Efficient cache attacks on AES, and countermeasures
From MaRDI portal
Recommendations
Cites work
- scientific article; zbMATH DE number 1682693 (Why is no real title available?)
- scientific article; zbMATH DE number 1878332 (Why is no real title available?)
- A Fast and Cache-Timing Resistant Implementation of the AES
- A fast new DES implementation in software
- Advances in Cryptology - CRYPTO 2003
- Advances on Access-Driven Cache Attacks on AES
- Bitslice Implementation of AES
- Cache Based Remote Timing Attack on the AES
- Differential cryptanalysis of DES-like cryptosystems
- Fast Software Encryption
- Faster and Timing-Attack Resistant AES-GCM
- Load Balancing in Xen Virtual Machine Monitor
- Predicting Secret Keys Via Branch Prediction
- Short Chosen-Prefix Collisions for MD5 and the Creation of a Rogue CA Certificate
- Side channel cryptanalysis of product ciphers
- Software protection and simulation on oblivious RAMs
- Symmetric Key Cryptography on Modern Graphics Hardware
- Topics in Cryptology – CT-RSA 2006
- Topics in Cryptology – CT-RSA 2006
Cited in
(33)- Attacking AES using Bernstein's attack on modern processors
- Locking the sky: a survey on IaaS cloud security
- Cache Based Remote Timing Attack on the AES
- Topics in Cryptology – CT-RSA 2006
- Cryptanalysis of CLEFIA using differential methods with cache trace patterns
- Analysis of Countermeasures Against Access Driven Cache Attacks on AES
- System-level non-interference of constant-time cryptography. II: Verified static analysis and stealth memory
- A formal analysis of prefetching in profiled cache-timing attacks on block ciphers
- Security Analysis of Cache Replacement Policies
- Differential power analysis of the Picnic signature scheme
- All the AES you need on Cortex-M3 and M4
- Side-channel attacks meet secure network protocols
- Feasibility analysis and performance optimization of the conflict test algorithms for searching eviction sets
- Cache-attacks on the ARM trustzone implementations of AES-256 and AES-256-GCM via GPU-based analysis
- Predicting Secret Keys Via Branch Prediction
- A Probing Attack on AES
- A Secure and Efficient Implementation of the Quotient Digital Signature Algorithm (qDSA)
- Differential Cache-Collision Timing Attacks on AES with Applications to Embedded CPUs
- An Enhanced Differential Cache Attack on CLEFIA for Large Cache Lines
- Triangulating rebound attack on AES-like hashing
- Really fast syndrome-based hashing
- Balloon hashing: a memory-hard function providing provable protection against sequential attacks
- 3-party distributed ORAM from oblivious set membership
- Unifying leakage classes: simulatable leakage and pseudoentropy
- System-level non-interference of constant-time cryptography. I: Model
- Full-size high-security ECC implementation on MSP430 microcontrollers
- Cache Based Power Analysis Attacks on AES
- An Analytical Model for Time-Driven Cache Attacks
- Exploiting the physical disparity: side-channel attacks on memory encryption
- Cache-timing template attacks
- How secure is AES under leakage
- Cache storage attacks
- Advances on Access-Driven Cache Attacks on AES
This page was built for publication: Efficient cache attacks on AES, and countermeasures
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2267358)