Find link

language:

jump to random article

Find link is a tool written by Edward Betts.

searching for Side-channel attack 12 found (196 total)

alternate case: side-channel attack

Synchronous circuit (352 words) [view diff] exact match in snippet view article find links to article

; Mori, S.; Miyauchi, S.; Ikeda, M.; Asada, K. "Performance and side-channel attack analysis of a self synchronous montgomery multiplier processing element
Titan Security Key (446 words) [view diff] no match in snippet view article find links to article
security firm NinjaLab has been able to extract the key using a side channel attack. In 2019, Google has put a bug bounty up to US$1.5 million on the
Virtual machine escape (1,141 words) [view diff] exact match in snippet view article find links to article
2017-5754: The Spectre and Meltdown hardware vulnerabilities, a cache side-channel attack on CPU level (Rogue Data Cache Load (RDCL)), allow a rogue process
Gernot Heiser (1,543 words) [view diff] no match in snippet view article find links to article
channels, he demonstrated in 2015 the first practical cross-core timing side channel attack. This led to work on the systematic prevention of timing-channel
Universal 2nd Factor (1,477 words) [view diff] exact match in snippet view article find links to article
chips". January 8, 2021. Cimpanu, Catalin (January 8, 2021). "New side-channel attack can recover encryption keys from Google Titan security keys". ZDNet
RSA cryptosystem (7,787 words) [view diff] exact match in snippet view article find links to article
Crypto Library, which was used notably by Firefox and Chrome. A side-channel attack using branch-prediction analysis (BPA) has been described. Many processors
NIST Post-Quantum Cryptography Standardization (2,983 words) [view diff] no match in snippet view article find links to article
their proposals in order for their security claims to hold. FALCON side channel attack using electromagnetic measurements to extract the secret signing
Eran Tromer (243 words) [view diff] exact match in snippet view article find links to article
RSA key extraction attack using acoustic cryptanalysis, a type of side-channel attack. In 2014, Tromer coauthored the design of Zerocash, which laid the
Digital signature transponder (1,058 words) [view diff] exact match in snippet view article find links to article
implementations. Additional to the cryptanalysis of DST80, they also found a side-channel attack that can also be used to extract the cryptographic keys. DST80 is
YubiKey (2,957 words) [view diff] no match in snippet view article find links to article
the original on 2019-06-14. Roche, Thomas. (2024-09-03) "EUCLEAK: Side Channel Attack on the YubiKey 5 Series." (PDF) White Paper. Montpellier, France:
2023 in science (44,592 words) [view diff] no match in snippet view article find links to article
Mehrnezhad, Maryam (July 2023). "A Practical Deep Learning-Based Acoustic Side Channel Attack on Keyboards". 2023 IEEE European Symposium on Security and Privacy
Çetin Kaya Koç (1,340 words) [view diff] exact match in snippet view article find links to article
Onur Aciiçmez and Jean-Pierre Seifert, introduced a new software side-channel attack exploiting branch prediction in modern CPUs, demonstrating its effectiveness