Drive-By Key-Extraction Cache Attacks from Portable Code (English)
- New search for: Genkin, Daniel
- New search for: Pachmanov, Lev
- New search for: Tromer, Eran
- New search for: Yarom, Yuval
- New search for: Preneel, Bart
- Further information on Preneel, Bart:
-
https://orcid.org/http://orcid.org/0000-0003-2005-9651
- New search for: Vercauteren, Frederik
- Further information on Vercauteren, Frederik:
-
https://orcid.org/http://orcid.org/0000-0002-7208-9599
- New search for: Genkin, Daniel
- New search for: Pachmanov, Lev
- New search for: Tromer, Eran
- New search for: Yarom, Yuval
In:
Applied Cryptography and Network Security
: 16th International Conference, ACNS 2018, Leuven, Belgium, July 2-4, 2018, Proceedings
;
Chapter: 5
;
83-102
;
2018
- Article/Chapter (Book) / Electronic Resource
-
Title:Drive-By Key-Extraction Cache Attacks from Portable Code
-
Additional title:Lect.Notes Computer
-
Contributors:Preneel, Bart ( editor ) / Vercauteren, Frederik ( editor ) / Genkin, Daniel ( author ) / Pachmanov, Lev ( author ) / Tromer, Eran ( author ) / Yarom, Yuval ( author )
-
Conference:International Conference on Applied Cryptography and Network Security ; 2018 ; Leuven, Belgium
-
Published in:Applied Cryptography and Network Security : 16th International Conference, ACNS 2018, Leuven, Belgium, July 2-4, 2018, Proceedings ; Chapter: 5 ; 83-102Lecture Notes in Computer Science ; 10892 ; 83-102Security and Cryptology ; 83-102
-
Publisher:
- New search for: Springer International Publishing
-
Place of publication:Cham
-
Publication date:2018-06-10
-
Size:20 pages
-
ISBN:
-
ISSN:
-
DOI:
-
Type of media:Article/Chapter (Book)
-
Type of material:Electronic Resource
-
Language:English
-
Keywords:
-
Source:
Table of contents eBook
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 1
-
A Cryptographic Analysis of the WireGuard ProtocolDowling, Benjamin / Paterson, Kenneth G. et al. | 2018
- 2
-
Distributed SSH Key Management with Proactive RSA Threshold SignaturesHarchol, Yotam / Abraham, Ittai / Pinkas, Benny et al. | 2018
- 3
-
Non-interactive Zaps of KnowledgeFuchsbauer, Georg / Orrù, Michele et al. | 2018
- 4
-
Formal Verification of Side-Channel Countermeasures via Elementary Circuit TransformationsCoron, Jean-Sébastien et al. | 2018
- 5
-
Drive-By Key-Extraction Cache Attacks from Portable CodeGenkin, Daniel / Pachmanov, Lev / Tromer, Eran / Yarom, Yuval et al. | 2018
- 6
-
On the Ineffectiveness of Internal Encodings - Revisiting the DCA Attack on White-Box CryptographyAlpirez Bock, Estuardo / Brzuska, Chris / Michiels, Wil / Treff, Alexander et al. | 2018
- 7
-
Continuously Non-malleable Codes with Split-State RefreshFaonio, Antonio / Nielsen, Jesper Buus / Simkin, Mark / Venturi, Daniele et al. | 2018
- 8
-
Efficient Unconditionally Secure Signatures Using Universal HashingAmiri, Ryan / Abidin, Aysajan / Wallden, Petros / Andersson, Erika et al. | 2018
- 9
-
Floppy-Sized Group Signatures from LatticesBoschini, Cecilia / Camenisch, Jan / Neven, Gregory et al. | 2018
- 10
-
On the Security Notions for Homomorphic SignaturesCatalano, Dario / Fiore, Dario / Nizzardo, Luca et al. | 2018
- 11
-
Invisible Sanitizable Signatures and Public-Key Encryption are EquivalentFischlin, Marc / Harasser, Patrick et al. | 2018
- 12
-
