Difference between revisions of "NPS CS4614 Summer 2014"

From Simson Garfinkel
Jump to navigationJump to search
(Created page with "Papers under consideration: * Bernstein, D. J. Cache-timing attacks on AES, 2004. http://cr.yp.to/papers.html#cachetiming")
 
m
Line 1: Line 1:
Papers under consideration:
Papers under consideration:
==AES Timing Attacks==
* Bernstein, D. J. Cache-timing attacks on AES, 2004. http://cr.yp.to/papers.html#cachetiming
* Bernstein, D. J. Cache-timing attacks on AES, 2004. http://cr.yp.to/papers.html#cachetiming
* Brumley, B. B., and Tuveri, N. Remote timing attacks are still practical, In Computer Security-ESORICS 2011, Spring 2011, pp. 355-371
* Brumley, D. and Boneh, D. Remote timing attacks are practical. Computer Networks 48, 5 (2005), 701-716

Revision as of 04:28, 16 April 2014

Papers under consideration:

AES Timing Attacks

  • Bernstein, D. J. Cache-timing attacks on AES, 2004. http://cr.yp.to/papers.html#cachetiming
  • Brumley, B. B., and Tuveri, N. Remote timing attacks are still practical, In Computer Security-ESORICS 2011, Spring 2011, pp. 355-371
  • Brumley, D. and Boneh, D. Remote timing attacks are practical. Computer Networks 48, 5 (2005), 701-716