Cache-timing template attacks
From MaRDI portal
Publication:3650720
DOI10.1007/978-3-642-10366-7_39zbMATH Open1267.94045OpenAlexW1554359822WikidataQ56432260 ScholiaQ56432260MaRDI QIDQ3650720FDOQ3650720
Authors: Billy Bob Brumley, Risto M. Hakala
Publication date: 15 December 2009
Published in: Advances in Cryptology – ASIACRYPT 2009 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-10366-7_39
Recommendations
Cited In (15)
- Cache timing analysis of LFSR-based stream ciphers
- Cache-timing attacks still threaten IoT devices
- Cache storage attacks
- Just a Little Bit More
- Combined cache timing attacks and template attacks on stream cipher MUGI
- New Branch Prediction Vulnerabilities in OpenSSL and Necessary Software Countermeasures
- Title not available (Why is that?)
- A formal analysis of prefetching in profiled cache-timing attacks on block ciphers
- A Vulnerability in RSA Implementations Due to Instruction Cache Analysis and Its Demonstration on OpenSSL
- Online template attacks
- Attacking (EC)DSA with partially known multiples of nonces
- Highly accurate key extraction method for access-driven cache attacks using correlation coefficient
- An Analytical Model for Time-Driven Cache Attacks
- Cache-timing attack detection and prevention. Application to crypto libs and PQC
- Lucky microseconds: a timing attack on Amazon's s2n implementation of TLS
Uses Software
This page was built for publication: Cache-timing template attacks
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3650720)