Delegatable Attribute-Based Anonymous Credentials from Dynamically Malleable SignaturesBlömer, Johannes / Bobolz, Jan et al. | 2018
- 13
-
Privacy-Preserving Ridge Regression with only Linearly-Homomorphic EncryptionGiacomelli, Irene / Jha, Somesh / Joye, Marc / Page, C. David / Yoon, Kyonghwan et al. | 2018
- 14
-
Privacy-Preserving Plaintext-Equality of Low-Entropy InputsCanard, Sébastien / Pointcheval, David / Santos, Quentin / Traoré, Jacques et al. | 2018
- 15
-
Nothing Refreshes Like a RePSI: Reactive Private Set IntersectionCerulli, Andrea / De Cristofaro, Emiliano / Soriente, Claudio et al. | 2018
- 16
-
New Protocols for Secure Equality Test and ComparisonCouteau, Geoffroy et al. | 2018
- 17
-
Minimising Communication in Honest-Majority MPC by Batchwise Multiplication VerificationNordholt, Peter Sebastian / Veeningen, Meilof et al. | 2018
- 18
-
Best of Both Worlds in Secure Computation, with Low Communication OverheadGenkin, Daniel / Gordon, S. Dov / Ranellucci, Samuel et al. | 2018
- 19
-
3PC ORAM with Low Latency, Low Bandwidth, and Fast Batch RetrievalJarecki, Stanislaw / Wei, Boyang et al. | 2018
- 20
-
MergeMAC: A MAC for Authentication with Strict Time Constraints and Limited BandwidthAnkele, Ralph / Böhl, Florian / Friedberger, Simon et al. | 2018
- 21
-
KangarooTwelve: Fast Hashing Based on \documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$${\textsc {Keccak}\text {-}p}{}$$\end{document}Bertoni, Guido / Daemen, Joan / Peeters, Michaël / Van Assche, Gilles / Van Keer, Ronny / Viguier, Benoît et al. | 2018
- 22
-
Related-Key Boomerang Attacks on Full ANU Lightweight Block CipherSasaki, Yu et al. | 2018
- 23
-
Generic Round-Function-Recovery Attacks for Feistel Networks over Small DomainsDurak, F. Betül / Vaudenay, Serge et al. | 2018
- 24
-
Differential Cryptanalysis of Round-Reduced Sparx-64/128Ankele, Ralph / List, Eik et al. | 2018
- 25
-
Can Caesar Beat Galois?Vaudenay, Serge / Vizár, Damian et al. | 2018
- 26
-
Improved Anonymous Broadcast EncryptionsLi, Jiangtao / Gong, Junqing et al. | 2018
- 27
-
Time-Based Direct Revocable Ciphertext-Policy Attribute-Based Encryption with Short Revocation ListLiu, Joseph K. / Yuen, Tsz Hon / Zhang, Peng / Liang, Kaitai et al. | 2018
- 28
-
Almost Tight Multi-Instance Multi-Ciphertext Identity-Based Encryption on LatticesBoyen, Xavier / Li, Qinyi et al. | 2018
- 29
-
In-Region AuthenticationAkand, Mamunur Rashid / Safavi-Naini, Reihaneh et al. | 2018
- 30
-
Formal Analysis of Distance Bounding with Secure HardwareKılınç, Handan / Vaudenay, Serge et al. | 2018
- 31
-
KRB-CCN: Lightweight Authentication and Access Control for Private Content-Centric NetworksNunes, Ivan O. / Tsudik, Gene et al. | 2018
- 32
-
Assentication: User De-authentication and Lunchtime Attack Mitigation with Seated Posture BiometricKaczmarek, Tyler / Ozturk, Ercan / Tsudik, Gene et al. | 2018
- 33
-
Stateful Multi-client Verifiable ComputationCachin, Christian / Ghosh, Esha / Papadopoulos, Dimitrios / Tackmann, Björn et al. | 2018
- 34
-
VeriCount: Verifiable Resource Accounting Using Hardware and Software IsolationTople, Shruti / Park, Soyeon / Kang, Min Suk / Saxena, Prateek et al. | 2018
- 35
-
Message-Locked Encryption with File UpdateKandele, Suyash / Paul, Souradyuti et al. | 2018
- 36
-
DogFish: Decentralized Optimistic Game-theoretic FIle SHaringKamara, Seny / Küpçü, Alptekin et al. | 2018