메뉴 건너뛰기




Volumn 4377 LNCS, Issue , 2007, Pages 271-286

Cache based remote timing attack on the AES

Author keywords

AES; Cache attack; Remote attack; Side channel analysis; Timing analysis

Indexed keywords

TIMING CIRCUITS;

EID: 85022027006     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/11967668_18     Document Type: Conference Paper
Times cited : (143)

References (28)
  • 1
    • 33745773656 scopus 로고    scopus 로고
    • Improving Brumley and Boneh Timing Attack on Unprotected SSL Implementations
    • C. Meadows, P. Syverson, editors, Virginia
    • O. Acıiçmez, W. Schindler, Ç. K. Koç. Improving Brumley and Boneh Timing Attack on Unprotected SSL Implementations. ACM CCS’05, C. Meadows, P. Syverson, editors, 139-146, Virginia, 2005.
    • (2005) ACM CCS’05 , pp. 139-146
    • Acıiçmez, O.1    Schindler, W.2    Koç, Ç.K.3
  • 2
    • 79951797131 scopus 로고    scopus 로고
    • Trace-Driven Cache Attacks on AES
    • Report 2006/138, Available at
    • O. Acıiçmez and Ç. K. Koç. Trace-Driven Cache Attacks on AES. Cryptology ePrint Archive, Report 2006/138, 2006. Available at: http://eprint.iacr.org/2006/138
    • (2006) Cryptology Eprint Archive
    • Acıiçmez, O.1    Koç, Ç.K.2
  • 4
    • 35248817849 scopus 로고    scopus 로고
    • CHES’02, B. S. Kaliski, Ç. K. Koç and C. Paar, editors, Springer, LNCS 2523, Berlin
    • D. Agrawal, B. Archambeault, J. R. Rao, P. Rohatgi. The EM Side-Channel(s). CHES’02, B. S. Kaliski, Ç. K. Koç and C. Paar, editors, 29-45, Springer, LNCS 2523, Berlin 2003.
    • (2003) The EM Side-Channel(S) , pp. 29-45
    • Agrawal, D.1    Archambeault, B.2    Rao, J.R.3    Rohatgi, P.4
  • 7
    • 84957693225 scopus 로고    scopus 로고
    • Chosen Ciphertext Attacks Against Protocols Based on the RSA Encryption Standard PKCS #1
    • H. Krawczyk, editor, 1-12, Springer, LNCS 1462, Berlin
    • D. Bleichenbacher. Chosen Ciphertext Attacks Against Protocols Based on the RSA Encryption Standard PKCS #1. CRYPTO 98, H. Krawczyk, editor, 1-12, Springer, LNCS 1462, Berlin 1998.
    • (1998) CRYPTO 98
    • Bleichenbacher, D.1
  • 8
    • 77955204687 scopus 로고    scopus 로고
    • Cache-Collision Timing Attacks against AES
    • Springer, LNCS, Berlin
    • J. Bonneau and I. Mironov. Cache-Collision Timing Attacks against AES. CHES’06, Springer, LNCS, Berlin 2006.
    • (2006) CHES’06
    • Bonneau, J.1    Mironov, I.2
  • 9
    • 38549138136 scopus 로고    scopus 로고
    • Software mitigations to hedge AES against cache-based software side channel vulnerabilities
    • Report 2006/052, Available at
    • E. Brickell, G. Graunke, M. Neve, J.-P. Seifert. Software mitigations to hedge AES against cache-based software side channel vulnerabilities. Cryptology ePrint Archive, Report 2006/052, 2006. Available at: http://eprint.iacr.org/2006/052
    • (2006) Cryptology Eprint Archive
    • Brickell, E.1    Graunke, G.2    Neve, M.3    Seifert, J.-P.4
  • 13
  • 15
    • 84943632039 scopus 로고    scopus 로고
    • Timing Attacks on Implementations of Diffie–Hellman, RSA, DSS, and Other Systems
    • N. Koblitz, editor, 104-113, Springer, LNCS 1109, Berlin
    • P. C. Kocher. Timing Attacks on Implementations of Diffie–Hellman, RSA, DSS, and Other Systems. CRYPTO ’96, N. Koblitz, editor, 104-113, Springer, LNCS 1109, Berlin 1996.
    • (1996) CRYPTO ’96
    • Kocher, P.C.1
  • 16
    • 84939573910 scopus 로고    scopus 로고
    • Differential Power Analysis
    • M. Wiener, editor, 388-397, Springer, LNCS 1666, Berlin
    • P. C. Kocher, J. Jaffe, B. Jun. Differential Power Analysis. CRYPTO ’99, M. Wiener, editor, 388-397, Springer, LNCS 1666, Berlin 1999.
    • (1999) CRYPTO ’99
    • Kocher, P.C.1    Jaffe, J.2    Jun, B.3
  • 17
    • 84896824646 scopus 로고    scopus 로고
    • Collision attacks on processors with cache and countermeasures
    • C. Wolf, S. Lucks, and P.-W. Yau, editors, Kllen, LNI P-74, Bonn
    • C. Lauradoux. Collision attacks on processors with cache and countermeasures. WEWoRC’05, C. Wolf, S. Lucks, and P.-W. Yau, editors, 76-85, Kllen, LNI P-74, Bonn 2005.
    • (2005) WEWoRC’05 , pp. 76-85
    • Lauradoux, C.1
  • 18
    • 33750821066 scopus 로고    scopus 로고
    • A refined look at Bernstein’s AES side-channel analysis
    • M. Neve, J.-P. Seifert, Z. Wang. A refined look at Bernstein’s AES side-channel analysis. ASIA CCS’06, 369-369, ACM Press, 2006.
    • (2006) ASIA CCS’06 , pp. 369
    • Neve, M.1    Seifert, J.-P.2    Wang, Z.3
  • 23
    • 38549120069 scopus 로고    scopus 로고
    • Partitioned Cache Architecture as a Side Channel Defence Mechanism
    • Report 2005/280, Available at
    • D. Page. Partitioned Cache Architecture as a Side Channel Defence Mechanism. Cryptography ePrint Archive, Report 2005/280, 2005. Available at: http://eprint.iacr.org/2005/280
    • (2005) Cryptography Eprint Archive
    • Page, D.1
  • 24
    • 34047117968 scopus 로고    scopus 로고
    • BSDCan’05, Ottawa, Available at
    • C. Percival. Cache missing for fun and profit. BSDCan’05, Ottawa, 2005. Available at: http://www.daemonology.net/hyperthreading-considered-harmful/
    • (2005) Cache Missing for Fun and Profit
    • Percival, C.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.