Topics in Cryptology – CT-RSA 2006
From MaRDI portal
Publication:5898552
DOI10.1007/11605805zbMATH Open1125.94326DBLPconf/ctrsa/2006OpenAlexW2564556261MaRDI QIDQ5898552FDOQ5898552
Authors: Dag Arne Osvik, Adi Shamir, Eran Tromer
Publication date: 12 February 2007
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/11605805
Recommendations
Cited In (51)
- Improved reductions from noisy to bounded and probing leakages via hockey-stick divergences
- Side-channel attacks meet secure network protocols
- Hierarchical attribute based encryption with continuous leakage-resilience
- Cache timing analysis of LFSR-based stream ciphers
- Cache-attacks on the ARM trustzone implementations of AES-256 and AES-256-GCM via GPU-based analysis
- Differential Cache-Collision Timing Attacks on AES with Applications to Embedded CPUs
- Enhanced differential cache attacks on SM4 with algebraic analysis and error-tolerance
- Modifying an enciphering scheme after deployment
- Formal verification of side-channel countermeasures using self-composition
- Analysis of Countermeasures Against Access Driven Cache Attacks on AES
- Efficient cache attacks on AES, and countermeasures
- Predicting Secret Keys Via Branch Prediction
- On the incomparability of cache algorithms in terms of timing leakage
- Cache-timing template attacks
- Attacks and security proofs of EAX-prime
- A Cache Timing Analysis of HC-256
- Cache storage attacks
- Cache Based Remote Timing Attack on the AES
- Towards efficient and strong backward private searchable encryption with secure enclaves
- Cache Based Power Analysis Attacks on AES
- Bitsliced high-performance AES-ECB on GPUs
- Deterministic Public-Key Encryption Under Continual Leakage
- An Enhanced Differential Cache Attack on CLEFIA for Large Cache Lines
- Balloon hashing: a memory-hard function providing provable protection against sequential attacks
- System-level non-interference of constant-time cryptography. I: Model
- Cryptographic Side-Channels from Low-Power Cache Memory
- New Branch Prediction Vulnerabilities in OpenSSL and Necessary Software Countermeasures
- Security Analysis of Cache Replacement Policies
- A tale of three signatures: practical attack of ECDSA with wNAF
- Cryptanalysis of CLEFIA using differential methods with cache trace patterns
- ОБЗОР АТАК НА AES-128: К ПЯТНАДЦАТИЛЕТИЮ СТАНДАРТА AES
- How secure is AES under leakage
- System-level non-interference of constant-time cryptography. II: Verified static analysis and stealth memory
- A formal analysis of prefetching in profiled cache-timing attacks on block ciphers
- Constant-round leakage-resilient zero-knowledge argument for NP from the knowledge-of-exponent assumption
- A Fast and Cache-Timing Resistant Implementation of the AES
- A Vulnerability in RSA Implementations Due to Instruction Cache Analysis and Its Demonstration on OpenSSL
- New AES Software Speed Records
- Timing-sensitive information flow analysis for synchronous systems
- Unifying leakage classes: simulatable leakage and pseudoentropy
- Advances on Access-Driven Cache Attacks on AES
- All the AES you need on Cortex-M3 and M4
- An Analytical Model for Time-Driven Cache Attacks
- Exploiting the physical disparity: side-channel attacks on memory encryption
- Timing-Sensitive Noninterference through Composition
- A low-cost memory remapping scheme for address bus protection
- Memory encryption: a survey of existing techniques
- On the intractability of preemptive single-machine job scheduling with release times, deadlines, and family setup times
- Security analysis of NIST CTR-DRBG
- Side-channeling the \textsf{Kalyna} key expansion
- Cryptanalysis of White-Box DES Implementations with Arbitrary External Encodings
Uses Software
This page was built for publication: Topics in Cryptology – CT-RSA 2006
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5898552)