• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 12,397
Next 10 →

Remote Timing Attacks are Practical

by David Brumley, Dan Boneh
"... Timing attacks are usually used to attack weak computing devices such as smartcards. We show that timing attacks apply to general software systems. Specifically, we devise a timing attack against OpenSSL. Our experiments show that we can extract private keys from an OpenSSL-based web server running ..."
Abstract - Cited by 248 (4 self) - Add to MetaCart
Timing attacks are usually used to attack weak computing devices such as smartcards. We show that timing attacks apply to general software systems. Specifically, we devise a timing attack against OpenSSL. Our experiments show that we can extract private keys from an OpenSSL-based web server running

Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems

by Paul C. Kocher , 1996
"... By carefully measuring the amount of time required to perform private key operations, attackers may be able to find fixed Diffie-Hellman exponents, factor RSA keys, and break other cryptosystems. Against a vulnerable system, the attack is computationally inexpensive and often requires only known cip ..."
Abstract - Cited by 651 (3 self) - Add to MetaCart
By carefully measuring the amount of time required to perform private key operations, attackers may be able to find fixed Diffie-Hellman exponents, factor RSA keys, and break other cryptosystems. Against a vulnerable system, the attack is computationally inexpensive and often requires only known

Cache-timing attacks on AES

by Daniel J. Bernstein , 2005
"... Abstract. This paper warns against the use of S-boxes in cryptography. In particular, this paper shows that a simple cache-timing attack against AES software reveals some key bits; this paper also discusses some of the obstacles to constant-time array access on modern CPUs. ..."
Abstract - Cited by 136 (3 self) - Add to MetaCart
Abstract. This paper warns against the use of S-boxes in cryptography. In particular, this paper shows that a simple cache-timing attack against AES software reveals some key bits; this paper also discusses some of the obstacles to constant-time array access on modern CPUs.

Timing Attacks on Web Privacy

by Edward W. Felten, Michael A. Schneider , 2000
"... We describe a class of attacks that can compromise the privacy of users' Web-browsing histories. The attacks allow a malicious Web site to determine whether or not the user has recently visited some other, unrelated Web page. The malicious page can determine this information by measuring the ti ..."
Abstract - Cited by 117 (0 self) - Add to MetaCart
We describe a class of attacks that can compromise the privacy of users' Web-browsing histories. The attacks allow a malicious Web site to determine whether or not the user has recently visited some other, unrelated Web page. The malicious page can determine this information by measuring

A report on Timing Attacks

by Vasileios Lampos , Stavros Syrimis , Christos Tsiotras , 2007
"... A side channel attack tries to exploit specific properties of the implementation and operating environment of a cryptosystem rather than its mathematical specification [HMV04]. Timing attack is a class of side channel attack where the attacker tries to break an encryption algorithm by using informat ..."
Abstract - Add to MetaCart
A side channel attack tries to exploit specific properties of the implementation and operating environment of a cryptosystem rather than its mathematical specification [HMV04]. Timing attack is a class of side channel attack where the attacker tries to break an encryption algorithm by using

Cache-timing attacks on AES

by unknown authors
"... This paper warns against the use of S-boxes in cryptography. In particular, this paper shows that a simple cache-timing attack against AES software reveals some key bits; this paper also discusses some of the obstacles to constant-time array access on modern CPUs. ..."
Abstract - Add to MetaCart
This paper warns against the use of S-boxes in cryptography. In particular, this paper shows that a simple cache-timing attack against AES software reveals some key bits; this paper also discusses some of the obstacles to constant-time array access on modern CPUs.

Cache-timing attacks on AES

by unknown authors
"... This paper warns against the use of S-boxes in cryptography. In particular, this paper shows that a simple cache-timing attack against AES software reveals some key bits; this paper also discusses some of the obstacles to constant-time array access on modern CPUs. ..."
Abstract - Add to MetaCart
This paper warns against the use of S-boxes in cryptography. In particular, this paper shows that a simple cache-timing attack against AES software reveals some key bits; this paper also discusses some of the obstacles to constant-time array access on modern CPUs.

A Practical Implementation of the Timing Attack

by J. -f. Dhem, F. Koeune, P.-A. Leroux, P. Mestré, J.-J. Quisquater, J. -l. Willems , 1998
"... When the running time of a cryptographic algorithm is nonconstant, timing measurements can leak information about the secret key. This idea, first publicly introduced by Kocher, is developed here to attack an earlier version of the CASCADE smart card. We propose several improvements on Kocher's ..."
Abstract - Cited by 73 (3 self) - Add to MetaCart
When the running time of a cryptographic algorithm is nonconstant, timing measurements can leak information about the secret key. This idea, first publicly introduced by Kocher, is developed here to attack an earlier version of the CASCADE smart card. We propose several improvements on Kocher

Improving timing attack on RSA-CRT . . .

by Tao Wang, et al. , 2013
"... ... into practice. To improve the feasibility of timing attack, the current study proposes an theoretical timing attack algorithms or have extended the existing ones. In 1998, Dhem et al. [8] employed timing attack into a Smartcard that stores an RSA private key. Schindler [19] proposed a timing att ..."
Abstract - Add to MetaCart
... into practice. To improve the feasibility of timing attack, the current study proposes an theoretical timing attack algorithms or have extended the existing ones. In 1998, Dhem et al. [8] employed timing attack into a Smartcard that stores an RSA private key. Schindler [19] proposed a timing

A timing attack against Rijndael

by Francois Koeune, Francois Koeune, Jean-Jacques Quisquater, Jean-jacques Quisquater , 1999
"... This paper describes a timing attack against the AES candidate Rijndael. We show how a careless implementation can be broken with some thousands measures per key byte, provided a very limited knowledge of the implementation. 2 Brief description of Rijndael ..."
Abstract - Cited by 20 (1 self) - Add to MetaCart
This paper describes a timing attack against the AES candidate Rijndael. We show how a careless implementation can be broken with some thousands measures per key byte, provided a very limited knowledge of the implementation. 2 Brief description of Rijndael
Next 10 →
Results 1 - 10 of 12,397
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University