Differential Cache-Collision Timing Attacks on AES with Applications to Embedded CPUs (Englisch)
- Neue Suche nach: Bogdanov, Andrey
- Neue Suche nach: Eisenbarth, Thomas
- Neue Suche nach: Paar, Christof
- Neue Suche nach: Wienecke, Malte
- Neue Suche nach: Bogdanov, Andrey
- Neue Suche nach: Eisenbarth, Thomas
- Neue Suche nach: Paar, Christof
- Neue Suche nach: Wienecke, Malte
In:
Topics in Cryptology - CT-RSA 2010
3
;
235-251
;
2010
- Aufsatz/Kapitel (Buch) / Elektronische Ressource
-
Titel:Differential Cache-Collision Timing Attacks on AES with Applications to Embedded CPUs
-
Beteiligte:Bogdanov, Andrey ( Autor:in ) / Eisenbarth, Thomas ( Autor:in ) / Paar, Christof ( Autor:in ) / Wienecke, Malte ( Autor:in )
-
Erschienen in:Topics in Cryptology - CT-RSA 2010 , 3 ; 235-251Lecture Notes in Computer Science ; 5985, 3 ; 235-251
-
Verlag:
- Neue Suche nach: Springer Berlin Heidelberg
-
Erscheinungsort:Berlin, Heidelberg
-
Erscheinungsdatum:01.01.2010
-
Format / Umfang:17 pages
-
ISBN:
-
ISSN:
-
DOI:
-
Medientyp:Aufsatz/Kapitel (Buch)
-
Format:Elektronische Ressource
-
Sprache:Englisch
-
Schlagwörter:
-
Datenquelle:
Inhaltsverzeichnis E-Book
Die Inhaltsverzeichnisse werden automatisch erzeugt und basieren auf den im Index des TIB-Portals verfügbaren Einzelnachweisen der enthaltenen Beiträge. Die Anzeige der Inhaltsverzeichnisse kann daher unvollständig oder lückenhaft sein.
- 1
-
The First 30 Years of Cryptographic Hash Functions and the NIST SHA-3 CompetitionPreneel, Bart et al. | 2010
- 15
-
Errors Matter: Breaking RSA-Based PIN Encryption with Thirty Ciphertext Validity QueriesSmart, Nigel P. et al. | 2010
- 26
-
Efficient CRT-RSA Decryption for Small Encryption ExponentsMaitra, Subhamoy / Sarkar, Santanu et al. | 2010
- 41
-
Resettable Public-Key Encryption: How to Encrypt on a Virtual MachineYilek, Scott et al. | 2010
- 57
-
Plaintext-Awareness of Hybrid EncryptionJiang, Shaoquan / Wang, Huaxiong et al. | 2010
- 73
-
Speed Records for NTRUHermans, Jens / Vercauteren, Frederik / Preneel, Bart et al. | 2010
- 89
-
High-Speed Parallel Software Implementation of the η T PairingAranha, Diego F. / López, Julio / Hankerson, Darrel et al. | 2010
- 106
-
Refinement of Miller’s Algorithm Over Edwards CurvesXu, Lei / Lin, Dongdai et al. | 2010
- 119
-
Probabilistic Public Key Encryption with Equality TestYang, Guomin / Tan, Chik How / Huang, Qiong / Wong, Duncan S. et al. | 2010
- 132
-
Efficient CCA-Secure PKE from Identity-Based TechniquesLai, Junzuo / Deng, Robert H. / Liu, Shengli / Kou, Weidong et al. | 2010
- 148
-
Anonymity from Asymmetry: New Constructions for Anonymous HIBEDucas, Léo et al. | 2010
- 165
-
Making the Diffie-Hellman Protocol Identity-BasedFiore, Dario / Gennaro, Rosario et al. | 2010
- 179
-
On Extended Sanitizable Signature SchemesCanard, Sébastien / Jambert, Amandine et al. | 2010
- 195
-
Unrolling Cryptographic Circuits: A Simple Countermeasure Against Side-Channel AttacksBhasin, Shivam / Guilley, Sylvain / Sauvage, Laurent / Danger, Jean-Luc et al. | 2010
- 208
-
Fault Attacks Against emv SignaturesCoron, Jean-Sébastien / Naccache, David / Tibouchi, Mehdi et al. | 2010
- 221
-
Revisiting Higher-Order DPA Attacks:Gierlichs, Benedikt / Batina, Lejla / Preneel, Bart / Verbauwhede, Ingrid et al. | 2010
- 235
-
Differential Cache-Collision Timing Attacks on AES with Applications to Embedded CPUsBogdanov, Andrey / Eisenbarth, Thomas / Paar, Christof / Wienecke, Malte et al. | 2010
- 252
-
Usable Optimistic Fair ExchangeKüpçü, Alptekin / Lysyanskaya, Anna et al. | 2010
- 268
-
Hash Function Combiners in TLS and SSLFischlin, Marc / Lehmann, Anja / Wagner, Daniel et al. | 2010
- 284
-
Improving Efficiency of an ‘On the Fly’ Identification Scheme by Perfecting Zero-KnowledgenessSantoso, Bagus / Ohta, Kazuo / Sakiyama, Kazuo / Hanaoka, Goichiro et al. | 2010
- 302
-
Linear Cryptanalysis of Reduced-Round PRESENTCho, Joo Yeon et al. | 2010
- 318
-
Dependent Linear Approximations: The Algorithm of Biryukov and Others RevisitedHermelin, Miia / Nyberg, Kaisa et al. | 2010
- 334
-
Practical Key Recovery Attack against Secret-IV Edon- $\mathcal R$Leurent, Gaëtan et al. | 2010
- 350
-
Rebound Attacks on the Reduced Grøstl Hash FunctionMendel, Florian / Rechberger, Christian / Schläffer, Martin / Thomsen, Søren S. et al. | 2010
- 366
-
The Sum of CBC MACs Is a Secure PRFYasuda, Kan et al. | 2010
- 382
-
On Fast Verification of Hash ChainsYum, Dae Hyun / Kim, Jin Seok / Lee, Pil Joong / Hong, Sung Je et al. | 2010