Side channel attack

Results: 129



#Item
61Central processing unit / Computer memory / Computing / Advanced Encryption Standard / CPU cache / Side channel attack / Timing attack / Hyper-V / Cryptography / Cache / Computer hardware

Wait a minute! A fast, Cross-VM attack on AES Gorka Irazoqui, Mehmet Sinan Inci, Thomas Eisenbarth, and Berk Sunar Worcester Polytechnic Institute, Worcester, MA, USA {girazoki,msinci,teisenbarth,sunar}@wpi.edu Abstract

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-11-20 16:16:58
62Cyberwarfare / Side channel attack / Power analysis / Cryptographic engineering / Timing attack / Randomness / Lecture Notes in Computer Science / Computer security / Espionage / Cryptography / Security

Formal Study of a Countermeasure Against Side-Channel Attacks Location. SEN group of the COMELEC department at Telecom ParisTech (37 rue Dareau, 75014, Paris). This internship can lead to a PhD thesis. Advisors.

Add to Reading List

Source URL: perso.telecom-paristech.fr

Language: English - Date: 2015-01-06 18:40:44
63Power analysis / RSA / International Data Encryption Algorithm / Side channel attack / Paul Kocher / Cryptography / Public-key cryptography / Cryptography Research

Differential Power Analysis Copy Protection Technical Working Group October 16, [removed]Los Angeles www.cryptography.com 425 Market St., 11th Floor, San Francisco, CA 94105 © 2013 Cryptography Research, Inc. Protected un

Add to Reading List

Source URL: www.cptwg.org

Language: English - Date: 2014-10-08 12:17:05
64RSA / Timing attack / Montgomery reduction / OpenSSL / Cipher / David Brumley / Multiplication algorithm / Side channel attack / Cryptography / Public-key cryptography / Electronic commerce

Remote Timing Attacks are Practical David Brumley Stanford University [removed] Abstract Timing attacks are usually used to attack weak computing devices such as smartcards. We show that timing

Add to Reading List

Source URL: users.ece.cmu.edu

Language: English - Date: 2014-05-29 15:38:01
65Multiplication / Modular arithmetic / Multiplication algorithm / Computer arithmetic / Montgomery reduction / Side channel attack / Multiplier / Vehicle Identification Number / Operand / Mathematics / Arithmetic / Mathematical notation

Two Operands of Multipliers in Side-Channel Attack⋆ Takeshi Sugawara, Daisuke Suzuki, and Minoru Saeki Mitsubishi Electric Corporation [removed]

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-03-28 00:58:22
66Computer network security / Crime prevention / Electronic commerce / National security / Secure communication / Vulnerability / Side channel attack / Password / Hardware Trojan / Cyberwarfare / Security / Computer security

University Research in Hardware Security Ruby B. Lee Princeton University HotChips Hardware Security Tutorial August 10, 2014

Add to Reading List

Source URL: www.hotchips.org

Language: English - Date: 2014-08-10 23:56:02
67Cryptography / Trusted computing / Unified Extensible Firmware Interface / Trusted Execution Technology / Trusted Platform Module / Trusted computing base / Side channel attack / Hypervisor / Tamper resistance / Computer security / Security / System software

SECURE SYSTEMS DESIGN LEENDERT VAN DOORN CORPORATE FELLOW [removed] 1

Add to Reading List

Source URL: www.hotchips.org

Language: English - Date: 2014-08-10 23:56:00
68Outline of cryptography / Side channel attack / Edward Felten / Cryptanalysis / International Cryptology Conference / Cryptographic engineering / Elliptic curve cryptography / Cryptography / Lattice-based cryptography / Pwnie Awards

Nadia Heninger +[removed]Computer & Information Science Department University of Pennsylvania 3330 Walnut St. Philadelphia, PA[removed]

Add to Reading List

Source URL: www.cis.upenn.edu

Language: English - Date: 2014-02-25 14:14:07
69Spintronics / Electronics / Surveillance / Signals intelligence / TEMPEST / United States government secrecy / Hard disk drive / Asynchrony / Side channel attack / Computer hardware / Espionage / Magnetic ordering

Electromagnetic Analysis of Synchronous and Asynchronous Circuits using Hard Disc Heads Theo Markettos, Simon Moore 16th UK Asynchronous Forum

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2004-09-08 08:49:11
70Quantum cryptography / Crime prevention / National security / CRYPTREC / Quantum key distribution / Public-key cryptography / Information security / Side channel attack / Computer security / Cryptography / Security / Quantum information science

4 Security Fundamentals Technology 4-1 R  esearch Activity on Security Fundamentals Technology TANAKA Hidema

Add to Reading List

Source URL: www.nict.go.jp

Language: English - Date: 2013-11-21 21:07:26
UPDATE