A Cache Timing Attack on AES in Virtualization Environments
暂无分享,去创建一个
[1] Onur Aciiçmez,et al. Trace-Driven Cache Attacks on AES (Short Paper) , 2006, ICICS.
[2] Mitsuru Matsui,et al. Cryptographic Hardware and Embedded Systems - CHES 2006, 8th International Workshop, Yokohama, Japan, October 10-13, 2006, Proceedings , 2006, CHES.
[3] Andrey Bogdanov,et al. Differential Cache-Collision Timing Attacks on AES with Applications to Embedded CPUs , 2010, CT-RSA.
[4] Onur Aciiçmez,et al. Cache Based Remote Timing Attack on the AES , 2007, CT-RSA.
[5] Jianying Zhou,et al. Information and Communications Security , 2013, Lecture Notes in Computer Science.
[6] Adi Shamir,et al. Cache Attacks and Countermeasures: The Case of AES , 2006, CT-RSA.
[7] David Pointcheval. Topics in Cryptology - CT-RSA 2006, The Cryptographers' Track at the RSA Conference 2006, San Jose, CA, USA, February 13-17, 2006, Proceedings , 2006, CT-RSA.
[8] Hovav Shacham,et al. Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds , 2009, CCS.
[9] Aaron Weiss. Trusted computing , 2006, NTWK.
[10] Joseph Bonneau,et al. Cache-Collision Timing Attacks Against AES , 2006, CHES.
[11] Masayuki Abe. Topics in Cryptology - CT-RSA 2007, The Cryptographers' Track at the RSA Conference 2007, San Francisco, CA, USA, February 5-9, 2007, Proceedings , 2006, CT-RSA.
[12] Jean-Pierre Seifert,et al. Cache time-behavior analysis on AES , 2006 .
[13] Jean-Pierre Seifert,et al. A refined look at Bernstein's AES side-channel analysis , 2006, ASIACCS '06.
[14] Colin Percival. CACHE MISSING FOR FUN AND PROFIT , 2005 .
[15] Benny Pinkas,et al. Secure Two-Party Computation is Practical , 2009, IACR Cryptol. ePrint Arch..
[16] Derek Chiou,et al. Where Does Security Stand? New Vulnerabilities vs. Trusted Computing , 2007, IEEE Micro.
[17] James E. Smith,et al. Virtual machines - versatile platforms for systems and processes , 2005 .
[18] Luc Steels,et al. Systems Group , 1973 .
[19] OpenSSL. OpenSSL : The open source toolkit for SSL/TSL , 2002 .
[20] Stephan Krenn,et al. Cache Games -- Bringing Access-Based Cache Attacks on AES to Practice , 2011, 2011 IEEE Symposium on Security and Privacy.
[21] Risto M. Hakala,et al. Cache-Timing Template Attacks , 2009, ASIACRYPT.
[22] Daniel J. Bernstein,et al. Cache-timing attacks on AES , 2005 .