Side channel attack

Results: 129



#Item
71Pseudorandom number generators / Secure communication / Cryptographic primitive / Cryptographic engineering / Cryptographically secure pseudorandom number generator / Transport Layer Security / Cryptographic hash function / Side channel attack / Man-in-the-middle attack / Cryptography / Cryptographic software / Cryptographic protocols

Why does cryptographic software fail? A case study and open problems David Lazar, Haogang Chen, Xi Wang, and Nickolai Zeldovich MIT CSAIL if ((err = SSLHashSHA1.update(...)) != 0)

Add to Reading List

Source URL: pdos.csail.mit.edu

Language: English - Date: 2015-03-27 16:16:57
72Computer security / FIPS 140-2 / FIPS 140 / Side channel attack / Tamper resistance / Power analysis / Field-programmable gate array / CRYPTREC / FIPS 140-3 / Cryptography standards / Cryptography / Espionage

Report for Tamper-Resistance Standardization Research Committee

Add to Reading List

Source URL: www.jsa.or.jp

Language: English - Date: 2006-10-09 22:25:29
73Security / Computer keyboard / TEMPEST / Side channel attack / Lasers / Espionage / Surveillance / National security

CanSecWest/core09 March 16-20, 2009 Sniffing Keystrokes With Lasers/Voltmeters Side Channel Attacks Using Optical Sampling Of Mechanical Energy And Power Line Leakage

Add to Reading List

Source URL: cansecwest.com

Language: English - Date: 2009-03-26 22:55:55
74Random oracle / Side channel attack / Leakage / Pseudorandom generator / RSA / Digital signature / Information leakage / Cryptography / Public-key cryptography / Timing attack

Cryptography Resilient to Continual Memory Leakage Zvika Brakerski∗ Yael Tauman Kalai† Jonathan Katz‡

Add to Reading List

Source URL: research.microsoft.com

Language: English - Date: 2011-03-17 13:35:44
75Surveillance / Signals intelligence / Computer keyboard / TEMPEST / Computer security / Computer security compromised by hardware failure / Digital / Side channel attack / Anechoic chamber / Espionage / Electronic engineering / Electronics

Compromising Electromagnetic Emanations of Wired and Wireless Keyboards Martin Vuagnoux EPFL, Lausanne, Switzerland [removed]

Add to Reading List

Source URL: infoscience.epfl.ch

Language: English - Date: 2011-07-09 03:43:22
76Cyberwarfare / Computer security / Crime prevention / Electronic commerce / National security / State machine replication / Denial-of-service attack / Byzantine fault tolerance / Side channel attack / Computer network security / Computing / Security

Blueprint for a science of cybersecurity | Fred B. Schneider 1. Introduction

Add to Reading List

Source URL: www.cs.cornell.edu

Language: English - Date: 2012-04-26 11:36:06
77Statistical classification / Ensemble learning / Support vector machine / Classifier / K-nearest neighbor algorithm / Random forest / Cross-validation / Side channel attack / Machine learning / Statistics / Artificial intelligence

Reliable Information Extraction for Single Trace Attacks Valentina Banciu, Elisabeth Oswald, Carolyn Whitnall Department of Computer Science, University of Bristol MVB, Woodland Road, Bristol BS8 1UB, UK Email: {Valentin

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-01-19 06:56:44
78Workstation / Cryptography / DPA / Data visualization / EMV / Science / Computer security / Power analysis / Espionage / Side channel attack / FIPS 140

PRODUCT BRIEF DPA Workstation™ Testing Platform The DPA Workstation testing platform evaluates device resistance to side-channel attacks, including SPA, DPA, HO-DPA, and EMA. Side-channel attacks are low-cost, non-inv

Add to Reading List

Source URL: www.rambus.com

Language: English - Date: 2014-09-18 17:21:58
79Side channel attack / Espionage / Cryptography standards / Science / Cryptography / Cryptographic primitive / National Institute of Standards and Technology

Call for Papers - Lightweight Cryptography Workshop 2015

Add to Reading List

Source URL: www.nist.gov

Language: English - Date: 2014-11-05 15:20:18
80Public-key cryptography / RSA / Side channel attack / Laptop / GNU Privacy Guard / Personal computer / Cryptography / Classes of computers / Electronic commerce

Security event to learn about side-channel attacks on PCs

Add to Reading List

Source URL: phys.org

Language: English - Date: 2014-11-27 04:07:13
UPDATE