Topics in Cryptology – CT-RSA 2006
From MaRDI portal
Publication:5898552
Recommendations
Cited in
(51)- Improved reductions from noisy to bounded and probing leakages via hockey-stick divergences
- Side-channel attacks meet secure network protocols
- On the intractability of preemptive single-machine job scheduling with release times, deadlines, and family setup times
- Security analysis of NIST CTR-DRBG
- Cache Based Remote Timing Attack on the AES
- Cryptographic Side-Channels from Low-Power Cache Memory
- New Branch Prediction Vulnerabilities in OpenSSL and Necessary Software Countermeasures
- Hierarchical attribute based encryption with continuous leakage-resilience
- Cryptanalysis of CLEFIA using differential methods with cache trace patterns
- Analysis of Countermeasures Against Access Driven Cache Attacks on AES
- System-level non-interference of constant-time cryptography. II: Verified static analysis and stealth memory
- A formal analysis of prefetching in profiled cache-timing attacks on block ciphers
- ОБЗОР АТАК НА AES-128: К ПЯТНАДЦАТИЛЕТИЮ СТАНДАРТА AES
- Attacks and security proofs of EAX-prime
- A Fast and Cache-Timing Resistant Implementation of the AES
- A Vulnerability in RSA Implementations Due to Instruction Cache Analysis and Its Demonstration on OpenSSL
- Security Analysis of Cache Replacement Policies
- Towards efficient and strong backward private searchable encryption with secure enclaves
- All the AES you need on Cortex-M3 and M4
- Timing-Sensitive Noninterference through Composition
- Cache timing analysis of LFSR-based stream ciphers
- Bitsliced high-performance AES-ECB on GPUs
- Constant-round leakage-resilient zero-knowledge argument for NP from the knowledge-of-exponent assumption
- Cache-attacks on the ARM trustzone implementations of AES-256 and AES-256-GCM via GPU-based analysis
- Enhanced differential cache attacks on SM4 with algebraic analysis and error-tolerance
- Efficient cache attacks on AES, and countermeasures
- New AES Software Speed Records
- Predicting Secret Keys Via Branch Prediction
- Modifying an enciphering scheme after deployment
- Differential Cache-Collision Timing Attacks on AES with Applications to Embedded CPUs
- A low-cost memory remapping scheme for address bus protection
- On the incomparability of cache algorithms in terms of timing leakage
- Side-channeling the \textsf{Kalyna} key expansion
- A Cache Timing Analysis of HC-256
- An Enhanced Differential Cache Attack on CLEFIA for Large Cache Lines
- Cryptanalysis of White-Box DES Implementations with Arbitrary External Encodings
- Memory encryption: a survey of existing techniques
- Timing-sensitive information flow analysis for synchronous systems
- Deterministic Public-Key Encryption Under Continual Leakage
- Balloon hashing: a memory-hard function providing provable protection against sequential attacks
- Unifying leakage classes: simulatable leakage and pseudoentropy
- System-level non-interference of constant-time cryptography. I: Model
- Cache Based Power Analysis Attacks on AES
- An Analytical Model for Time-Driven Cache Attacks
- A tale of three signatures: practical attack of ECDSA with wNAF
- Exploiting the physical disparity: side-channel attacks on memory encryption
- Cache-timing template attacks
- Formal verification of side-channel countermeasures using self-composition
- How secure is AES under leakage
- Cache storage attacks
- Advances on Access-Driven Cache Attacks on AES
This page was built for publication: Topics in Cryptology – CT-RSA 2006
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5898552)