language:
Find link is a tool written by Edward Betts.searching for Side-channel attack 12 found (196 total)
alternate case: side-channel attack
Synchronous circuit
(352 words)
[view diff]
exact match in snippet
view article
find links to article
; Mori, S.; Miyauchi, S.; Ikeda, M.; Asada, K. "Performance and side-channel attack analysis of a self synchronous montgomery multiplier processing elementTitan Security Key (446 words) [view diff] no match in snippet view article find links to article
security firm NinjaLab has been able to extract the key using a side channel attack. In 2019, Google has put a bug bounty up to US$1.5 million on theVirtual machine escape (1,141 words) [view diff] exact match in snippet view article find links to article
2017-5754: The Spectre and Meltdown hardware vulnerabilities, a cache side-channel attack on CPU level (Rogue Data Cache Load (RDCL)), allow a rogue processGernot Heiser (1,543 words) [view diff] no match in snippet view article find links to article
channels, he demonstrated in 2015 the first practical cross-core timing side channel attack. This led to work on the systematic prevention of timing-channelUniversal 2nd Factor (1,477 words) [view diff] exact match in snippet view article find links to article
chips". January 8, 2021. Cimpanu, Catalin (January 8, 2021). "New side-channel attack can recover encryption keys from Google Titan security keys". ZDNetRSA cryptosystem (7,787 words) [view diff] exact match in snippet view article find links to article
Crypto Library, which was used notably by Firefox and Chrome. A side-channel attack using branch-prediction analysis (BPA) has been described. Many processorsNIST Post-Quantum Cryptography Standardization (2,983 words) [view diff] no match in snippet view article find links to article
their proposals in order for their security claims to hold. FALCON side channel attack using electromagnetic measurements to extract the secret signingEran Tromer (243 words) [view diff] exact match in snippet view article find links to article
RSA key extraction attack using acoustic cryptanalysis, a type of side-channel attack. In 2014, Tromer coauthored the design of Zerocash, which laid theDigital signature transponder (1,058 words) [view diff] exact match in snippet view article find links to article
implementations. Additional to the cryptanalysis of DST80, they also found a side-channel attack that can also be used to extract the cryptographic keys. DST80 isYubiKey (2,957 words) [view diff] no match in snippet view article find links to article
the original on 2019-06-14. Roche, Thomas. (2024-09-03) "EUCLEAK: Side Channel Attack on the YubiKey 5 Series." (PDF) White Paper. Montpellier, France:2023 in science (44,592 words) [view diff] no match in snippet view article find links to article
Mehrnezhad, Maryam (July 2023). "A Practical Deep Learning-Based Acoustic Side Channel Attack on Keyboards". 2023 IEEE European Symposium on Security and PrivacyÇetin Kaya Koç (1,340 words) [view diff] exact match in snippet view article find links to article
Onur Aciiçmez and Jean-Pierre Seifert, introduced a new software side-channel attack exploiting branch prediction in modern CPUs, demonstrating its effectiveness