International Association for Cryptologic Research

International Association
for Cryptologic Research

IACR Local Search

Possible queries include homomorphic author:david.
Found 30000 results
Efficient Cache Attacks on AES, and Countermeasures
Iacrpub
https://iacr.org/cryptodb/data/paper.php?pubkey=23445
Dag Arne Osvik Adi Shamir Eran Tromer
Jofc 2010
Cache attacks and Countermeasures: the Case of AES
Eprint
https://eprint.iacr.org/2005/271
Dag Arne Osvik Adi Shamir Eran Tromer
We describe several software side-channel attacks based on inter-process leakage through the state of the CPU's memory cache. This leakage reveals memory access patterns, which can be used for cryptanalysis of cryptographic...
received 15 Aug 2005
CRYPTO 2005: Rump Session
https://iacr.org/conferences/crypto2005/rumpSchedule.html
Main Page Call for Papers Contact Info Program Local Info Registration Rump Session BoFs CRYPTO 2005 Rump Session Program [Note: Presenters. Please let me know if you want the status of your presentation changed]. 19:30 -...
Dag Arne Osvik
Author
https://iacr.org/cryptodb/data/author.php?authorkey=623
EPFL
Fast Software AES Encryption
Iacrpub
https://iacr.org/cryptodb/data/paper.php?pubkey=24035
Dag Arne Osvik Joppe W. Bos Deian Stefan David Canright
Fse 2010
Analysis of countermeasures against access driven cache attacks on AES
Eprint
https://eprint.iacr.org/2007/282
Johannes Bl\"omer \and Volker Krummel
Cache attacks on implementations of cryptographic algorithms have turned out to be very powerful. Progress in processor design, e.g., like hyperthreading, requires to adapt models for tampering or side-channel attacks to cover...
last revised 23 Jul 2007
IACR CRYPTO 2010
https://iacr.org/archive/crypto2010/crypto2010-index.html
CRYPTO 2010: Tal Rabin (Ed.): Advances in Cryptology - CRYPTO 2010 - CRYPTO 2010, 30th Annual Cryptology Conference, Santa Barbara, CA, USA, August 15-19, 2010 Proceedings. CRYPTO 2010 Santa Barbara, CA, USA, August 15-19,...
IACR CRYPTO 2009
https://iacr.org/archive/crypto2009/crypto2009.html
CRYPTO 2009: Shai Halevi (Eds.): Advances in Cryptology - CRYPTO 2009, 29th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2009 Proceedings. CRYPTO 2009 Santa Barbara, CA, USA, August 16-20,...
Crypto 2011 rump session
https://iacr.org/cryptodb/rump.html
Crypto 2011 rump session The Crypto 2011 rump session took place Tuesday 16 August 2011 from 19:30 PDT to 23:00 PDT. Daniel J. Bernstein and Tanja Lange served as chairs. Jim Hughes provided assistance in program selection....
Cryptographic Hardware and Embedded Systems - CHES 2005
https://iacr.org/archive/ches2005/ches2005.html
Much of the information on this web page was provided courtesy of Michael Ley and the DBLP Project CHES 2005: Edinburgh, UK Josyula R. Rao, Berk Sunar (Eds.): Cryptographic Hardware and Embedded Systems - CHES 2005, 7th...
Crypto 2011 Rump Session
https://iacr.org/cryptodb/archive/2011/CRYPTO/video/rump/index.html
Crypto 2011 Rump Session The Crypto 2011 Rump Session took place Tuesday 16 August 2011 from 19:30 PDT to 23:00 PDT. Daniel J. Bernstein and Tanja Lange served as chairs. Jim Hughes provided assistance in program selection....
Workshop on Cryptographic Hardware and Embedded Systems 2003 (CHES 2003)
https://iacr.org/workshops/ches.dir/ches2003/program2003.html
Workshop on Cryptographic Hardware and Embedded Systems CHES 2003 Cologne, Germany September 7 - 10, 2003 Sunday, September 7th Monday, September 8th Tuesday, September 9th Wednesday, September 10th Final Program Sunday,...
Workshop on Cryptographic Hardware and Embedded Systems 2003 (CHES 2003)
https://iacr.org/workshops/ches/ches2003/program2003.html
CHES 2010 CALL FOR PAPERS CHES STATISTICS FORMER CHES STEERING COMMITTEE SC RULES CHES '99 CHES 2000 CHES 2001 CHES 2002 CHES 2003 CHES 2004 CHES 2005 CHES 2006 CHES 2007 CHES 2008 CHES 2009 Workshop on Cryptographic Hardware...
Cache Games - Bringing Access Based Cache Attacks on AES to Practice
Eprint
https://eprint.iacr.org/2010/594
Endre Bangerter David Gullasch Stephan Krenn
Side channel attacks on cryptographic systems are attacks exploiting information gained from physical implementations rather than utilizing theoretical weaknesses of a scheme. In particular, during the last years, major...
last revised 19 Oct 2011
Fast Implementations of AES on Various Platforms
Eprint
https://eprint.iacr.org/2009/501
Joppe W. Bos Dag Arne Osvik Deian Stefan
This paper presents new software speed records for encryption and decryption using the block cipher AES-128 for different architectures. Target platforms are 8-bit AVR microcontrollers, NVIDIA graphics processing units (GPUs)...
last revised 6 Nov 2009
Drive-by Key-Extraction Cache Attacks from Portable Code
Eprint
https://eprint.iacr.org/2018/119
Daniel Genkin Lev Pachmanov Eran Tromer Yuval Yarom
We show how malicious web content can extract cryptographic secret keys from the user's computer. The attack uses portable scripting languages supported by modern browsers to induce contention for CPU cache resources, and...
received 31 Jan 2018
Pseudo Constant Time Implementations of TLS Are Only Pseudo Secure
Eprint
https://eprint.iacr.org/2018/747
Eyal Ronen Kenneth G. Paterson Adi Shamir
Today, about 10% of TLS connections are still using CBC-mode cipher suites, despite a long history of attacks and the availability of better options (e.g. AES-GCM). In this work, we present three new types of attack against...
last revised 16 Aug 2018
IACR CHES 2009
https://iacr.org/archive/ches2009/ches2009.html
CHES 2009: Kris Gaj and Christophe Clavier (Eds.): Cryptographic Hardware and Embedded Systems - CHES 2009, 11th International Workshop, Lausanne, Switzerland, September 6-9, 2009, Proceedings Proceedings. CHES 2009 Lausanne,...
Statistical Analysis for Access-Driven Cache Attacks Against AES
Eprint
https://eprint.iacr.org/2016/970
Liwei Zhang A. Adam Ding Yunsi Fei Zhen Hang Jiang
In recent years, side-channel timing attacks utilizing architectural behavior have been applied to cloud settings, presenting a realistic and serious cyber threat. Access-driven cache attacks allow the adversary to observe...
received 6 Oct 2016
CHES 2005: Workshop on Cryptographic Hardware and Embedded Systems 2005
https://iacr.org/workshops/ches.dir/ches2005/program2005.html
Workshop on Cryptographic Hardware and Embedded Systems (CHES 2005) Edinburgh, Scotland Monday Evening August 29 th - Thursday September 1 st , 2005 The Roxburghe Hotel sponsored by IACR [ CHES 05 ][ PROGRAM ][ CHES BANQUET ][...
Next ►