A Vulnerability in RSA Implementations Due to Instruction Cache Analysis and Its Demonstration on OpenSSL
From MaRDI portal
Publication:5458944
DOI10.1007/978-3-540-79263-5_16zbMath1153.94341OpenAlexW1832887889MaRDI QIDQ5458944
Onur Acıiçmez, Werner Schindler
Publication date: 24 April 2008
Published in: Topics in Cryptology – CT-RSA 2008 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-540-79263-5_16
RSAstochastic processMontgomery multiplicationside channel analysisInstruction-Cache AttackMicroArchitectural analysis
Related Items (5)
System-level non-interference of constant-time cryptography. I: Model ⋮ Side Channels in the McEliece PKC ⋮ Advanced stochastic methods in side channel analysis on block ciphers in the presence of masking ⋮ Exponent Blinding Does Not Always Lift (Partial) Spa Resistance to Higher-Level Security ⋮ Stochastic methods defeat regular RSA exponentiation algorithms with combined blinding methods
Uses Software
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Improving Divide and Conquer Attacks against Cryptosystems by Better Error Detection / Correction Strategies
- Predicting Secret Keys Via Branch Prediction
- Cache Based Remote Timing Attack on the AES
- Cryptography and Coding
- Advances on Access-Driven Cache Attacks on AES
- New Branch Prediction Vulnerabilities in OpenSSL and Necessary Software Countermeasures
- Public Key Cryptography - PKC 2005
- Topics in Cryptology – CT-RSA 2006
This page was built for publication: A Vulnerability in RSA Implementations Due to Instruction Cache Analysis and Its Demonstration on OpenSSL