Back to Results
First PageMeta Content



Remote Timing Attacks are Practical David Brumley Stanford University Abstract Timing attacks are usually used to attack weak computing devices such as smartcards. We show that timing
Add to Reading List

Document Date: 2010-06-04 16:24:13


Open Document

File Size: 144,22 KB

Share Result on Facebook

Company

Intel / Microsoft / /

/

Event

Force Majeure / /

Facility

OpenSSL library / SSL library / /

IndustryTerm

simplest algorithm / reduction algorithm / campus network / web servers / trusted computing projects / binary search / trusted computing efforts / weak computing devices / vs. inter-network / integer multiplication algorithm / windows exponentiation algorithm / web server / security systems / word multiplication algorithm / computing / exponentiation algorithm / software systems / Apache web server / /

OperatingSystem

Linux / /

Organization

Stanford University / /

Person

Peter Montgomery / Dan Boneh / /

/

SportsLeague

Stanford University / /

Technology

encryption / sliding windows exponentiation algorithm / radiation / Virtual Machine / Cryptography / public key / 4 processor / Linux / Sliding Windows / underlying word multiplication algorithm / integer multiplication algorithm / three routers / SSL protocol / Montgomery reduction algorithm / private key / caching / same processor / secret key / exponentiation algorithm / SSL / web server / simplest algorithm / /

SocialTag