Side-channel attacks

Results: 102



#Item
1LNCSA New Framework for Constraint-Based Probabilistic Template Side Channel Attacks

LNCSA New Framework for Constraint-Based Probabilistic Template Side Channel Attacks

Add to Reading List

Source URL: www.ofirweisse.com

Language: English - Date: 2018-10-17 09:19:19
2Practical Template-Algebraic Side Channel Attacks with Extremely Low Data Complexity Yossef Oren, Ofir Weisse and Avishai Wool Cryptography and Network Security Lab School of Electrical Engineering Tel-Aviv University, R

Practical Template-Algebraic Side Channel Attacks with Extremely Low Data Complexity Yossef Oren, Ofir Weisse and Avishai Wool Cryptography and Network Security Lab School of Electrical Engineering Tel-Aviv University, R

Add to Reading List

Source URL: www.ofirweisse.com

Language: English - Date: 2018-10-17 09:19:20
3FPGA implementations of SPRING And their Countermeasures against Side-Channel Attacks Hai Brenner1 , Lubos Gaspar2 , Ga¨etan Leurent3 , Alon Rosen1 , Fran¸cois-Xavier Standaert2 1

FPGA implementations of SPRING And their Countermeasures against Side-Channel Attacks Hai Brenner1 , Lubos Gaspar2 , Ga¨etan Leurent3 , Alon Rosen1 , Fran¸cois-Xavier Standaert2 1

Add to Reading List

Source URL: who.rocq.inria.fr

Language: English - Date: 2018-06-14 07:12:40
4TEMPEST attacks against AES Covertly stealing keys for €200 Overview Side-channel attacks can recover secret keys from cryptographic algorithms (including the pervasive AES) using measurements such as power use. Howeve

TEMPEST attacks against AES Covertly stealing keys for €200 Overview Side-channel attacks can recover secret keys from cryptographic algorithms (including the pervasive AES) using measurements such as power use. Howeve

Add to Reading List

Source URL: www.fox-it.com

Language: English - Date: 2018-04-20 09:19:48
    5Attacking OpenSSL using Side-channel Attacks: the RSA case study Praveen Kumar Vadnala, Lukasz Chmielewski Riscure BV, Delft, The Netherlands Abstract. We show that RSA implementation present in OpenSSL can be successful

    Attacking OpenSSL using Side-channel Attacks: the RSA case study Praveen Kumar Vadnala, Lukasz Chmielewski Riscure BV, Delft, The Netherlands Abstract. We show that RSA implementation present in OpenSSL can be successful

    Add to Reading List

    Source URL: program.sha2017.org

    Language: English - Date: 2017-08-08 05:37:00
      6Practical Mitigations for Timing-Based Side-Channel Attacks on Modern x86 Processors Bart Coppens∗ , Ingrid Verbauwhede‡ , Koen De Bosschere∗ , and Bjorn De Sutter∗† ∗ Electronics and Information Systems Depa

      Practical Mitigations for Timing-Based Side-Channel Attacks on Modern x86 Processors Bart Coppens∗ , Ingrid Verbauwhede‡ , Koen De Bosschere∗ , and Bjorn De Sutter∗† ∗ Electronics and Information Systems Depa

      Add to Reading List

      Source URL: users.elis.ugent.be

      Language: English - Date: 2009-07-23 13:04:51
        7Post-quantum crypto and side-channel attacks – getting ready for the real world Tanja Lange 21 Jul 2016 ArcticCrypt

        Post-quantum crypto and side-channel attacks – getting ready for the real world Tanja Lange 21 Jul 2016 ArcticCrypt

        Add to Reading List

        Source URL: hyperelliptic.org

        Language: English - Date: 2016-07-23 14:54:58
          8Note on side-channel attacks and their countermeasures In the last few years ciphers making use of table-lookups in large tables—and most notably AES [12, 6]—have received a lot of bad publicity due to their vulnerab

          Note on side-channel attacks and their countermeasures In the last few years ciphers making use of table-lookups in large tables—and most notably AES [12, 6]—have received a lot of bad publicity due to their vulnerab

          Add to Reading List

          Source URL: keccak.team

          Language: English - Date: 2017-08-22 12:54:56
            9An Information-Theoretic Model for Adaptive Side-Channel Attacks Boris Köpf David Basin

            An Information-Theoretic Model for Adaptive Side-Channel Attacks Boris Köpf David Basin

            Add to Reading List

            Source URL: software.imdea.org

            Language: English - Date: 2010-09-02 11:11:48
              10Prefetch Side-Channel Attacks: Bypassing SMAP and Kernel ASLR Daniel Gruss∗ Clémentine Maurice∗ Moritz Lipp∗

              Prefetch Side-Channel Attacks: Bypassing SMAP and Kernel ASLR Daniel Gruss∗ Clémentine Maurice∗ Moritz Lipp∗

              Add to Reading List

              Source URL: gruss.cc

              Language: English - Date: 2016-09-12 09:34:50