Efficient cache attacks on AES, and countermeasures
From MaRDI portal
Publication:2267358
DOI10.1007/S00145-009-9049-YzbMATH Open1181.94106OpenAlexW2103289002MaRDI QIDQ2267358FDOQ2267358
Authors: Eran Tromer, Dag Arne Osvik, Adi Shamir
Publication date: 1 March 2010
Published in: Journal of Cryptology (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s00145-009-9049-y
Recommendations
Cites Work
- Title not available (Why is that?)
- Differential cryptanalysis of DES-like cryptosystems
- Short Chosen-Prefix Collisions for MD5 and the Creation of a Rogue CA Certificate
- Title not available (Why is that?)
- Fast Software Encryption
- A fast new DES implementation in software
- Topics in Cryptology – CT-RSA 2006
- Software protection and simulation on oblivious RAMs
- Topics in Cryptology – CT-RSA 2006
- Bitslice Implementation of AES
- Faster and Timing-Attack Resistant AES-GCM
- A Fast and Cache-Timing Resistant Implementation of the AES
- Advances on Access-Driven Cache Attacks on AES
- Cache Based Remote Timing Attack on the AES
- Advances in Cryptology - CRYPTO 2003
- Predicting Secret Keys Via Branch Prediction
- Side channel cryptanalysis of product ciphers
- Load Balancing in Xen Virtual Machine Monitor
- Symmetric Key Cryptography on Modern Graphics Hardware
Cited In (32)
- Cache-attacks on the ARM trustzone implementations of AES-256 and AES-256-GCM via GPU-based analysis
- Differential Cache-Collision Timing Attacks on AES with Applications to Embedded CPUs
- 3-party distributed ORAM from oblivious set membership
- Attacking AES using Bernstein's attack on modern processors
- Analysis of Countermeasures Against Access Driven Cache Attacks on AES
- Predicting Secret Keys Via Branch Prediction
- Cache-timing template attacks
- Cache storage attacks
- Cache Based Remote Timing Attack on the AES
- Differential power analysis of the Picnic signature scheme
- Cache Based Power Analysis Attacks on AES
- Full-size high-security ECC implementation on MSP430 microcontrollers
- A Probing Attack on AES
- An Enhanced Differential Cache Attack on CLEFIA for Large Cache Lines
- Balloon hashing: a memory-hard function providing provable protection against sequential attacks
- System-level non-interference of constant-time cryptography. I: Model
- Cryptanalysis of CLEFIA using differential methods with cache trace patterns
- Really fast syndrome-based hashing
- How secure is AES under leakage
- System-level non-interference of constant-time cryptography. II: Verified static analysis and stealth memory
- A formal analysis of prefetching in profiled cache-timing attacks on block ciphers
- Unifying leakage classes: simulatable leakage and pseudoentropy
- Triangulating rebound attack on AES-like hashing
- Locking the sky: a survey on IaaS cloud security
- Advances on Access-Driven Cache Attacks on AES
- A Secure and Efficient Implementation of the Quotient Digital Signature Algorithm (qDSA)
- All the AES you need on Cortex-M3 and M4
- An Analytical Model for Time-Driven Cache Attacks
- Side-channel attacks meet secure network protocols
- Exploiting the physical disparity: side-channel attacks on memory encryption
- Topics in Cryptology – CT-RSA 2006
- Feasibility analysis and performance optimization of the conflict test algorithms for searching eviction sets
Uses Software
This page was built for publication: Efficient cache attacks on AES, and countermeasures
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2267358)