搜索结果: 1-4 共查到“军事学 cache-timing attacks”相关记录4条 . 查询时间(0.302 秒)
DAWG: A Defense Against Cache Timing Attacks in Speculative Execution Processors
secure processor cache timing attack cache partitioning
2018/5/11
Software side channel attacks have become a serious concern with the recent rash of attacks on speculative processor architectures. Most attacks that have been demonstrated exploit the cache tag state...
Cache-Timing Attacks on RSA Key Generation
applied cryptography public key cryptography RSA
2018/4/25
During the last decade, constant-time cryptographic software has quickly transitioned from an academic construct to a concrete security requirement for real-world libraries. Most of OpenSSL's constant...
A Formal Analysis of Prefetching in Profiled Cache-Timing Attacks on Block Ciphers
Chester Rebeiro Debdeep Mukhopadhyay
2015/12/18
Formally bounding side-channel leakage is important to bridge the gap between the theory and practice in cryptography. However, bounding side-channel leakages is difficult because leakage in a crypto-...
Cache Timing Attacks on Camellia Block Cipher
block cipher access driven Cache timing attack
2009/7/22
Camellia, as the final winner of 128-bit block cipher in NESSIE, is the most secure block cipher of the world, none of the published paper has claimed to extract full Camellia key through experiment w...