[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
article

Timing attacks on RSA: revealing your secrets through the fourth dimension

Published: 01 May 2005 Publication History
First page of PDF

References

[1]
1 Brumley, D. & Boneh, D. Remote timing attacks are practical. 〈〈crypto.stanford.edu/~dabo/papers/ssl-timing.pdf〉.
[2]
2 Burton, D. M. (1989). Elementary Number Theory, 2e. Wm. C. Brown Publishers.
[3]
3 Dhem, J. F., Koeune, F., Leroux, P.-A., Mestré, P., Quisquater, J.-J., & Willems, J.-L. (1998). A practical implementation of the timing attack. 〈〈www.cs.jhu.edu/~fabian/courses/CS600.624/Timing-full.pdf〉.
[4]
4 Kocher, P. Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems. 〈www.cryptography.com/resources/whitepapers/TimingAttacks.pdf〉.
[5]
5 Levy, S. (1999). The open secret. Wired, 7(4). 〈http://www.wired.com/wired/archive/7.04/crypto.html〉.
[6]
6 OpenSSL Project. 〈http://www.openssl.org〉.
[7]
7 Rivest, R. L., Shamir, A., & Adleman, L. (1978). A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM, 21(2), pp. 120-126.
[8]
8 RSA Laboratories. 〈http://www.rsasecurity.com/rsalabs/node.asp?id=2098〉.
[9]
9 Schneier, B. (1999). Risks of relying on cryptography. Inside Risks 112. Communications of the ACM, 42(10). 〈www.schneier.com/essay-021.html〉.
[10]
10 Stamp, M. (2005). Information Security: Principles and Practice, John Wiley & Sons, Inc.
[11]
11 US-CERT Vulnerability Note VU#997481. 〈http://www.kb.cert.org/vuls/id/997481〉.

Cited By

View all
  • (2024)Maya: Hardware Enhanced Customizable Defenses at the User-Kernel Interface2024 International Symposium on Secure and Private Execution Environment Design (SEED)10.1109/SEED61283.2024.00016(50-61)Online publication date: 16-May-2024
  • (2024)Quantitative Input Usage Static AnalysisNASA Formal Methods10.1007/978-3-031-60698-4_5(79-98)Online publication date: 4-Jun-2024
  • (2023)Security Verification of Low-Trust ArchitecturesProceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security10.1145/3576915.3616643(945-959)Online publication date: 15-Nov-2023
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image XRDS: Crossroads, The ACM Magazine for Students
XRDS: Crossroads, The ACM Magazine for Students  Volume 11, Issue 3
March 2005
59 pages
ISSN:1528-4972
EISSN:1528-4980
DOI:10.1145/1144396
Issue’s Table of Contents
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 01 May 2005
Published in XRDS Volume 11, Issue 3

Permissions

Request permissions for this article.

Check for updates

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)75
  • Downloads (Last 6 weeks)5
Reflects downloads up to 22 Dec 2024

Other Metrics

Citations

Cited By

View all
  • (2024)Maya: Hardware Enhanced Customizable Defenses at the User-Kernel Interface2024 International Symposium on Secure and Private Execution Environment Design (SEED)10.1109/SEED61283.2024.00016(50-61)Online publication date: 16-May-2024
  • (2024)Quantitative Input Usage Static AnalysisNASA Formal Methods10.1007/978-3-031-60698-4_5(79-98)Online publication date: 4-Jun-2024
  • (2023)Security Verification of Low-Trust ArchitecturesProceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security10.1145/3576915.3616643(945-959)Online publication date: 15-Nov-2023
  • (2023)Mayalok: A Cyber-Deception Hardware Using Runtime Instruction Infusion2023 IEEE 34th International Conference on Application-specific Systems, Architectures and Processors (ASAP)10.1109/ASAP57973.2023.00019(33-40)Online publication date: Jul-2023
  • (2023)A roadmap from classical cryptography to post-quantum resistant cryptography for 5G-enabled IoT: Challenges, opportunities and solutionsInternet of Things10.1016/j.iot.2023.10095024(100950)Online publication date: Dec-2023
  • (2021)A Counter Measure to Prevent Timing-based Side-Channel Attack on FPGA2021 6th International Conference on Communication and Electronics Systems (ICCES)10.1109/ICCES51350.2021.9489054(983-988)Online publication date: 8-Jul-2021
  • (2020)Monitoring IaaS Cloud for Healthcare SystemsInternational Journal of E-Health and Medical Communications10.4018/IJEHMC.202007010411:3(54-70)Online publication date: 1-Jul-2020
  • (2020)Safeguarding Medical Data and PrivacyTelemedicine Technologies10.1002/9781119575788.ch6(147-181)Online publication date: 29-May-2020
  • (2019)Theorizing the Journalism Model of Disinformation and Hate Speech Propagation in a Nigerian Democratic ContextInternational Journal of E-Politics10.4018/IJEP.201907010510:2(60-73)Online publication date: 1-Jul-2019
  • (2019)Citizen Engagement and Social MediaInternational Journal of E-Politics10.4018/IJEP.201907010310:2(24-43)Online publication date: 1-Jul-2019
  • Show More Cited By

View Options

Login options

Full Access

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Magazine Site

View this article on the magazine site (external)

Magazine Site

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media