Remote IP protection using timing channels
DOI10.1007/978-3-319-15943-0_14zbMATH Open1453.68025OpenAlexW578453507MaRDI QIDQ2942840FDOQ2942840
Authors: Ariano-Tim Donda, Peter Samarin, Jacek Samotyja, Kerstin Lemke-Rust, Christof Paar
Publication date: 11 September 2015
Published in: Information Security and Cryptology - ICISC 2014 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-319-15943-0_14
Recommendations
- Formal methods and automated tool for timing-channel identification in TCB source code
- scientific article; zbMATH DE number 1952757
- Remote attestation on legacy operating systems with trusted platform modules
- An abstract interpretation-based framework for software watermarking
- Tempus fugit: How to plug it
timing analysisembedded systemsside-channel analysisFPGA implementationtiming channeldigital watermarkingIP protectionauthorship watermarkfingerprint watermark
Cites Work
- Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems
- Title not available (Why is that?)
- Protocols for authentification and key establishment
- Power Analysis Attacks
- Trivium: A Stream Cipher Construction Inspired by Block Cipher Design Principles
- Predicting Secret Keys Via Branch Prediction
Uses Software
This page was built for publication: Remote IP protection using timing channels
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2942840)