Side-channel attack

Results: 129



#Item
31F LUSH +R ELOAD: a High Resolution, Low Noise, L3 Cache Side-Channel Attack Yuval Yarom Katrina Falkner The University of Adelaide

F LUSH +R ELOAD: a High Resolution, Low Noise, L3 Cache Side-Channel Attack Yuval Yarom Katrina Falkner The University of Adelaide

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-07-04 21:30:09
32Continuous After-the-fact Leakage-Resilient eCK-secure Key Exchange Janaka Alawatugoda1 1  Colin Boyd3

Continuous After-the-fact Leakage-Resilient eCK-secure Key Exchange Janaka Alawatugoda1 1 Colin Boyd3

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-14 00:49:04
33Side Channel Analysis and Embedded Systems Impact and Countermeasures  Job de Haas

Side Channel Analysis and Embedded Systems Impact and Countermeasures Job de Haas

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2014-12-16 19:06:23
34F LUSH +R ELOAD: a High Resolution, Low Noise, L3 Cache Side-Channel Attack Yuval Yarom Katrina Falkner The University of Adelaide

F LUSH +R ELOAD: a High Resolution, Low Noise, L3 Cache Side-Channel Attack Yuval Yarom Katrina Falkner The University of Adelaide

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-07-04 21:30:09
35

PDF Document

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2014-12-16 19:06:27
36

PDF Document

Add to Reading List

Source URL: www.syssec-project.eu

Language: English - Date: 2015-01-05 07:38:12
37Cross-VM Side Channels and Their Use to Extract Private Keys Yinqian Zhang Ari Juels

Cross-VM Side Channels and Their Use to Extract Private Keys Yinqian Zhang Ari Juels

Add to Reading List

Source URL: pages.cs.wisc.edu

Language: English - Date: 2012-12-24 14:28:56
38J Cryptogr Eng:5–27 DOIs13389y REGULAR PAPER  Introduction to differential power analysis

J Cryptogr Eng:5–27 DOIs13389y REGULAR PAPER Introduction to differential power analysis

Add to Reading List

Source URL: ftp.cryptography.com

Language: English - Date: 2011-10-03 19:52:55
39“I only write numbers in base 10.”  Pablo Rauzy Information Security PhD student Open Access advocate

“I only write numbers in base 10.” Pablo Rauzy Information Security PhD student Open Access advocate

Add to Reading List

Source URL: pablo.rauzy.name

Language: English - Date: 2015-03-28 18:02:06
40Improved Side Channel Attacks on Pairing Based Cryptography Johannes Blömer∗ Peter Günther†

Improved Side Channel Attacks on Pairing Based Cryptography Johannes Blömer∗ Peter Günther†

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-01-24 04:01:18