Timing attack

Results: 67



#Item
51Cache / Computer memory / Computer architecture / Scheduling / Thread / Timing attack / Computing / Central processing unit / CPU cache

Eliminating Cache-Based Timing Attacks with Instruction-Based Scheduling Deian Stefan1 , Pablo Buiras2 , Edward Yang1 , Amit Levy1 , David Terei1 , Alejandro Russo2 , and David Mazières 1

Add to Reading List

Source URL: ezyang.com

Language: English - Date: 2013-11-23 01:01:19
52Binary arithmetic / Boolean algebra / Side channel attack / Power analysis / Advanced Encryption Standard / Mask / Timing attack / Algorithm / Blinding / Cryptography / Mathematics / Espionage

Note on side-channel attacks and their countermeasures In the last few years ciphers making use of table-lookups in large tables—and most notably AES [12, 6]—have received a lot of bad publicity due to their vulnerab

Add to Reading List

Source URL: keccak.noekeon.org

Language: English - Date: 2013-02-27 15:26:42
53Electronic engineering / Technology / Detectors / Envelope detector / Attenuator / Amplifier / Moog modular synthesizer / Korg MS-20 / Modular synthesizers / Audio engineering / Electronic music

Introduction The Blacet DAD2970 is an event generator with Delay, Attack, and Decay segments. The DAD may also be looped, yielding an LFO. Logic timing is handled by a small microcontroller to minimize component count. T

Add to Reading List

Source URL: www.blacet.com

Language: English - Date: 2013-10-05 13:00:01
54Key management / Blinding / RSA / Diffie–Hellman key exchange / Digital signature / Timing attack / RC5 / Paul Kocher / Ron Rivest / Cryptography / Public-key cryptography / Electronic commerce

PDF Document

Add to Reading List

Source URL: www.storage.jak-stik.ac.id

Language: English - Date: 2000-05-25 13:00:00
55Key management / RSA / Cryptanalysis / Data Encryption Standard / Block cipher / Differential cryptanalysis / Eli Biham / Timing attack / Digital signature / Cryptography / Public-key cryptography / Electronic commerce

PDF Document

Add to Reading List

Source URL: www.storage.jak-stik.ac.id

Language: English - Date: 2000-03-07 12:00:00
56Central processing unit / Timing attack / Computing / Cache / Computer memory / CPU cache

A Cache Timing Analysis of HC-256 Erik Zenner Technical University Denmark (DTU)

Add to Reading List

Source URL: www.erikzenner.name

Language: English - Date: 2008-11-24 09:12:05
57Computer arithmetic / Electronic commerce / Public-key cryptography / RSA / Montgomery reduction / Timing attack / Reduction / Exponentiation by squaring / Cryptography / Theoretical computer science / Mathematics

UCL Crypto Group Technical Report Series A practical implementation of the

Add to Reading List

Source URL: www.cs.jhu.edu

Language: English - Date: 2004-01-21 23:25:50
58ISO standards / Ubiquitous computing / Power analysis / Timing attack / Cryptanalysis / RSA / Smart card / Differential fault analysis / Elliptic curve cryptography / Cryptography / Espionage / Side channel attack

October[removed]Side channel attacks

Add to Reading List

Source URL: www.ipa.go.jp

Language: English - Date: 2013-06-03 22:32:58
59Side channel attack / FIPS 140-2 / Advanced Encryption Standard / Timing attack / FIPS 140 / Cryptographic hash function / Cryptanalysis / Differential fault analysis / Block cipher / Cryptography / Cryptography standards / Power analysis

Side-Channel Attacks: Ten Years After Its Publication and the Impacts on Cryptographic Module Security Testingª

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2005-10-27 03:09:54
60Side channel attack / Cryptography / ECRYPT / Timing attack / Espionage / Power analysis / Cyberwarfare

Design and Security of Cryptographic Algorithms and Devices (ECRYPT II) Albena, Bulgaria, 29 May – 3 June 2011

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2011-05-31 13:04:56
UPDATE