Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security 2006
DOI: 10.1145/1128817.1128887
|View full text |Cite
|
Sign up to set email alerts
|

A refined look at Bernstein's AES side-channel analysis

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
35
0

Year Published

2006
2006
2020
2020

Publication Types

Select...
8

Relationship

1
7

Authors

Journals

citations
Cited by 59 publications
(35 citation statements)
references
References 0 publications
0
35
0
Order By: Relevance
“…Subsequent research verified the correctness of the findings [11,10,9,15], improved the attack technically [14,3,8] or algorithmically [5], and devised and analysed countermeasures [6,4,16].…”
Section: Introductionmentioning
confidence: 93%
See 2 more Smart Citations
“…Subsequent research verified the correctness of the findings [11,10,9,15], improved the attack technically [14,3,8] or algorithmically [5], and devised and analysed countermeasures [6,4,16].…”
Section: Introductionmentioning
confidence: 93%
“…In the following, we give a simplified description of cache timing attacks; for a more complete description, see e.g. [13,9].…”
Section: Cache Timing Attacksmentioning
confidence: 99%
See 1 more Smart Citation
“…In [2], Bernstein showed results of side channel analysis against AES, based on the first round. [10] and [11,12,13] independently provided an analysis of the second round of AES. These attacks belong to the class of timedriven cache-based attacks as they analyze the overall execution time.…”
Section: Introductionmentioning
confidence: 99%
“…Further publications of Page [15], Percival [16], Bernstein [3], Osvik et al [13] and Brickell et al [7] disclosed the full power of CBAs. See [4,10,12,1,2] for further improvements of CBAs. In particular, the fast AES implementation [8] is susceptible to CBAs.…”
Section: Introductionmentioning
confidence: 99%