Difference between revisions of "NPS CS4614 Summer 2014"
From Simson Garfinkel
Jump to navigationJump to search
(Created page with "Papers under consideration: * Bernstein, D. J. Cache-timing attacks on AES, 2004. http://cr.yp.to/papers.html#cachetiming") |
m |
||
Line 1: | Line 1: | ||
Papers under consideration: | Papers under consideration: | ||
==AES Timing Attacks== | |||
* Bernstein, D. J. Cache-timing attacks on AES, 2004. http://cr.yp.to/papers.html#cachetiming | * Bernstein, D. J. Cache-timing attacks on AES, 2004. http://cr.yp.to/papers.html#cachetiming | ||
* Brumley, B. B., and Tuveri, N. Remote timing attacks are still practical, In Computer Security-ESORICS 2011, Spring 2011, pp. 355-371 | |||
* Brumley, D. and Boneh, D. Remote timing attacks are practical. Computer Networks 48, 5 (2005), 701-716 |
Revision as of 04:28, 16 April 2014
Papers under consideration:
AES Timing Attacks
- Bernstein, D. J. Cache-timing attacks on AES, 2004. http://cr.yp.to/papers.html#cachetiming
- Brumley, B. B., and Tuveri, N. Remote timing attacks are still practical, In Computer Security-ESORICS 2011, Spring 2011, pp. 355-371
- Brumley, D. and Boneh, D. Remote timing attacks are practical. Computer Networks 48, 5 (2005), 701-716