Side-channel attacks

Results: 102



#Item
31Side-channel attacks / EMV / Power analysis / FIPS 140 / Differential fault analysis / Smart card / Data Encryption Standard / Conventional PCI

Side Channel Attacks CC, FIPS, EMV and PCI points of view SeptemberICCC Turkey 1

Add to Reading List

Source URL: www.yourcreativesolutions.nl

Language: English - Date: 2010-09-02 02:33:50
32

LNCSTowards Security Limits in Side-Channel Attacks

Add to Reading List

Source URL: www0.cs.ucl.ac.uk

Language: English - Date: 2011-03-29 16:37:29
    33Electromagnetism / Magnetism / Physics / Computer storage media / Physical quantities / Computer storage devices / Storage media / Magnetometer / Magnet / Hard disk drive platter / Hard disk drive / Spin

    Hard Drive Side-Channel Attacks using Smartphone Magnetic Field Sensors (Short Paper) Sebastian Biedermann1 , Stefan Katzenbeisser1 and Jakub Szefer2 1

    Add to Reading List

    Source URL: fc15.ifca.ai

    Language: English - Date: 2015-01-11 00:33:44
    34Cryptography / Side-channel attacks / Advanced Encryption Standard / Pseudorandom number generators / Data masking / AES implementations / Power analysis / Block cipher / Entropy

    Microsoft Word - Reconfig2013_cr_v01.doc

    Add to Reading List

    Source URL: euler.ecs.umass.edu

    Language: English - Date: 2013-11-15 15:24:17
    35

    Efficient Side-Channel Attacks on Scalar Blinding on Elliptic Curves with Special Structure

    Add to Reading List

    Source URL: csrc.nist.gov

    Language: English - Date: 2015-06-12 12:08:16
      36

      Cross-Tenant Side-Channel Attacks in PaaS Clouds Yinqian Zhang Ari Juels University of North Carolina

      Add to Reading List

      Source URL: www.arijuels.com

      Language: English - Date: 2015-02-12 18:57:01
        37

        Cross-Tenant Side-Channel Attacks in PaaS Clouds Yinqian Zhang Ari Juels University of North Carolina

        Add to Reading List

        Source URL: rist.tech.cornell.edu

        Language: English - Date: 2015-07-13 21:30:20
          38

          Correlation-immune Boolean functions and counter-measures to side channel attacks Claude Carlet LAGA, Universities of Paris 8 and Paris 13, CNRS, France Work in common with Sylvain Guilley, Telecom Paris Tech, France

          Add to Reading List

          Source URL: www.ricam.oeaw.ac.at

          Language: English - Date: 2013-12-20 07:15:59
            39

            Side Channel Analysis Attacks on Stream Ciphers Daehyun StrobelMasterarbeit

            Add to Reading List

            Source URL: www.emsec.rub.de

            Language: English - Date: 2010-04-20 22:17:12
              40Cryptography / Modular arithmetic / Cryptographic software / E-commerce / OpenSSL / RSA / Public-key cryptography / Modular exponentiation / Montgomery modular multiplication / Timing attack / Side-channel attack / Data Encryption Standard

              Remote Timing Attacks are Practical David Brumley Stanford University Abstract Timing attacks are usually used to attack weak computing devices such as smartcards. We show that timing

              Add to Reading List

              Source URL: tls.mbed.org

              Language: English
              UPDATE