Side-channel attacks

Results: 102



#Item
21

JavaScript Zero: Real JavaScript and Zero Side-Channel Attacks Michael Schwarz, Moritz Lipp and Daniel Gruss Graz University of Technology {michael.schwarz,moritz.lipp,daniel.gruss}@iaik.tugraz.at Abstract—Modern web b

Add to Reading List

Source URL: mlq.me

- Date: 2018-03-02 04:05:47
    22Cryptography / Cache / Computer memory / Advanced Encryption Standard / Side-channel attack / Data Encryption Standard / Cache memory / Lookup table / Cryptanalysis / Tiny Encryption Algorithm / Block cipher / CPU cache

    Efficient Cache Attacks on AES, and Countermeasures Eran Tromer1 2 , Dag Arne Osvik3 and Adi Shamir2 1 Computer Science and Artificial Intelligence Laboratory, Massachusetts Institute of Technology,

    Add to Reading List

    Source URL: cs.tau.ac.il

    Language: English - Date: 2009-06-25 15:56:23
    23Cryptography / E-commerce / Cryptographic software / RSA / OpenSSL / Modular arithmetic / Timing attack / Side-channel attack / Montgomery modular multiplication / David Brumley / Karatsuba algorithm / Data Encryption Standard

    Computer Networks–716 www.elsevier.com/locate/comnet Remote timing attacks are practical David Brumley a

    Add to Reading List

    Source URL: users.ece.cmu.edu

    Language: English - Date: 2014-05-29 15:38:01
    24Computer hardware / Computing / Motherboard / Computer buses / Side-channel attacks / DMA attack / Direct memory access / PC Card / IEEE / X86-64 / Field-programmable gate array

    Subverting Windows 7 x64 Kernel with DMA attacks Damien Aumaitre Christophe Devine Physical attacks

    Add to Reading List

    Source URL: esec-lab.sogeti.com

    Language: English - Date: 2016-07-01 12:08:46
    25Cryptography / Cryptographic software / OpenPGP / Side-channel attacks / E-commerce / RSA / Modular exponentiation / Chosen-ciphertext attack / ElGamal encryption / Adaptive chosen-ciphertext attack / Electromagnetic attack / Public-key cryptography

    Stealing Keys from PCs using a Radio: Cheap Electromagnetic Attacks on Windowed Exponentiation (extended version) Daniel Genkin Lev Pachmanov

    Add to Reading List

    Source URL: www.cs.tau.ac.il

    Language: English - Date: 2015-03-03 02:38:59
    26Cryptography / Modular arithmetic / Cryptographic software / E-commerce / OpenSSL / RSA / Public-key cryptography / Modular exponentiation / Montgomery modular multiplication / Timing attack / Side-channel attack / Data Encryption Standard

    Remote Timing Attacks are Practical David Brumley Stanford University Abstract Timing attacks are usually used to attack weak computing devices such as smartcards. We show that timing

    Add to Reading List

    Source URL: users.ece.cmu.edu

    Language: English - Date: 2014-05-29 15:38:01
    27Mathematical analysis / Mathematics / Modular arithmetic / Computer arithmetic / Multiplication / Elliptic curve cryptography / Residue number system / Pi / 2N / Multiplication algorithm / Key size

    1 A Randomized Multi-modulo RNS Architecture for Double-and-Add in ECC to prevent Power Analysis Side Channel Attacks Jude Angelo Ambrose†

    Add to Reading List

    Source URL: www.inesc-id.pt

    Language: English - Date: 2013-12-23 08:24:26
    28Abstract algebra / Algebra / Mathematics / Finite fields / Modular arithmetic / Computer arithmetic / Complex analysis / Residue number system / Elliptic curve cryptography / Pi / Addition / XTR

    DARNS:A Randomized Multi-modulo RNS Architecture for Double-and-Add in ECC to prevent Power Analysis Side Channel Attacks Jude Angelo Ambrose Hector Pettenghi, Leonel Sousa

    Add to Reading List

    Source URL: www.inesc-id.pt

    Language: English - Date: 2013-03-08 09:35:27
    29Advanced Encryption Standard / Flush / Side-channel attack / Tiny Encryption Algorithm

    Trace Driven Cache Attacks against AES Advisor(s): Daniel Gruss Institute for Applied Information Processing and Communications (IAIK) Graz University of Technology, Austria Motivation

    Add to Reading List

    Source URL: www.iaik.tugraz.at

    Language: English - Date: 2015-11-30 11:00:03
    30Hypertext Transfer Protocol / News aggregators / Web browsers / CAPTCHA / Computer security / Computer vision / HTTP cookie / Phishing / Google Chrome / World Wide Web / User agent / Firefox

    I Still Know What You Visited Last Summer Leaking browsing history via user interaction and side channel attacks Zachary Weinberg Eric Y. Chen Pavithra Ramesh Jayaraman Collin Jackson

    Add to Reading List

    Source URL: research.owlfolio.org

    Language: English - Date: 2016-04-20 11:44:16
    UPDATE