Timing channel

Results: 65



#Item
31RSA / Timing attack / Montgomery reduction / OpenSSL / Cipher / David Brumley / Multiplication algorithm / Side channel attack / Cryptography / Public-key cryptography / Electronic commerce

Remote Timing Attacks are Practical David Brumley Stanford University [removed] Abstract Timing attacks are usually used to attack weak computing devices such as smartcards. We show that timing

Add to Reading List

Source URL: users.ece.cmu.edu

Language: English - Date: 2014-05-29 15:38:01
32Broadcasting / Digital UK / Freeview / Digital television transition / Ridge Hill transmitting station / Digital Switchover Help Scheme / S4C / Channel 4 / Digital terrestrial television in the United Kingdom / Television in the United Kingdom / Digital television / United Kingdom

7 July 2008 Amended 8 December[removed]WEST REGION SWITCHOVER TIMING ANNOUNCED Digital UK starts countdown to TV switchover The timing for the start of switchover to digital television in the West TV region has been announ

Add to Reading List

Source URL: www.digitaluk.co.uk

Language: English - Date: 2012-05-21 05:54:41
33Computer engineering / Microcontrollers / Channel I/O / Microcode / Interrupt / Computer architecture / Central processing unit / Computer hardware

M312 General Timing Analyser/
Synthesizer M-module By AcQ Inducom

Add to Reading List

Source URL: www.acq.nl

Language: English - Date: 2013-07-29 07:35:47
34Satellite television / Television technology / Global Positioning System / Optical fiber / Antenna / Fibre satellite distribution / Fibre Channel electrical interface / Technology / Coaxial cable / Broadcasting

Make Synchronised Time Simple... GPS Over Optical Fibre System APPLICATIONS Timing and Synchronisation

Add to Reading List

Source URL: www.timetools.co.uk

Language: English - Date: 2014-02-19 10:38:31
35Random oracle / Side channel attack / Leakage / Pseudorandom generator / RSA / Digital signature / Information leakage / Cryptography / Public-key cryptography / Timing attack

Cryptography Resilient to Continual Memory Leakage Zvika Brakerski∗ Yael Tauman Kalai† Jonathan Katz‡

Add to Reading List

Source URL: research.microsoft.com

Language: English - Date: 2011-03-17 13:35:44
36Geography / LIDAR / Canyon / Erosion / Valley / Vermont / Incised / Fluvial landforms / Physical geography / Earth

2006 Philadelphia Annual Meeting (22–25 October[removed]Paper No[removed]Presentation Time: 1:30 PM-5:30 PM TIMING, RATES, AND VOLUMES OF BEDROCK CHANNEL INCISION MEASURED WITH 10-BE, GPS, AND LIDAR: HOLTWOOD GORGE, PA RE

Add to Reading List

Source URL: www.uvm.edu

Language: English - Date: 2010-09-20 14:03:36
37Cloud computing / Timing channel / RSA / Cryptography / Timing attack / Advanced Encryption Standard

Using System-Enforced Determinism to Control Timing Channels Bryan Ford, Amittai Aviram, Weiyi Wu, Jose Faleiro, Ramki Gummadi Yale University

Add to Reading List

Source URL: dedis.cs.yale.edu

Language: English - Date: 2012-11-02 19:06:47
38Advanced Encryption Standard / Cloud computing / MOD / Timing channel / IFC / Computing / Timing attack / Information flow

Plugging Side-Channel Leaks with Timing Information Flow Control Bryan Ford Yale University http://dedis.cs.yale.edu/

Add to Reading List

Source URL: dedis.cs.yale.edu

Language: English - Date: 2013-11-09 13:56:52
39Scheduling / Timing attack / Timing channel / Computing / Scheduling algorithms / Operations research / Planning

Plugging Side-Channel Leaks with Timing Information Flow Control Bryan Ford Yale University http://bford.info/ Abstract

Add to Reading List

Source URL: dedis.cs.yale.edu

Language: English - Date: 2012-05-24 16:26:28
UPDATE