Home
/
Books
/
cryptography&mathematics
/
side channels
File Name
Size
Date
..
—
—
A New Sign Change Attack on the Montgomery Ladders (2016) - Batten, Amain.pdf.gz
5.61MB
04-07-2024 16:33:20
Blinded Fault Resistant Exponentiation (2006) - Fumaroli, Vigilant.pdf.gz
111.80KB
04-07-2024 16:33:20
Cryptographic Engineering, Chapter 16 Leakage from Montgomery Multiplication - Walter.pdf.gz
351.26KB
04-07-2024 16:33:20
Dude, is my code constant time (2016) - Reparaz, Balasch, Verbauwhede.pdf.gz
1.13MB
04-07-2024 16:33:20
Elliptic Curves and Side-Channel Analysis (2003) - Joye.pdf.gz
163.95KB
04-07-2024 16:33:20
FLUSH+RELOAD A High Resolution, Low Noise, L3 Cache Side-Channel Attack (2013) - Yarom, Falkner.pdf.gz
203.02KB
04-07-2024 16:33:20
Fault Detection and a Differential Fault Analysis Countermeasure for the Montgomery power ladder in elliptic curve cryptography (2012) - Vasyltsov, Saldamli.pdf.gz
301.46KB
04-07-2024 16:33:20
Get Your Hands Off My Laptop Physical Side-Channel Key-Extraction Attacks on PCs (2014) - Genkin, Pipman, Tromer.pdf.gz
5.25MB
04-07-2024 16:33:20
Kangaroos in Side-Channel Attacks (2014) - Lange, van Vredendaal, Wakker.pdf.gz
420.33KB
04-07-2024 16:33:19
Longer Keys May Facilitate Side Channel Attacks (2004) - Walter.pdf.gz
182.51KB
04-07-2024 16:33:20
On the Security of Fresh Re-keying to Counteract Side-Channel and Fault Attacks (2015) - Dobraunig, Eichlseder, Mangard, and Mendel.pdf.gz
251.20KB
04-07-2024 16:33:20
Ooh Aah... Just a Little Bit A Small Amount of Side Channel Can Go a Long Way (2014) - Benger, van de Pol, Smart, Yarom.pdf.gz
205.17KB
04-07-2024 16:33:20
RSA Key Extraction via Low-Bandwidth Acoustic Cryptanalysis (2013) - Genkin, Shamir, Tromer.pdf.gz
7.65MB
04-07-2024 16:33:20
Recovering OpenSSL ECDSA Nonces Using the FLUSH+RELOAD Cache Side-channel Attack (2014) - Yarom, Benger.pdf.gz
182.96KB
04-07-2024 16:33:20
Resistance Against Differential Power Analysis for Elliptic Curve Cryptosystems (1999) - Coron.pdf.gz
111.73KB
04-07-2024 16:33:20
Reverse Engineering x86 Processor Microcode (2017) - Koppe, Kollenda, Fyrbiak, Kison, Gawlik, Paar, Holz.pdf.gz
2.39MB
04-07-2024 16:33:20
Side-Channel Attacks Ten Years After Its Publication and the Impacts on Cryptographic Module Security Testing (2005) - Zhou, Feng.pdf.gz
536.43KB
04-07-2024 16:33:20
Sliding right into disaster left-to-right sliding windows leak (2017) - Bernstein, Breitner, Genkin, Bruinderink, Heninger, Lange, van Vredendaal, Yarom.pdf.gz
435.33KB
04-07-2024 16:33:20
Stealing Keys from PCs using a Radio Cheap Electromagnetic Attacks on Windowed Exponentiation (2015) - Genkin, Pachmanov, Pipman.pdf.gz
1.81MB
04-07-2024 16:33:20
The Spy in the Sandbox Practical Cache Attacks in Javascript (2015) - Oren et. al.pdf.gz
1.02MB
04-07-2024 16:33:19
The Tempurature Side Channel and Heating Fault Attacks (2013) - Hutter, Schmidt.pdf.gz
1.61MB
04-07-2024 16:33:20
Tighter, faster, simpler side-channel security evaluations beyond computing power (2015) - Bernstein, Lange, van Vredendaal.pdf.gz
1.44MB
04-07-2024 16:33:20
Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems (2009) - Kocher.pdf.gz
144.07KB
04-07-2024 16:33:20
Timing Channels in Cryptography A Micro-Architectural Perspective (2015) - Rebeiro, Mukhopadhyay, Bhattacharya.pdf.gz
3.49MB
04-07-2024 16:33:20
10" >