Timing attack

Results: 67



#Item
41Determinating Timing Channels in Compute Clouds Amittai Aviram, Sen Hu, Bryan Ford Ramakrishna Gummadi  Yale University

Determinating Timing Channels in Compute Clouds Amittai Aviram, Sen Hu, Bryan Ford Ramakrishna Gummadi Yale University

Add to Reading List

Source URL: dedis.cs.yale.edu

Language: English - Date: 2013-11-09 13:56:19
42Determinating Timing Channels in Compute Clouds Amittai Aviram, Sen Hu, Bryan Ford Ramakrishna Gummadi  Yale University

Determinating Timing Channels in Compute Clouds Amittai Aviram, Sen Hu, Bryan Ford Ramakrishna Gummadi Yale University

Add to Reading List

Source URL: dedis.cs.yale.edu

Language: English - Date: 2010-09-29 09:32:27
43Keyboards and Covert Channels Gaurav Shah, Andres Molina and Matt Blaze Department of Computer and Information Science University of Pennsylvania {gauravsh, andresmf, blaze}@cis.upenn.edu

Keyboards and Covert Channels Gaurav Shah, Andres Molina and Matt Blaze Department of Computer and Information Science University of Pennsylvania {gauravsh, andresmf, blaze}@cis.upenn.edu

Add to Reading List

Source URL: www.crypto.com

Language: English - Date: 2006-08-07 14:09:37
44Suppressing the Oblivious RAM Timing Channel While Making Information Leakage and Program Efficiency Trade-offs Christopher W. Fletcher†∗, Ling Ren† , Xiangyao Yu† , Marten Van Dijk‡ , Omer Khan‡ , Srinivas D

Suppressing the Oblivious RAM Timing Channel While Making Information Leakage and Program Efficiency Trade-offs Christopher W. Fletcher†∗, Ling Ren† , Xiangyao Yu† , Marten Van Dijk‡ , Omer Khan‡ , Srinivas D

Add to Reading List

Source URL: people.csail.mit.edu

Language: English - Date: 2014-01-23 18:47:27
45Opportunities and Limits of Remote Timing Attacks SCOTT A. CROSBY, DAN S. WALLACH and RUDOLF H. RIEDI Rice University  Many algorithms can take a variable amount of time to complete depending on the data being

Opportunities and Limits of Remote Timing Attacks SCOTT A. CROSBY, DAN S. WALLACH and RUDOLF H. RIEDI Rice University Many algorithms can take a variable amount of time to complete depending on the data being

Add to Reading List

Source URL: www.cs.rice.edu

Language: English - Date: 2009-06-18 12:23:26
46SICILIA TIMING [removed[removed] EXPERT - Time Attack

SICILIA TIMING [removed[removed] EXPERT - Time Attack

Add to Reading List

Source URL: www.sicilyonbike.it

Language: Italian - Date: 2013-06-15 15:47:11
    47SICILIA TIMING [removed[removed] AMATORI - Time Attack

    SICILIA TIMING [removed[removed] AMATORI - Time Attack

    Add to Reading List

    Source URL: www.sicilyonbike.it

    Language: Italian - Date: 2013-06-15 15:45:05
      48SICILIA TIMING [removed[removed]AMATORI - Time Attack

      SICILIA TIMING [removed[removed]AMATORI - Time Attack

      Add to Reading List

      Source URL: www.sicilyonbike.it

      Language: Italian - Date: 2013-06-15 15:43:58
        49SICILIA TIMING [removed[removed]EXPERT - Time Attack

        SICILIA TIMING [removed[removed]EXPERT - Time Attack

        Add to Reading List

        Source URL: www.sicilyonbike.it

        Language: Italian - Date: 2013-06-15 15:44:27
          50Recovering OpenSSL ECDSA Nonces Using the F LUSH +R ELOAD Cache Side-channel Attack Yuval Yarom The University of Adelaide  Naomi Benger

          Recovering OpenSSL ECDSA Nonces Using the F LUSH +R ELOAD Cache Side-channel Attack Yuval Yarom The University of Adelaide Naomi Benger

          Add to Reading List

          Source URL: eprint.iacr.org

          Language: English - Date: 2014-02-24 05:24:23