Side-channel attacks

Results: 102



#Item
41New Methods for Cost-Effective Side-Channel Attacks on Cryptographic RFIDs Timo Kasper, David Oswald and Christof Paar Horst Görtz Institute for IT Security Ruhr-University Bochum, Germany {Timo.Kasper,David.Oswald,Chri

New Methods for Cost-Effective Side-Channel Attacks on Cryptographic RFIDs Timo Kasper, David Oswald and Christof Paar Horst Görtz Institute for IT Security Ruhr-University Bochum, Germany {Timo.Kasper,David.Oswald,Chri

Add to Reading List

Source URL: www.emsec.rub.de

Language: English - Date: 2010-04-20 20:48:46
    42Cross-Tenant Side-Channel Attacks in PaaS Clouds Yinqian Zhang Ari Juels  University of North Carolina

    Cross-Tenant Side-Channel Attacks in PaaS Clouds Yinqian Zhang Ari Juels University of North Carolina

    Add to Reading List

    Source URL: www.cs.unc.edu

    Language: English - Date: 2014-11-03 17:43:50
      43Low-Cost Software Countermeasures Against Fault Attacks: Implementation and Performances Trade Offs Alessandro Barenghi Luca Breveglieri

      Low-Cost Software Countermeasures Against Fault Attacks: Implementation and Performances Trade Offs Alessandro Barenghi Luca Breveglieri

      Add to Reading List

      Source URL: euler.ecs.umass.edu

      Language: English - Date: 2011-03-24 10:57:36
      44PhD Position: Cryptography secured against side-channel attacks COSIC, KU Leuven The Computer Security and Industrial Cryptography group (COSIC) currently has over 55 researchers. The research work of COSIC covers a broa

      PhD Position: Cryptography secured against side-channel attacks COSIC, KU Leuven The Computer Security and Industrial Cryptography group (COSIC) currently has over 55 researchers. The research work of COSIC covers a broa

      Add to Reading List

      Source URL: homes.esat.kuleuven.be

      Language: English - Date: 2015-09-08 07:48:14
        45Last-level cache side channel attacks are practical Fangfei Liu, Yuval Yarom, Qian Ge, Gernot Heiser and Ruby B. Lee  NICTA Copyright 2014

        Last-level cache side channel attacks are practical Fangfei Liu, Yuval Yarom, Qian Ge, Gernot Heiser and Ruby B. Lee NICTA Copyright 2014

        Add to Reading List

        Source URL: ecewp.ece.wpi.edu

        Language: English - Date: 2015-06-03 15:06:30
          46Efficient Side-Channel Attacks   on Scalar Blinding on Elliptic Curves   with Special Structure

          Efficient Side-Channel Attacks on Scalar Blinding on Elliptic Curves with Special Structure

          Add to Reading List

          Source URL: csrc.nist.gov

          Language: English - Date: 2015-06-12 08:52:32
            47Shuffling Against Side-Channel Attacks: a Comprehensive Study with Cautionary Note N. Veyrat-Charvillon, M. Medwed, S. Kerckhof, F.-X. Standaert UCL Crypto Group, Belgium

            Shuffling Against Side-Channel Attacks: a Comprehensive Study with Cautionary Note N. Veyrat-Charvillon, M. Medwed, S. Kerckhof, F.-X. Standaert UCL Crypto Group, Belgium

            Add to Reading List

            Source URL: cis.sjtu.edu.cn

            Language: English - Date: 2012-12-14 03:05:38
              48Higher Order and Algebraic Side-Channel Attacks on Protected AES Implementations

              Higher Order and Algebraic Side-Channel Attacks on Protected AES Implementations

              Add to Reading List

              Source URL: www.emsec.rub.de

              Language: English - Date: 2014-01-17 04:27:30
                49SCAs against Embedded Crypto Devices F.-X. Standaert UCL Crypto Group, Universit´ e catholique de Louvain  Lecture 3 - Side-Channel Attacks (II)

                SCAs against Embedded Crypto Devices F.-X. Standaert UCL Crypto Group, Universit´ e catholique de Louvain Lecture 3 - Side-Channel Attacks (II)

                Add to Reading List

                Source URL: attackschool.di.uminho.pt

                Language: English - Date: 2014-11-03 05:59:17