Who Watches the Watchmen?: Utilizing Performance Monitors for Compromising Keys of RSA on Intel Platforms
暂无分享,去创建一个
[1] Ingrid Verbauwhede,et al. Exploiting Hardware Performance Counters , 2008, 2008 5th Workshop on Fault Diagnosis and Tolerance in Cryptography.
[2] Onur Aciiçmez,et al. Predicting Secret Keys Via Branch Prediction , 2007, CT-RSA.
[3] Paul C. Kocher,et al. Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems , 1996, CRYPTO.
[4] David A. Patterson,et al. Computer Architecture: A Quantitative Approach , 1969 .
[5] Onur Aciiçmez,et al. An Analytical Model for Time-Driven Cache Attacks , 2007, FSE.
[6] RSA Laboratories , 1997 .
[7] Patricia J. Teller,et al. Just how accurate are performance counters? , 2001, Conference Proceedings of the 2001 IEEE International Performance, Computing, and Communications Conference (Cat. No.01CH37210).
[8] Marc Joye,et al. The Montgomery Powering Ladder , 2002, CHES.
[9] Debdeep Mukhopadhyay,et al. Fault Attack revealing Secret Keys of Exponentiation Algorithms from Branch Prediction Misses , 2014, IACR Cryptol. ePrint Arch..
[10] James Manger,et al. A Chosen Ciphertext Attack on RSA Optimal Asymmetric Encryption Padding (OAEP) as Standardized in PKCS #1 v2.0 , 2001, CRYPTO.
[11] P. L. Montgomery. Modular multiplication without trial division , 1985 .
[12] Daniel Bleichenbacher,et al. Chosen Ciphertext Attacks Against Protocols Based on the RSA Encryption Standard PKCS #1 , 1998, CRYPTO.
[13] Yale N. Patt,et al. A two-level approach to making class predictions , 2003, 36th Annual Hawaii International Conference on System Sciences, 2003. Proceedings of the.