Side-channel attacks

Results: 102



#Item
31Side Channel Attacks CC, FIPS, EMV and PCI points of view SeptemberICCC Turkey  1

Side Channel Attacks CC, FIPS, EMV and PCI points of view SeptemberICCC Turkey 1

Add to Reading List

Source URL: www.yourcreativesolutions.nl

Language: English - Date: 2010-09-02 02:33:50
32LNCSTowards Security Limits in Side-Channel Attacks

LNCSTowards Security Limits in Side-Channel Attacks

Add to Reading List

Source URL: www0.cs.ucl.ac.uk

Language: English - Date: 2011-03-29 16:37:29
    33Hard Drive Side-Channel Attacks using Smartphone Magnetic Field Sensors (Short Paper) Sebastian Biedermann1 , Stefan Katzenbeisser1 and Jakub Szefer2 1

    Hard Drive Side-Channel Attacks using Smartphone Magnetic Field Sensors (Short Paper) Sebastian Biedermann1 , Stefan Katzenbeisser1 and Jakub Szefer2 1

    Add to Reading List

    Source URL: fc15.ifca.ai

    Language: English - Date: 2015-01-11 00:33:44
    34Microsoft Word - Reconfig2013_cr_v01.doc

    Microsoft Word - Reconfig2013_cr_v01.doc

    Add to Reading List

    Source URL: euler.ecs.umass.edu

    Language: English - Date: 2013-11-15 15:24:17
    35Efficient Side-Channel Attacks on Scalar Blinding on Elliptic Curves with Special Structure

    Efficient Side-Channel Attacks on Scalar Blinding on Elliptic Curves with Special Structure

    Add to Reading List

    Source URL: csrc.nist.gov

    Language: English - Date: 2015-06-12 12:08:16
      36Cross-Tenant Side-Channel Attacks in PaaS Clouds Yinqian Zhang Ari Juels  University of North Carolina

      Cross-Tenant Side-Channel Attacks in PaaS Clouds Yinqian Zhang Ari Juels University of North Carolina

      Add to Reading List

      Source URL: www.arijuels.com

      Language: English - Date: 2015-02-12 18:57:01
        37Cross-Tenant Side-Channel Attacks in PaaS Clouds Yinqian Zhang Ari Juels  University of North Carolina

        Cross-Tenant Side-Channel Attacks in PaaS Clouds Yinqian Zhang Ari Juels University of North Carolina

        Add to Reading List

        Source URL: rist.tech.cornell.edu

        Language: English - Date: 2015-07-13 21:30:20
          38Correlation-immune Boolean functions and counter-measures to side channel attacks Claude Carlet LAGA, Universities of Paris 8 and Paris 13, CNRS, France Work in common with Sylvain Guilley, Telecom Paris Tech, France

          Correlation-immune Boolean functions and counter-measures to side channel attacks Claude Carlet LAGA, Universities of Paris 8 and Paris 13, CNRS, France Work in common with Sylvain Guilley, Telecom Paris Tech, France

          Add to Reading List

          Source URL: www.ricam.oeaw.ac.at

          Language: English - Date: 2013-12-20 07:15:59
            39Side Channel Analysis Attacks on Stream Ciphers Daehyun StrobelMasterarbeit

            Side Channel Analysis Attacks on Stream Ciphers Daehyun StrobelMasterarbeit

            Add to Reading List

            Source URL: www.emsec.rub.de

            Language: English - Date: 2010-04-20 22:17:12
              40Remote Timing Attacks are Practical David Brumley Stanford University  Abstract Timing attacks are usually used to attack weak computing devices such as smartcards. We show that timing

              Remote Timing Attacks are Practical David Brumley Stanford University Abstract Timing attacks are usually used to attack weak computing devices such as smartcards. We show that timing

              Add to Reading List

              Source URL: tls.mbed.org

              Language: English