Cache Attacks Enable Bulk Key Recovery on the Cloud
- 4 August 2016
- book chapter
- conference paper
- Published by Springer Science and Business Media LLC
Abstract
No abstract availableKeywords
This publication has 30 references indexed in Scilit:
- Who Watches the Watchmen?: Utilizing Performance Monitors for Compromising Keys of RSA on Intel PlatformsPublished by Springer Science and Business Media LLC ,2015
- Stealing Keys from PCs Using a Radio: Cheap Electromagnetic Attacks on Windowed ExponentiationPublished by Springer Science and Business Media LLC ,2015
- Last-Level Cache Side-Channel Attacks are PracticalPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2015
- “Ooh Aah... Just a Little Bit” : A Small Amount of Side Channel Can Go a Long WayLecture Notes in Computer Science, 2014
- RSA Key Extraction via Low-Bandwidth Acoustic CryptanalysisPublished by Springer Science and Business Media LLC ,2014
- Factoring RSA Keys from Certified Smart Cards: Coppersmith in the WildLecture Notes in Computer Science, 2013
- Detecting co-residency with active traffic analysis techniquesPublished by Association for Computing Machinery (ACM) ,2012
- Yet another MicroArchitectural Attack:Published by Association for Computing Machinery (ACM) ,2007
- Predicting Secret Keys Via Branch PredictionLecture Notes in Computer Science, 2006
- Electromagnetic Analysis: Concrete ResultsLecture Notes in Computer Science, 2001