Side-channel attacks

Results: 102



#Item
61

Security event to learn about side-channel attacks on PCs

Add to Reading List

Source URL: techxplore.com

Language: English - Date: 2015-06-21 17:10:47
    62

    Efficient Template Attacks Omar Choudary and Markus G. Kuhn Computer Laboratory, University of Cambridge Abstract. Template attacks remain a powerful side-channel technique

    Add to Reading List

    Source URL: www.cl.cam.ac.uk

    Language: English - Date: 2014-08-04 11:23:40
      63

      2011 IEEE Symposium on Security and Privacy I Still Know What You Visited Last Summer Leaking browsing history via user interaction and side channel attacks Zachary Weinberg Eric Y. Chen

      Add to Reading List

      Source URL: ieee-security.org

      Language: English - Date: 2011-04-10 18:06:54
        64Algebra / Mathematics / Elliptic curve / Affine space / Exponentiation / Hessian form of an elliptic curve / Table of costs of operations in elliptic curves / Abstract algebra / Elliptic curves / Elliptic curve cryptography

        Countermeasures against side-channel attacks for EC cryptosystems 1 Countermeasures against Side-Channel Attacks for Elliptic Curve Cryptosystems*

        Add to Reading List

        Source URL: eprint.iacr.org

        Language: English - Date: 2001-11-23 07:00:41
        65Block cipher modes of operation / RSA / PKCS / Ciphertext / Basic Encoding Rules / Block cipher / Authenticated encryption / Stream ciphers / Ciphertext stealing / Cryptography / Public-key cryptography / Padding

        Side Channel Attacks on CBC Encrypted Messages in the PKCS#7 Format Vlastimil Klíma 1 and Tomáš Rosa 1,2 {vlastimil.klima, tomas.rosa}@i.cz 1

        Add to Reading List

        Source URL: eprint.iacr.org

        Language: English - Date: 2003-05-12 08:40:12
        66Archive formats / Portable software / WinRAR / RAR / WinZip / File archiver / Zip / Archive file / Software / Computing / Data compression

        CERIAS Tech ReportThe Weakness of WinRAR Encrypted Archives to Compression Side-channel Attacks by Kristine Arthur-Durett Center for Education and Research Information Assurance and Security Purdue University, W

        Add to Reading List

        Source URL: www.cerias.purdue.edu

        Language: English - Date: 2015-01-05 11:06:43
        67Pairing / Weil pairing / Elliptic curve cryptography / Tate pairing / BLS / Elliptic curve / ID-based encryption / Power analysis / Side channel attack / Cryptography / Abstract algebra / Algebra

        Improved Side Channel Attacks on Pairing Based Cryptography Johannes Blömer∗ Peter Günther†

        Add to Reading List

        Source URL: eprint.iacr.org

        Language: English - Date: 2012-01-24 04:01:18
        68Cyberwarfare / ISO standards / Ubiquitous computing / Side channel attack / Smart card / Tamper resistance / Computer security / Cryptographic engineering / Power analysis / Security / Cryptography / Espionage

        Side Channel Attacks and Countermeasures for Embedded Systems Job de Haas

        Add to Reading List

        Source URL: www.blackhat.com

        Language: English - Date: 2014-12-16 19:06:37
        69RSA / Timing attack / Montgomery reduction / OpenSSL / Cipher / David Brumley / Multiplication algorithm / Side channel attack / Cryptography / Public-key cryptography / Electronic commerce

        Remote Timing Attacks are Practical David Brumley Stanford University Abstract Timing attacks are usually used to attack weak computing devices such as smartcards. We show that timing

        Add to Reading List

        Source URL: crypto.stanford.edu

        Language: English - Date: 2010-06-04 16:24:13
        70Physics / Signals intelligence / TEMPEST / United States government secrecy / Electronic test equipment / Measuring instruments / Computer keyboard / Laser / Voltmeter / Espionage / Surveillance / Technology

        Sniffing Keystrokes With Lasers/Voltmeters Side Channel Attacks Using Optical Sampling Of Mechanical Energy And Power Line Leakage Andrea Barisani

        Add to Reading List

        Source URL: dev.inversepath.com

        Language: English - Date: 2009-10-01 18:33:06
        UPDATE