A practical implementation of the timing attack

JF Dhem, F Koeune, PA Leroux, P Mestré… - Smart Card Research …, 2000 - Springer
… difficult to exploit in practice. This paper presents an effective and efficient attack of a
cryptographic algorithm running on a smart card. The first practical timing attack to our knowledge …

Remote timing attacks are still practical

BB Brumley, N Tuveri - European Symposium on Research in Computer …, 2011 - Springer
… This paper describes a timing attack vulnerability in OpenSSL’s ladder implementation for
… This paper describes a timing attack vulnerability in OpenSSL’s ladder implementation for …

Faster and timing-attack resistant AES-GCM

E Käsper, P Schwabe - International Workshop on Cryptographic …, 2009 - Springer
… a cache-timing attack are available also during key schedule. However, we argue that
mounting a cache-timing attack against AES keyexpansion will be very hard in practice. Common …

Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems

PC Kocher - Advances in Cryptology—CRYPTO'96: 16th Annual …, 1996 - Springer
… may need to incorporate measures to prevenl timing attacks. … /non-CRT attack, once one digit
of p has been found, the timing … whether timing attacks can be adapted to directly attack the …

A new type of timing attack: Application to GPS

J Cathalo, F Koeune, JJ Quisquater - Cryptographic Hardware and …, 2003 - Springer
… to a timing attack. We show in this paper that this is not true. We propose a timing attack on
… private key provided the exponentiation’s running time is dependent (in our example, linear) …

Opportunities and limits of remote timing attacks

SA Crosby, DS Wallach, RH Riedi - ACM Transactions on Information …, 2009 - dl.acm.org
… In this section, we simulate an attacker performing a timing attack and evaluate the empirical
… The timing attacks discussed in this article are an example of side channel attacks, where a …

Remote timing attacks are practical

D Brumley, D Boneh - Computer Networks, 2005 - Elsevier
… that timing attacks apply to general software systems. Specifically, we devise a timing attack
against … Our results demonstrate that timing attacks against network servers are practical and …

A cache timing attack on AES in virtualization environments

M Weiß, B Heinz, F Stumpf - … , FC 2012, Kralendijk, Bonaire, Februray 27 …, 2012 - Springer
… the use of cache timing attacks. Even though it has already been stated that cache timing
attacks may circumvent the virtualization barriers [14], we provide additional practical evidence …

Timing attack analysis on AES on modern processors

P Kaushik, R Majumdar - 2017 6th International Conference on …, 2017 - ieeexplore.ieee.org
… try and implement the cache timing attack on a … implement cache timing attack on various
AES implementations over modern processors. The practical importance of mounting an attack

[PDF][PDF] Timing attack: what can be achieved by a powerful adversary?

G Hachez, F Koeune, JJ Quisquater - SYMPOSIUM ON INFORMATION …, 1999 - Citeseer
TIMING ATTACK We begin by describing the main features of the timing attack. A more … We
will attack an RSA implementation, performed in an earlier version of the cryptographic library …