Timing attack

Results: 67



#Item
51Eliminating Cache-Based Timing Attacks with Instruction-Based Scheduling Deian Stefan1 , Pablo Buiras2 , Edward Yang1 , Amit Levy1 , David Terei1 , Alejandro Russo2 , and David Mazières 1

Eliminating Cache-Based Timing Attacks with Instruction-Based Scheduling Deian Stefan1 , Pablo Buiras2 , Edward Yang1 , Amit Levy1 , David Terei1 , Alejandro Russo2 , and David Mazières 1

Add to Reading List

Source URL: ezyang.com

Language: English - Date: 2013-11-23 01:01:19
52Note on side-channel attacks and their countermeasures In the last few years ciphers making use of table-lookups in large tables—and most notably AES [12, 6]—have received a lot of bad publicity due to their vulnerab

Note on side-channel attacks and their countermeasures In the last few years ciphers making use of table-lookups in large tables—and most notably AES [12, 6]—have received a lot of bad publicity due to their vulnerab

Add to Reading List

Source URL: keccak.noekeon.org

Language: English - Date: 2013-02-27 15:26:42
53Introduction The Blacet DAD2970 is an event generator with Delay, Attack, and Decay segments. The DAD may also be looped, yielding an LFO. Logic timing is handled by a small microcontroller to minimize component count. T

Introduction The Blacet DAD2970 is an event generator with Delay, Attack, and Decay segments. The DAD may also be looped, yielding an LFO. Logic timing is handled by a small microcontroller to minimize component count. T

Add to Reading List

Source URL: www.blacet.com

Language: English - Date: 2013-10-05 13:00:01
54

PDF Document

Add to Reading List

Source URL: www.storage.jak-stik.ac.id

Language: English - Date: 2000-05-25 13:00:00
55

PDF Document

Add to Reading List

Source URL: www.storage.jak-stik.ac.id

Language: English - Date: 2000-03-07 12:00:00
56A Cache Timing Analysis of HC-256 Erik Zenner Technical University Denmark (DTU)

A Cache Timing Analysis of HC-256 Erik Zenner Technical University Denmark (DTU)

Add to Reading List

Source URL: www.erikzenner.name

Language: English - Date: 2008-11-24 09:12:05
57UCL Crypto Group Technical Report Series  A practical implementation of the

UCL Crypto Group Technical Report Series A practical implementation of the

Add to Reading List

Source URL: www.cs.jhu.edu

Language: English - Date: 2004-01-21 23:25:50
58October[removed]Side channel attacks

October[removed]Side channel attacks

Add to Reading List

Source URL: www.ipa.go.jp

Language: English - Date: 2013-06-03 22:32:58
59Side-Channel Attacks: Ten Years After Its Publication and the Impacts on Cryptographic Module Security Testingª

Side-Channel Attacks: Ten Years After Its Publication and the Impacts on Cryptographic Module Security Testingª

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2005-10-27 03:09:54
60Design and Security of Cryptographic Algorithms and Devices (ECRYPT II)  Albena, Bulgaria, 29 May – 3 June 2011

Design and Security of Cryptographic Algorithms and Devices (ECRYPT II) Albena, Bulgaria, 29 May – 3 June 2011

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2011-05-31 13:04:56