Timing attack

Results: 67



#Item
21Hardware Attacks on Cryptographic Devices Implementation Attacks on Embedded Systems and Other Portable Hardware Jem Berkes University of Waterloo Prepared for ECE 628, Winter 2006

Hardware Attacks on Cryptographic Devices Implementation Attacks on Embedded Systems and Other Portable Hardware Jem Berkes University of Waterloo Prepared for ECE 628, Winter 2006

Add to Reading List

Source URL: www.berkes.ca

Language: English - Date: 2006-04-11 01:44:56
22The Spy in the Sandbox – Practical Cache Attacks in Javascript  arXiv:1502.07373v2 [cs.CR] 1 Mar 2015 Yossef Oren, Vasileios P. Kemerlis, Simha Sethumadhavan and Angelos D. Keromytis Computer Science Department, Columb

The Spy in the Sandbox – Practical Cache Attacks in Javascript arXiv:1502.07373v2 [cs.CR] 1 Mar 2015 Yossef Oren, Vasileios P. Kemerlis, Simha Sethumadhavan and Angelos D. Keromytis Computer Science Department, Columb

Add to Reading List

Source URL: arxiv.org

Language: English - Date: 2015-03-02 21:40:58
23A Major Vulnerability in RSA Implementations due to MicroArchitectural Analysis Threat (August 22, 2007) Onur Acıi¸cmez1 and Werner Schindler2 1

A Major Vulnerability in RSA Implementations due to MicroArchitectural Analysis Threat (August 22, 2007) Onur Acıi¸cmez1 and Werner Schindler2 1

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2007-08-26 13:51:19
24Wait a minute! A fast, Cross-VM attack on AES Gorka Irazoqui, Mehmet Sinan Inci, Thomas Eisenbarth, and Berk Sunar Worcester Polytechnic Institute, Worcester, MA, USA {girazoki,msinci,teisenbarth,sunar}@wpi.edu  Abstract

Wait a minute! A fast, Cross-VM attack on AES Gorka Irazoqui, Mehmet Sinan Inci, Thomas Eisenbarth, and Berk Sunar Worcester Polytechnic Institute, Worcester, MA, USA {girazoki,msinci,teisenbarth,sunar}@wpi.edu Abstract

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-11-20 16:16:58
25Formal Study of a Countermeasure Against Side-Channel Attacks Location. SEN group of the COMELEC department at Telecom ParisTech (37 rue Dareau, 75014, Paris). This internship can lead to a PhD thesis. Advisors.

Formal Study of a Countermeasure Against Side-Channel Attacks Location. SEN group of the COMELEC department at Telecom ParisTech (37 rue Dareau, 75014, Paris). This internship can lead to a PhD thesis. Advisors.

Add to Reading List

Source URL: perso.telecom-paristech.fr

Language: English - Date: 2015-01-06 18:40:44
26Remote Timing Attacks are Practical David Brumley Stanford University [removed] Abstract Timing attacks are usually used to attack weak computing devices such as smartcards. We show that timing

Remote Timing Attacks are Practical David Brumley Stanford University [removed] Abstract Timing attacks are usually used to attack weak computing devices such as smartcards. We show that timing

Add to Reading List

Source URL: users.ece.cmu.edu

Language: English - Date: 2014-05-29 15:38:01
27Computer Networks[removed]–716 www.elsevier.com/locate/comnet Remote timing attacks are practical David Brumley a

Computer Networks[removed]–716 www.elsevier.com/locate/comnet Remote timing attacks are practical David Brumley a

Add to Reading List

Source URL: users.ece.cmu.edu

Language: English - Date: 2014-05-29 15:38:01
28Faster and Timing-Attack Resistant AES-GCM Emilia K¨ asper1 and Peter Schwabe2 ⋆

Faster and Timing-Attack Resistant AES-GCM Emilia K¨ asper1 and Peter Schwabe2 ⋆

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2009-06-16 09:09:11
29Hostile environment detection with Timing measures Gaël Delalleau

Hostile environment detection with Timing measures Gaël Delalleau

Add to Reading List

Source URL: cansecwest.com

Language: English - Date: 2008-06-07 19:38:54
30Dierential Power Analysis Paul Kocher, Joshua Jae, and Benjamin Jun Cryptography Research, Inc. 607 Market Street, 5th Floor San Francisco, CA 94105, USA. http://www.cryptography.com

Di erential Power Analysis Paul Kocher, Joshua Ja e, and Benjamin Jun Cryptography Research, Inc. 607 Market Street, 5th Floor San Francisco, CA 94105, USA. http://www.cryptography.com

Add to Reading List

Source URL: gauss.ececs.uc.edu

Language: English - Date: 2010-06-01 13:28:51