B.3
-
17
-
-
84896824646
-
Collision attacks on processors with cache and countermeasures
-
C. Wolf, S. Lucks, and P.-W. Yau, editors, Kllen, LNI P-74, Bonn
-
C. Lauradoux. Collision attacks on processors with cache and countermeasures. WEWoRC’05, C. Wolf, S. Lucks, and P.-W. Yau, editors, 76-85, Kllen, LNI P-74, Bonn 2005.
-
(2005)
WEWoRC’05
, pp. 76-85
-
-
Lauradoux, C.1
-
18
-
-
33750821066
-
A refined look at Bernstein’s AES side-channel analysis
-
M. Neve, J.-P. Seifert, Z. Wang. A refined look at Bernstein’s AES side-channel analysis. ASIA CCS’06, 369-369, ACM Press, 2006.
-
(2006)
ASIA CCS’06
, pp. 369
-
-
Neve, M.1
Seifert, J.-P.2
Wang, Z.3
-
19
-
-
74349098914
-
-
SAC’06, E. Biham, A. Youssef, editors, to appear
-
M. Neve and J.-P. Seifert. Advances on Access-driven Cache Attacks on AES. SAC’06, E. Biham, A. Youssef, editors, to appear.
-
Advances on Access-Driven Cache Attacks on AES
-
-
Neve, M.1
Seifert, J.-P.2
-
20
-
-
33745640963
-
-
CT-RSA’06, D. Pointcheval, editor, 1-20, Springer, LNCS 3860, Berlin
-
D. A. Osvik, A. Shamir, and E. Tromer. Cache Attacks and Countermeasures: The Case of AES. CT-RSA’06, D. Pointcheval, editor, 1-20, Springer, LNCS 3860, Berlin 2006.
-
(2006)
Cache Attacks and Countermeasures: The Case of AES
-
-
Osvik, D.A.1
Shamir, A.2
Tromer, E.3
-
23
-
-
38549120069
-
Partitioned Cache Architecture as a Side Channel Defence Mechanism
-
Report 2005/280, Available at
-
D. Page. Partitioned Cache Architecture as a Side Channel Defence Mechanism. Cryptography ePrint Archive, Report 2005/280, 2005. Available at: http://eprint.iacr.org/2005/280
-
(2005)
Cryptography Eprint Archive
-
-
Page, D.1
-
24
-
-
34047117968
-
-
BSDCan’05, Ottawa, Available at
-
C. Percival. Cache missing for fun and profit. BSDCan’05, Ottawa, 2005. Available at: http://www.daemonology.net/hyperthreading-considered-harmful/
-
(2005)
Cache Missing for Fun and Profit
-
-
Percival, C.1
-
25
-
-
24144473659
-
-
PKC ’05, S. Vaudenay, editor, 85–103, Springer, LNCS 3386, Berlin
-
W. Schindler: On the Optimization of Side-Channel Attacks by Advanced Stochastic Methods, PKC ’05, S. Vaudenay, editor, 85–103, Springer, LNCS 3386, Berlin 2005.
-
(2005)
On the Optimization of Side-Channel Attacks by Advanced Stochastic Methods
-
-
Schindler, W.1
-
26
-
-
85025802329
-
Cryptanalysis of Block Ciphers Implemented on Computers with Cache. ISITA’02, 803-806
-
Y. Tsunoo, E. Tsujihara, K. Minematsu, H. Miyauchi. Cryptanalysis of Block Ciphers Implemented on Computers with Cache. ISITA’02, 803-806, IEEE Information Theory Society, 2002.
-
(2002)
IEEE Information Theory Society
-
-
Tsunoo, Y.1
Tsujihara, E.2
Minematsu, K.3
Miyauchi, H.4
-
27
-
-
35248855964
-
-
CHES’03, C. D. Walter, Ç. K. Koç, and C. Paar, editors, 62-76, Springer, LNCS 2779, Berlin
-
Y. Tsunoo, T. Saito, T. Suzaki, M. Shigeri, H. Miyauchi. Cryptanalysis of DES Implemented on Computers with Cache. CHES’03, C. D. Walter, Ç. K. Koç, and C. Paar, editors, 62-76, Springer, LNCS 2779, Berlin 2003.
-
(2003)
Cryptanalysis of DES Implemented on Computers with Cache
-
-
Tsunoo, Y.1
Saito, T.2
Suzaki, T.3
Shigeri, M.4
Miyauchi, H.5
-
28
-
-
33745145787
-
Improving cache attacks by considering cipher structure
-
Y. Tsunoo, E. Tsujihara, M. Shigeri, H. Kubo, K. Minematsu. Improving cache attacks by considering cipher structure. International Journal of Information Security, February 2006.
-
(2006)
International Journal of Information Security
-
-
Tsunoo, Y.1
Tsujihara, E.2
Shigeri, M.3
Kubo, H.4
Minematsu, K.5
|