Topics in Cryptology – CT-RSA 2006

From MaRDI portal
Publication:5898552

DOI10.1007/11605805zbMath1125.94326DBLPconf/ctrsa/2006OpenAlexW2564556261WikidataQ56921257 ScholiaQ56921257MaRDI QIDQ5898552

Adi Shamir, Eran Tromer, Dag Arne Osvik

Publication date: 12 February 2007

Published in: Lecture Notes in Computer Science (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/11605805




Related Items (37)

Enhanced Differential Cache Attacks on SM4 with Algebraic Analysis and Error-ToleranceA Tale of Three Signatures: Practical Attack of ECDSA with wNAFSide-channeling the \textsf{Kalyna} key expansionConstant-Round Leakage-Resilient Zero-Knowledge Argument for NP from the Knowledge-of-Exponent AssumptionAttacks and Security Proofs of EAX-PrimeUnifying Leakage Classes: Simulatable Leakage and PseudoentropySystem-level non-interference of constant-time cryptography. I: ModelBalloon Hashing: A Memory-Hard Function Providing Provable Protection Against Sequential AttacksAll the AES you need on Cortex-M3 and M4Hierarchical attribute based encryption with continuous leakage-resilienceFormal verification of side-channel countermeasures using self-compositionCache-attacks on the ARM trustzone implementations of AES-256 and AES-256-GCM via GPU-based analysisA low-cost memory remapping scheme for address bus protectionTiming-Sensitive Noninterference through CompositionSecurity Analysis of Cache Replacement PoliciesОБЗОР АТАК НА AES-128: К ПЯТНАДЦАТИЛЕТИЮ СТАНДАРТА AESUnnamed ItemMemory encryptionEfficient cache attacks on AES, and countermeasuresCache Storage AttacksCryptographic Side-Channels from Low-Power Cache MemoryNew Branch Prediction Vulnerabilities in OpenSSL and Necessary Software CountermeasuresAnalysis of Countermeasures Against Access Driven Cache Attacks on AESCryptanalysis of White-Box DES Implementations with Arbitrary External EncodingsBitsliced High-Performance AES-ECB on GPUsA Fast and Cache-Timing Resistant Implementation of the AESA Vulnerability in RSA Implementations Due to Instruction Cache Analysis and Its Demonstration on OpenSSLA formal analysis of prefetching in profiled cache-timing attacks on block ciphersDeterministic Public-Key Encryption Under Continual LeakageA Cache Timing Analysis of HC-256An Enhanced Differential Cache Attack on CLEFIA for Large Cache LinesNew AES Software Speed RecordsOn the intractability of preemptive single-machine job scheduling with release times, deadlines, and family setup timesSecurity analysis of NIST CTR-DRBGTiming-Sensitive Information Flow Analysis for Synchronous SystemsModifying an Enciphering Scheme After DeploymentTowards efficient and strong backward private searchable encryption with secure enclaves


Uses Software





This page was built for publication: Topics in Cryptology – CT-RSA 2006