| Name | Last modified | Size | Description |
|
| Parent Directory | | - | |
| A New Sign Change Attack on the Montgomery Ladders (2016) - Batten, Amain.pdf | 2023-08-25 22:25 | 7.4M | |
| Blinded Fault Resistant Exponentiation (2006) - Fumaroli, Vigilant.pdf | 2023-08-25 22:25 | 134K | |
| Cryptographic Engineering, Chapter 16: Leakage from Montgomery Multiplication - Walter.pdf | 2023-08-25 22:25 | 1.0M | |
| Dude, is my code constant time? (2016) - Reparaz, Balasch, Verbauwhede.pdf | 2023-08-25 22:25 | 1.2M | |
| Elliptic Curves and Side-Channel Analysis (2003) - Joye.pdf | 2023-08-25 22:25 | 197K | |
| FLUSH+RELOAD: A High Resolution, Low Noise, L3 Cache Side-Channel Attack (2013) - Yarom, Falkner.pdf | 2023-08-25 22:25 | 213K | |
| Fault Attack on Elliptic Curve with Montgomery Ladder Implementation (2008) - Fouque, Lercier, RĂ©al, Valette.pdf | 2023-08-25 22:25 | 167K | |
| Fault Attacks on the Montgomery Powering Ladder (2011) - Schmidt, Medwed.pdf | 2023-08-25 22:25 | 99K | |
| Fault Detection and a Differential Fault Analysis Countermeasure for the Montgomery power ladder in elliptic curve cryptography (2012) - Vasyltsov, Saldamli.pdf | 2023-08-25 22:25 | 327K | |
| Get Your Hands Off My Laptop: Physical Side-Channel Key-Extraction Attacks on PCs (2014) - Genkin, Pipman, Tromer.pdf | 2023-08-25 22:25 | 5.3M | |
| Kangaroos in Side-Channel Attacks (2014) - Lange, van Vredendaal, Wakker.pdf | 2023-08-25 22:25 | 433K | |
| Longer Keys May Facilitate Side Channel Attacks (2004) - Walter.pdf | 2023-08-25 22:25 | 235K | |
| On the Security of Fresh Re-keying to Counteract Side-Channel and Fault Attacks (2015) - Dobraunig, Eichlseder, Mangard, and Mendel.pdf | 2023-08-25 22:25 | 255K | |
| Ooh Aah... Just a Little Bit: A Small Amount of Side Channel Can Go a Long Way (2014) - Benger, van de Pol, Smart, Yarom.pdf | 2023-08-25 22:25 | 225K | |
| RSA Key Extraction via Low-Bandwidth Acoustic Cryptanalysis (2013) - Genkin, Shamir, Tromer.pdf | 2023-08-25 22:25 | 7.7M | |
| Recovering OpenSSL ECDSA Nonces Using the FLUSH+RELOAD Cache Side-channel Attack (2014) - Yarom, Benger.pdf | 2023-08-25 22:25 | 186K | |
| Resistance Against Differential Power Analysis for Elliptic Curve Cryptosystems (1999) - Coron.pdf | 2023-08-25 22:25 | 153K | |
| Reverse Engineering x86 Processor Microcode (2017) - Koppe, Kollenda, Fyrbiak, Kison, Gawlik, Paar, Holz.pdf | 2023-08-25 22:25 | 2.5M | |
| Side-Channel Attacks: Ten Years After Its Publication and the Impacts on Cryptographic Module Security Testing (2005) - Zhou, Feng.pdf | 2023-08-25 22:25 | 584K | |
| Sliding right into disaster: left-to-right sliding windows leak (2017) - Bernstein, Breitner, Genkin, Bruinderink, Heninger, Lange, van Vredendaal, Yarom.pdf | 2023-08-25 22:25 | 440K | |
| Stealing Keys from PCs using a Radio: Cheap Electromagnetic Attacks on Windowed Exponentiation (2015) - Genkin, Pachmanov, Pipman.pdf | 2023-08-25 22:25 | 2.0M | |
| The Spy in the Sandbox: Practical Cache Attacks in Javascript (2015) - Oren et. al.pdf | 2023-08-25 22:25 | 1.1M | |
| The Tempurature Side Channel and Heating Fault Attacks (2013) - Hutter, Schmidt.pdf | 2023-08-25 22:25 | 1.7M | |
| Tighter, faster, simpler side-channel security evaluations beyond computing power (2015) - Bernstein, Lange, van Vredendaal.pdf | 2023-08-25 22:25 | 1.5M | |
| Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems (2009) - Kocher.pdf | 2023-08-25 22:25 | 207K | |
| Timing Channels in Cryptography: A Micro-Architectural Perspective (2015) - Rebeiro, Mukhopadhyay, Bhattacharya.pdf | 2023-08-25 22:25 | 6.1M | |
|