Side-channel attack

Results: 129



#Item
41Side Channel Attacks and Countermeasures for Embedded Systems  Job de Haas

Side Channel Attacks and Countermeasures for Embedded Systems Job de Haas

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2014-12-16 19:06:37
42A Unified Security Model of Authenticated Key Exchange with Specific Adversarial Capabilities Weiqiang Wena,b,1 , Libin Wanga,b,2 , Jiaxin Panc,3 a  b

A Unified Security Model of Authenticated Key Exchange with Specific Adversarial Capabilities Weiqiang Wena,b,1 , Libin Wanga,b,2 , Jiaxin Panc,3 a b

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-18 19:15:30
43Remote Timing Attacks are Practical David Brumley Stanford University  Abstract Timing attacks are usually used to attack weak computing devices such as smartcards. We show that timing

Remote Timing Attacks are Practical David Brumley Stanford University Abstract Timing attacks are usually used to attack weak computing devices such as smartcards. We show that timing

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2010-06-04 16:24:13
44In the blink of an eye: There goes your AES key (DRAFT of 28 MaySergei Skorobogatov  Christopher Woods

In the blink of an eye: There goes your AES key (DRAFT of 28 MaySergei Skorobogatov Christopher Woods

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2012-05-28 10:41:12
45Read-Proof Hardware from Protective Coatings  Pim Tuyls, Geert-Jan Schrijen, Boris Skoric Jan van Geloven, Nynke Verhaegh, Rob Wolters Philips Research Laboratories Prof. Holstlaan 4, 5656 AA Eindhoven, The Netherlands

Read-Proof Hardware from Protective Coatings Pim Tuyls, Geert-Jan Schrijen, Boris Skoric Jan van Geloven, Nynke Verhaegh, Rob Wolters Philips Research Laboratories Prof. Holstlaan 4, 5656 AA Eindhoven, The Netherlands

Add to Reading List

Source URL: members.home.nl

Language: English - Date: 2008-12-09 00:54:25
46Quantifying Information Leaks using Reliability Analysis † ˘ areanu ˘ Quoc-Sang Phan∗ Pasquale Malacaria∗ Corina S. Pas Marcelo d’Amorim‡

Quantifying Information Leaks using Reliability Analysis † ˘ areanu ˘ Quoc-Sang Phan∗ Pasquale Malacaria∗ Corina S. Pas Marcelo d’Amorim‡

Add to Reading List

Source URL: www.eecs.qmul.ac.uk

Language: English - Date: 2015-04-10 18:09:41
47Side Channel Cryptanalysis of Product Ciphers John Kelsey1 , Bruce Schneier1 , David Wagner2 , and Chris Hall3 1 Counterpane Internet Security 3031 Tisch Way, 100 Plaza East

Side Channel Cryptanalysis of Product Ciphers John Kelsey1 , Bruce Schneier1 , David Wagner2 , and Chris Hall3 1 Counterpane Internet Security 3031 Tisch Way, 100 Plaza East

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2014-03-02 23:18:31
48Side Channel Cryptanalysis of Product Ciphers John Kelsey1 , Bruce Schneier1 , David Wagner2 , and Chris Hall1 1 Counterpane Systems {hall,kelsey,schneier}@counterpane.com 101 E. Minnehaha Pkwy

Side Channel Cryptanalysis of Product Ciphers John Kelsey1 , Bruce Schneier1 , David Wagner2 , and Chris Hall1 1 Counterpane Systems {hall,kelsey,schneier}@counterpane.com 101 E. Minnehaha Pkwy

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2014-03-02 23:18:31
49Hardware Attacks on Cryptographic Devices Implementation Attacks on Embedded Systems and Other Portable Hardware Jem Berkes University of Waterloo Prepared for ECE 628, Winter 2006

Hardware Attacks on Cryptographic Devices Implementation Attacks on Embedded Systems and Other Portable Hardware Jem Berkes University of Waterloo Prepared for ECE 628, Winter 2006

Add to Reading List

Source URL: www.berkes.ca

Language: English - Date: 2006-04-11 01:44:56
50A Major Vulnerability in RSA Implementations due to MicroArchitectural Analysis Threat (August 22, 2007) Onur Acıi¸cmez1 and Werner Schindler2 1

A Major Vulnerability in RSA Implementations due to MicroArchitectural Analysis Threat (August 22, 2007) Onur Acıi¸cmez1 and Werner Schindler2 1

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2007-08-26 13:51:19