Proceedings of the 6th International Conference on Security of Information and Networks 2013
DOI: 10.1145/2523514.2523593
|View full text |Cite
|
Sign up to set email alerts
|

Attacks on implementations of cryptographic algorithms

Abstract: Cryptographic algorithms, which withstand cryptanalysis after years of rigorous theoretical study and detailed scrutiny have been shown to succumb to attacks that exploit the vulnerabilities in their implementations. Therefore, there has been a vast amount of research effort to find potential vulnerabilities in the implementation of cryptographic algorithms, and efficient and effective countermeasures if such vulnerabilities exist. In this paper, we survey side-channel and fault attacks, which are two powerful… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2017
2017
2017
2017

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 51 publications
0
1
0
Order By: Relevance
“…Cache based timing channel. Cache based attacks can be classified among three types: access-driven, trace-driven, and timing-channel attack [Savaş 2013]. In this paper we discuss about cache based timing channels only.…”
Section: Architecture Based In-system Timing Channel Techniquesmentioning
confidence: 99%
“…Cache based timing channel. Cache based attacks can be classified among three types: access-driven, trace-driven, and timing-channel attack [Savaş 2013]. In this paper we discuss about cache based timing channels only.…”
Section: Architecture Based In-system Timing Channel Techniquesmentioning
confidence: 99%