Side-channel attacks

Results: 102



#Item
91Brute-force search / Algorithm / Random walk / Hash table / Precomputation / Mathematics / Search algorithms / Statistics / Kangaroo

Kangaroos in Side-Channel Attacks Tanja Lange1 , Christine van Vredendaal1,2 , and Marnix Wakker2 1 Department of Mathematics and Computer Science Eindhoven University of Technology

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-07-21 04:21:53
92Nervous system / Biology / P300 / Brain–computer interface / P3b / Event-related potential / P3a / Oddball paradigm / Difference due to Memory / Electroencephalography / Evoked potentials / Neuroscience

On the Feasibility of Side-Channel Attacks with Brain-Computer Interfaces Ivan Martinovic∗ , Doug Davies† , Mario Frank† , Daniele Perito† , Tomas Ros‡ , Dawn Song† University of Oxford∗ UC Berkeley† Univ

Add to Reading List

Source URL: www.mariofrank.net

Language: English - Date: 2012-08-02 19:15:35
93HTTP cookie / Phishing / Google Chrome / JavaScript / Firefox / Safari / OpenID / Internet privacy / User agent / Software / Computing / CAPTCHA

2011 IEEE Symposium on Security and Privacy I Still Know What You Visited Last Summer Leaking browsing history via user interaction and side channel attacks Zachary Weinberg Eric Y. Chen

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2011-04-10 18:06:54
94Multivariate statistics / Singular value decomposition / Data analysis / Algebra of random variables / Covariance and correlation / Principal component analysis / Multivariate normal distribution / Linear discriminant analysis / Covariance / Statistics / Algebra / Linear algebra

Efficient Template Attacks Omar Choudary and Markus G. Kuhn Computer Laboratory, University of Cambridge [removed] Abstract. Template attacks remain a powerful side-channel technique

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2014-04-25 05:32:28
95Power analysis / Computer network security / Evaluation / Leakage / SHA-2 / Computer security / Advanced Encryption Standard / Evaluation approaches / Side channel attack / Electrical engineering / Cryptography / Security

Design and Validation Strategies for Obtaining Assurance in Countermeasures to Power Analysis and Related Attacks Paul Kocher Cryptography Research, Inc. 575 Market Street, 21st Floor

Add to Reading List

Source URL: www.smartcard.co.uk

Language: English - Date: 2010-09-10 06:35:51
96Binary arithmetic / Boolean algebra / Side channel attack / Power analysis / Advanced Encryption Standard / Mask / Timing attack / Algorithm / Blinding / Cryptography / Mathematics / Espionage

Note on side-channel attacks and their countermeasures In the last few years ciphers making use of table-lookups in large tables—and most notably AES [12, 6]—have received a lot of bad publicity due to their vulnerab

Add to Reading List

Source URL: keccak.noekeon.org

Language: English - Date: 2013-02-27 15:26:42
97Block ciphers / CPU cache / Side channel attack / Ciphertext / Lookup table / ICE / UES / Tiny Encryption Algorithm / VEST / Cryptography / Data Encryption Standard / Advanced Encryption Standard

J. Cryptol. DOI: [removed]s00145[removed]y Efficient Cache Attacks on AES, and Countermeasures Eran Tromer Computer Science and Artificial Intelligence Laboratory, Massachusetts Institute of Technology,

Add to Reading List

Source URL: cs.tau.ac.il

Language: English - Date: 2009-07-26 00:46:34
98Ciphertext / CPU cache / Side channel attack / AES implementations / Cryptography / Advanced Encryption Standard / Chosen-plaintext attack

Cache Attacks and Countermeasures: the Case of AES (Extended Version) revised[removed]

Add to Reading List

Source URL: www.cs.tau.ac.il

Language: English - Date: 2005-11-21 15:40:56
99ISO standards / Ubiquitous computing / Power analysis / Timing attack / Cryptanalysis / RSA / Smart card / Differential fault analysis / Elliptic curve cryptography / Cryptography / Espionage / Side channel attack

October[removed]Side channel attacks

Add to Reading List

Source URL: www.ipa.go.jp

Language: English - Date: 2013-06-03 22:32:58
100Computational linguistics / Printing / Computer printers / Corpus linguistics / Office equipment / Speech recognition / N-gram / Hidden Markov model / Printer / Linguistics / Markov models / Science

Acoustic Side-Channel Attacks on Printers Michael Backes1,2 , Markus D¨urmuth1, Sebastian Gerling1, Manfred Pinkal3 , Caroline Sporleder3 1

Add to Reading List

Source URL: people.csail.mit.edu

Language: English - Date: 2010-07-09 18:37:09
UPDATE