[图书][B] Secret history: The story of cryptology

C Bauer - 2021 - taylorfrancis.com
The first edition of this award-winning book attracted a wide audience. This second edition is
both a joy to read and a useful classroom tool. Unlike traditional textbooks, it requires no …

A vulnerability in RSA implementations due to instruction cache analysis and its demonstration on OpenSSL

O Acıiçmez, W Schindler - Topics in Cryptology–CT-RSA 2008: The …, 2008 - Springer
MicroArchitectural Analysis (MA) techniques, more specifically Simple Branch Prediction
Analysis (SBPA) and Instruction Cache Analysis, have the potential of disclosing the entire …

Precise detection of side-channel vulnerabilities using quantitative cartesian hoare logic

J Chen, Y Feng, I Dillig - Proceedings of the 2017 ACM SIGSAC …, 2017 - dl.acm.org
This paper presents Themis, an end-to-end static analysis tool for finding resource-usage
side-channel vulnerabilities in Java applications. We introduce the notion of epsilon …

[图书][B] Cryptanalysis of RSA and its variants

MJ Hinek - 2009 - taylorfrancis.com
Thirty years after RSA was first publicized, it remains an active research area. Although
several good surveys exist, they are either slightly outdated or only focus on one type of …

New branch prediction vulnerabilities in OpenSSL and necessary software countermeasures

O Acıiçmez, S Gueron, JP Seifert - Cryptography and Coding: 11th IMA …, 2007 - Springer
Software based side-channel attacks allow an unprivileged spy process to extract secret
information from a victim (cryptosystem) process by exploiting some indirect leakage of “side …

Hardware-software integrated approaches to defend against software cache-based side channel attacks

J Kong, O Aciiçmez, JP Seifert… - 2009 IEEE 15th …, 2009 - ieeexplore.ieee.org
Software cache-based side channel attacks present serious threats to modern computer
systems. Using caches as a side channel, these attacks are able to derive secret keys used …

Understanding contention-based channels and using them for defense

C Hunger, M Kazdagli, A Rawat… - 2015 IEEE 21st …, 2015 - ieeexplore.ieee.org
Microarchitectural resources such as caches and predictors can be used to leak information
across security domains. Significant prior work has demonstrated attacks and defenses for …

Understanding and mitigating covert channels through branch predictors

D Evtyushkin, D Ponomarev… - ACM Transactions on …, 2016 - dl.acm.org
Covert channels through shared processor resources provide secret communication
between two malicious processes: the trojan and the spy. In this article, we classify, analyze …

Make sure DSA signing exponentiations really are constant-time

C Pereida García, BB Brumley, Y Yarom - Proceedings of the 2016 ACM …, 2016 - dl.acm.org
TLS and SSH are two of the most commonly used protocols for securing Internet traffic. Many
of the implementations of these protocols rely on the cryptographic primitives provided in the …

Cheap hardware parallelism implies cheap security

O Aciicmez, JP Seifert - … on fault diagnosis and tolerance in …, 2007 - ieeexplore.ieee.org
The paper presents a new aspect within that PC oriented side-channel attack arena.
Specifically, we present a novel square vs. multiplication oriented side-channel attack which …