A Vulnerability in RSA Implementations Due to Instruction Cache Analysis and Its Demonstration on OpenSSL
From MaRDI portal
Publication:5458944
Recommendations
Cites work
- scientific article; zbMATH DE number 1617927 (Why is no real title available?)
- scientific article; zbMATH DE number 2085436 (Why is no real title available?)
- scientific article; zbMATH DE number 1804022 (Why is no real title available?)
- scientific article; zbMATH DE number 1979274 (Why is no real title available?)
- scientific article; zbMATH DE number 1504802 (Why is no real title available?)
- scientific article; zbMATH DE number 954401 (Why is no real title available?)
- Advances on Access-Driven Cache Attacks on AES
- Cache Based Remote Timing Attack on the AES
- Cryptography and Coding
- Improving Divide and Conquer Attacks against Cryptosystems by Better Error Detection / Correction Strategies
- New Branch Prediction Vulnerabilities in OpenSSL and Necessary Software Countermeasures
- Predicting Secret Keys Via Branch Prediction
- Public Key Cryptography - PKC 2005
- Topics in Cryptology – CT-RSA 2006
Cited in
(8)- Advanced stochastic methods in side channel analysis on block ciphers in the presence of masking
- New Branch Prediction Vulnerabilities in OpenSSL and Necessary Software Countermeasures
- Who watches the watchmen?: Utilizing performance monitors for compromising keys of RSA on intel platforms
- Predicting Secret Keys Via Branch Prediction
- Exponent blinding does not always lift (partial) spa resistance to higher-level security
- System-level non-interference of constant-time cryptography. I: Model
- Side Channels in the McEliece PKC
- Stochastic methods defeat regular RSA exponentiation algorithms with combined blinding methods
This page was built for publication: A Vulnerability in RSA Implementations Due to Instruction Cache Analysis and Its Demonstration on OpenSSL
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5458944)