Pages that link to "Item:Q5898552"
From MaRDI portal
The following pages link to Topics in Cryptology – CT-RSA 2006 (Q5898552):
Displaying 43 items.
- A low-cost memory remapping scheme for address bus protection (Q666092) (← links)
- All the AES you need on Cortex-M3 and M4 (Q1698628) (← links)
- Cache-attacks on the ARM trustzone implementations of AES-256 and AES-256-GCM via GPU-based analysis (Q1726678) (← links)
- A formal analysis of prefetching in profiled cache-timing attacks on block ciphers (Q2043316) (← links)
- On the intractability of preemptive single-machine job scheduling with release times, deadlines, and family setup times (Q2094381) (← links)
- Security analysis of NIST CTR-DRBG (Q2096485) (← links)
- Towards efficient and strong backward private searchable encryption with secure enclaves (Q2117028) (← links)
- Side-channeling the \textsf{Kalyna} key expansion (Q2152165) (← links)
- Hierarchical attribute based encryption with continuous leakage-resilience (Q2213099) (← links)
- System-level non-interference of constant-time cryptography. II: Verified static analysis and stealth memory (Q2228439) (← links)
- Efficient cache attacks on AES, and countermeasures (Q2267358) (← links)
- System-level non-interference of constant-time cryptography. I: Model (Q2417947) (← links)
- Formal verification of side-channel countermeasures using self-composition (Q2442950) (← links)
- Cache Storage Attacks (Q2790028) (← links)
- Bitsliced High-Performance AES-ECB on GPUs (Q2803622) (← links)
- Deterministic Public-Key Encryption Under Continual Leakage (Q2822678) (← links)
- Attacks and Security Proofs of EAX-Prime (Q2946885) (← links)
- Unifying Leakage Classes: Simulatable Leakage and Pseudoentropy (Q2947523) (← links)
- Balloon Hashing: A Memory-Hard Function Providing Provable Protection Against Sequential Attacks (Q2958121) (← links)
- An Enhanced Differential Cache Attack on CLEFIA for Large Cache Lines (Q3104724) (← links)
- (Q3121523) (← links)
- Constant-Round Leakage-Resilient Zero-Knowledge Argument for NP from the Knowledge-of-Exponent Assumption (Q3194601) (← links)
- Timing-Sensitive Noninterference through Composition (Q3304803) (← links)
- Security Analysis of Cache Replacement Policies (Q3304814) (← links)
- A Cache Timing Analysis of HC-256 (Q3644201) (← links)
- Enhanced Differential Cache Attacks on SM4 with Algebraic Analysis and Error-Tolerance (Q5040422) (← links)
- A Tale of Three Signatures: Practical Attack of ECDSA with wNAF (Q5048983) (← links)
- ОБЗОР АТАК НА AES-128: К ПЯТНАДЦАТИЛЕТИЮ СТАНДАРТА AES (Q5151046) (← links)
- Memory encryption (Q5176184) (← links)
- Differential Cache-Collision Timing Attacks on AES with Applications to Embedded CPUs (Q5189454) (← links)
- Modifying an Enciphering Scheme After Deployment (Q5267416) (← links)
- Cache Based Remote Timing Attack on the AES (Q5385958) (← links)
- Cryptographic Side-Channels from Low-Power Cache Memory (Q5447515) (← links)
- New Branch Prediction Vulnerabilities in OpenSSL and Necessary Software Countermeasures (Q5447516) (← links)
- Analysis of Countermeasures Against Access Driven Cache Attacks on AES (Q5452249) (← links)
- Cryptanalysis of White-Box DES Implementations with Arbitrary External Encodings (Q5452261) (← links)
- A Fast and Cache-Timing Resistant Implementation of the AES (Q5458940) (← links)
- A Vulnerability in RSA Implementations Due to Instruction Cache Analysis and Its Demonstration on OpenSSL (Q5458944) (← links)
- New AES Software Speed Records (Q5504633) (← links)
- Cache Based Power Analysis Attacks on AES (Q5757728) (← links)
- Timing-Sensitive Information Flow Analysis for Synchronous Systems (Q5862523) (← links)
- Side-Channel Attacks Meet Secure Network Protocols (Q6487213) (← links)
- Improved reductions from noisy to bounded and probing leakages via hockey-stick divergences (Q6652998) (← links)