Index of /tech/cryptography & mathematics/side channels

[ICO]NameLast modifiedSizeDescription

[PARENTDIR]Parent Directory  -  
[   ]RSA Key Extraction via Low-Bandwidth Acoustic Cryptanalysis (2013) - Genkin, Shamir, Tromer.pdf2023-08-25 22:25 7.7M 
[   ]A New Sign Change Attack on the Montgomery Ladders (2016) - Batten, Amain.pdf2023-08-25 22:25 7.4M 
[   ]Timing Channels in Cryptography: A Micro-Architectural Perspective (2015) - Rebeiro, Mukhopadhyay, Bhattacharya.pdf2023-08-25 22:25 6.1M 
[   ]Get Your Hands Off My Laptop: Physical Side-Channel Key-Extraction Attacks on PCs (2014) - Genkin, Pipman, Tromer.pdf2023-08-25 22:25 5.3M 
[   ]Reverse Engineering x86 Processor Microcode (2017) - Koppe, Kollenda, Fyrbiak, Kison, Gawlik, Paar, Holz.pdf2023-08-25 22:25 2.5M 
[   ]Stealing Keys from PCs using a Radio: Cheap Electromagnetic Attacks on Windowed Exponentiation (2015) - Genkin, Pachmanov, Pipman.pdf2023-08-25 22:25 2.0M 
[   ]The Tempurature Side Channel and Heating Fault Attacks (2013) - Hutter, Schmidt.pdf2023-08-25 22:25 1.7M 
[   ]Tighter, faster, simpler side-channel security evaluations beyond computing power (2015) - Bernstein, Lange, van Vredendaal.pdf2023-08-25 22:25 1.5M 
[   ]Dude, is my code constant time? (2016) - Reparaz, Balasch, Verbauwhede.pdf2023-08-25 22:25 1.2M 
[   ]The Spy in the Sandbox: Practical Cache Attacks in Javascript (2015) - Oren et. al.pdf2023-08-25 22:25 1.1M 
[   ]Cryptographic Engineering, Chapter 16: Leakage from Montgomery Multiplication - Walter.pdf2023-08-25 22:25 1.0M 
[   ]Side-Channel Attacks: Ten Years After Its Publication and the Impacts on Cryptographic Module Security Testing (2005) - Zhou, Feng.pdf2023-08-25 22:25 584K 
[   ]Sliding right into disaster: left-to-right sliding windows leak (2017) - Bernstein, Breitner, Genkin, Bruinderink, Heninger, Lange, van Vredendaal, Yarom.pdf2023-08-25 22:25 440K 
[   ]Kangaroos in Side-Channel Attacks (2014) - Lange, van Vredendaal, Wakker.pdf2023-08-25 22:25 433K 
[   ]Fault Detection and a Differential Fault Analysis Countermeasure for the Montgomery power ladder in elliptic curve cryptography (2012) - Vasyltsov, Saldamli.pdf2023-08-25 22:25 327K 
[   ]On the Security of Fresh Re-keying to Counteract Side-Channel and Fault Attacks (2015) - Dobraunig, Eichlseder, Mangard, and Mendel.pdf2023-08-25 22:25 255K 
[   ]Longer Keys May Facilitate Side Channel Attacks (2004) - Walter.pdf2023-08-25 22:25 235K 
[   ]Ooh Aah... Just a Little Bit: A Small Amount of Side Channel Can Go a Long Way (2014) - Benger, van de Pol, Smart, Yarom.pdf2023-08-25 22:25 225K 
[   ]FLUSH+RELOAD: A High Resolution, Low Noise, L3 Cache Side-Channel Attack (2013) - Yarom, Falkner.pdf2023-08-25 22:25 213K 
[   ]Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems (2009) - Kocher.pdf2023-08-25 22:25 207K 
[   ]Elliptic Curves and Side-Channel Analysis (2003) - Joye.pdf2023-08-25 22:25 197K 
[   ]Recovering OpenSSL ECDSA Nonces Using the FLUSH+RELOAD Cache Side-channel Attack (2014) - Yarom, Benger.pdf2023-08-25 22:25 186K 
[   ]Fault Attack on Elliptic Curve with Montgomery Ladder Implementation (2008) - Fouque, Lercier, RĂ©al, Valette.pdf2023-08-25 22:25 167K 
[   ]Resistance Against Differential Power Analysis for Elliptic Curve Cryptosystems (1999) - Coron.pdf2023-08-25 22:25 153K 
[   ]Blinded Fault Resistant Exponentiation (2006) - Fumaroli, Vigilant.pdf2023-08-25 22:25 134K 
[   ]Fault Attacks on the Montgomery Powering Ladder (2011) - Schmidt, Medwed.pdf2023-08-25 22:25 99K 

Apache/2.4.59 (Debian) Server at idouzi.info Port 80