Side-channel attack

Results: 129



#Item
11Parallel vs. Sequential Computations Do they Leak the Same? Advisor(s): Thomas Korak and Hannes Groß Institute for Applied Information Processing and Communications (IAIK) Graz University of Technology, Austria

Parallel vs. Sequential Computations Do they Leak the Same? Advisor(s): Thomas Korak and Hannes Groß Institute for Applied Information Processing and Communications (IAIK) Graz University of Technology, Austria

Add to Reading List

Source URL: www.iaik.tugraz.at

Language: English - Date: 2015-11-30 11:00:03
12Side-Channel Analysis of an Authenticated Encryption Algorithm Advisor(s): Thomas Korak Institute for Applied Information Processing and Communications (IAIK) Graz University of Technology, Austria

Side-Channel Analysis of an Authenticated Encryption Algorithm Advisor(s): Thomas Korak Institute for Applied Information Processing and Communications (IAIK) Graz University of Technology, Austria

Add to Reading List

Source URL: www.iaik.tugraz.at

Language: English - Date: 2015-11-30 11:00:03
13Microsoft PowerPoint - Killmann_sca_ecc.ppt

Microsoft PowerPoint - Killmann_sca_ecc.ppt

Add to Reading List

Source URL: www.yourcreativesolutions.nl

Language: English - Date: 2010-08-31 09:40:00
14Trace Driven Cache Attacks against AES Advisor(s): Daniel Gruss Institute for Applied Information Processing and Communications (IAIK) Graz University of Technology, Austria  Motivation

Trace Driven Cache Attacks against AES Advisor(s): Daniel Gruss Institute for Applied Information Processing and Communications (IAIK) Graz University of Technology, Austria Motivation

Add to Reading List

Source URL: www.iaik.tugraz.at

Language: English - Date: 2015-11-30 11:00:03
15Hello everybody ! See you at the next conference!

Hello everybody ! See you at the next conference!

Add to Reading List

Source URL: security-lab.jaist.ac.jp

Language: English - Date: 2015-11-22 02:25:24
16Moving Target Techniques: Leveraging Uncertainty for Cyber Defense Hamed Okhravi, William W. Streilein, and Kevin S. Bauer  Cyber moving target techniques involve

Moving Target Techniques: Leveraging Uncertainty for Cyber Defense Hamed Okhravi, William W. Streilein, and Kevin S. Bauer Cyber moving target techniques involve

Add to Reading List

Source URL: www.ll.mit.edu

Language: English - Date: 2016-07-12 15:04:32
17Torben: A Practical Side-Channel Attack for Deanonymizing Tor Communication Daniel Arp University of Göttingen Göttingen, Germany

Torben: A Practical Side-Channel Attack for Deanonymizing Tor Communication Daniel Arp University of Göttingen Göttingen, Germany

Add to Reading List

Source URL: user.informatik.uni-goettingen.de

Language: English - Date: 2015-02-18 03:53:06
    18IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTING, SPECIAL ISSUE, VOL. 6, NO. 1, DECEMBERA Combined Design-Time/Test-Time Study of the Vulnerability of Sub-Threshold Devices to

    IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTING, SPECIAL ISSUE, VOL. 6, NO. 1, DECEMBERA Combined Design-Time/Test-Time Study of the Vulnerability of Sub-Threshold Devices to

    Add to Reading List

    Source URL: euler.ecs.umass.edu

    Language: English - Date: 2014-03-28 15:45:17
    19Remote Timing Attacks are Practical David Brumley Stanford University  Abstract Timing attacks are usually used to attack weak computing devices such as smartcards. We show that timing

    Remote Timing Attacks are Practical David Brumley Stanford University Abstract Timing attacks are usually used to attack weak computing devices such as smartcards. We show that timing

    Add to Reading List

    Source URL: tls.mbed.org

    Language: English