IACR Local SearchPossible queries include
Found 30000 results
We describe several software side-channel attacks based on inter-process leakage through the state of the CPU's memory cache. This leakage reveals memory access patterns, which can be used for cryptanalysis of cryptographic...received 15 Aug 2005
Main Page Call for Papers Contact Info Program Local Info Registration Rump Session BoFs CRYPTO 2005 Rump Session Program [Note: Presenters. Please let me know if you want the status of your presentation changed]. 19:30 -...
Cache attacks on implementations of cryptographic algorithms have turned out to be very powerful. Progress in processor design, e.g., like hyperthreading, requires to adapt models for tampering or side-channel attacks to cover...last revised 23 Jul 2007
CRYPTO 2010: Tal Rabin (Ed.): Advances in Cryptology - CRYPTO 2010 - CRYPTO 2010, 30th Annual Cryptology Conference, Santa Barbara, CA, USA, August 15-19, 2010 Proceedings. CRYPTO 2010 Santa Barbara, CA, USA, August 15-19,...
CRYPTO 2009: Shai Halevi (Eds.): Advances in Cryptology - CRYPTO 2009, 29th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2009 Proceedings. CRYPTO 2009 Santa Barbara, CA, USA, August 16-20,...
Crypto 2011 rump session The Crypto 2011 rump session took place Tuesday 16 August 2011 from 19:30 PDT to 23:00 PDT. Daniel J. Bernstein and Tanja Lange served as chairs. Jim Hughes provided assistance in program selection....
Much of the information on this web page was provided courtesy of Michael Ley and the DBLP Project CHES 2005: Edinburgh, UK Josyula R. Rao, Berk Sunar (Eds.): Cryptographic Hardware and Embedded Systems - CHES 2005, 7th...
Crypto 2011 Rump Session The Crypto 2011 Rump Session took place Tuesday 16 August 2011 from 19:30 PDT to 23:00 PDT. Daniel J. Bernstein and Tanja Lange served as chairs. Jim Hughes provided assistance in program selection....
Workshop on Cryptographic Hardware and Embedded Systems CHES 2003 Cologne, Germany September 7 - 10, 2003 Sunday, September 7th Monday, September 8th Tuesday, September 9th Wednesday, September 10th Final Program Sunday,...
CHES 2010 CALL FOR PAPERS CHES STATISTICS FORMER CHES STEERING COMMITTEE SC RULES CHES '99 CHES 2000 CHES 2001 CHES 2002 CHES 2003 CHES 2004 CHES 2005 CHES 2006 CHES 2007 CHES 2008 CHES 2009 Workshop on Cryptographic Hardware...
Side channel attacks on cryptographic systems are attacks exploiting information gained from physical implementations rather than utilizing theoretical weaknesses of a scheme. In particular, during the last years, major...last revised 19 Oct 2011
This paper presents new software speed records for encryption and decryption using the block cipher AES-128 for different architectures. Target platforms are 8-bit AVR microcontrollers, NVIDIA graphics processing units (GPUs)...last revised 6 Nov 2009
We show how malicious web content can extract cryptographic secret keys from the user's computer. The attack uses portable scripting languages supported by modern browsers to induce contention for CPU cache resources, and...received 31 Jan 2018
Today, about 10% of TLS connections are still using CBC-mode cipher suites, despite a long history of attacks and the availability of better options (e.g. AES-GCM). In this work, we present three new types of attack against...last revised 16 Aug 2018
CHES 2009: Kris Gaj and Christophe Clavier (Eds.): Cryptographic Hardware and Embedded Systems - CHES 2009, 11th International Workshop, Lausanne, Switzerland, September 6-9, 2009, Proceedings Proceedings. CHES 2009 Lausanne,...
In recent years, side-channel timing attacks utilizing architectural behavior have been applied to cloud settings, presenting a realistic and serious cyber threat. Access-driven cache attacks allow the adversary to observe...received 6 Oct 2016
Workshop on Cryptographic Hardware and Embedded Systems (CHES 2005) Edinburgh, Scotland Monday Evening August 29 th - Thursday September 1 st , 2005 The Roxburghe Hotel sponsored by IACR [ CHES 05 ][ PROGRAM ][ CHES BANQUET ][...