Topics in Cryptology – CT-RSA 2006
From MaRDI portal
Publication:5898552
DOI10.1007/11605805zbMath1125.94326DBLPconf/ctrsa/2006OpenAlexW2564556261WikidataQ56921257 ScholiaQ56921257MaRDI QIDQ5898552
Adi Shamir, Eran Tromer, Dag Arne Osvik
Publication date: 12 February 2007
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/11605805
Related Items (37)
Enhanced Differential Cache Attacks on SM4 with Algebraic Analysis and Error-Tolerance ⋮ A Tale of Three Signatures: Practical Attack of ECDSA with wNAF ⋮ Side-channeling the \textsf{Kalyna} key expansion ⋮ Constant-Round Leakage-Resilient Zero-Knowledge Argument for NP from the Knowledge-of-Exponent Assumption ⋮ Attacks and Security Proofs of EAX-Prime ⋮ Unifying Leakage Classes: Simulatable Leakage and Pseudoentropy ⋮ System-level non-interference of constant-time cryptography. I: Model ⋮ Balloon Hashing: A Memory-Hard Function Providing Provable Protection Against Sequential Attacks ⋮ All the AES you need on Cortex-M3 and M4 ⋮ Hierarchical attribute based encryption with continuous leakage-resilience ⋮ Formal verification of side-channel countermeasures using self-composition ⋮ Cache-attacks on the ARM trustzone implementations of AES-256 and AES-256-GCM via GPU-based analysis ⋮ A low-cost memory remapping scheme for address bus protection ⋮ Timing-Sensitive Noninterference through Composition ⋮ Security Analysis of Cache Replacement Policies ⋮ ОБЗОР АТАК НА AES-128: К ПЯТНАДЦАТИЛЕТИЮ СТАНДАРТА AES ⋮ Unnamed Item ⋮ Memory encryption ⋮ Efficient cache attacks on AES, and countermeasures ⋮ Cache Storage Attacks ⋮ Cryptographic Side-Channels from Low-Power Cache Memory ⋮ New Branch Prediction Vulnerabilities in OpenSSL and Necessary Software Countermeasures ⋮ Analysis of Countermeasures Against Access Driven Cache Attacks on AES ⋮ Cryptanalysis of White-Box DES Implementations with Arbitrary External Encodings ⋮ Bitsliced High-Performance AES-ECB on GPUs ⋮ A Fast and Cache-Timing Resistant Implementation of the AES ⋮ A Vulnerability in RSA Implementations Due to Instruction Cache Analysis and Its Demonstration on OpenSSL ⋮ A formal analysis of prefetching in profiled cache-timing attacks on block ciphers ⋮ Deterministic Public-Key Encryption Under Continual Leakage ⋮ A Cache Timing Analysis of HC-256 ⋮ An Enhanced Differential Cache Attack on CLEFIA for Large Cache Lines ⋮ New AES Software Speed Records ⋮ On the intractability of preemptive single-machine job scheduling with release times, deadlines, and family setup times ⋮ Security analysis of NIST CTR-DRBG ⋮ Timing-Sensitive Information Flow Analysis for Synchronous Systems ⋮ Modifying an Enciphering Scheme After Deployment ⋮ Towards efficient and strong backward private searchable encryption with secure enclaves
Uses Software
This page was built for publication: Topics in Cryptology – CT-RSA 2006