Timing attack against protected RSA-CRT implementation used in polarssl, Topics in Cryptology -CT-RSA 2013 -The Cryptographers' Track at the RSA Conference, vol.7779, pp.18-33, 2013.,
URL : https://hal.archives-ouvertes.fr/hal-01094300
Sliding Right into Disaster: Left-to-Right Sliding Windows Leak, Cryptographic Hardware and Embedded Systems -CHES 2017 -19th International Conference, vol.10529, pp.555-576, 2017. ,
Differential Fault Analysis of Secret Key Cryptosystems, Advances in Cryptology -CRYPTO '97, p.17 ,
, Annual International Cryptology Conference, vol.1294, pp.513-525, 1997.
On the Importance of Checking Cryptographic Protocols for Faults (Extended Abstract), Lecture Notes in Computer Science, vol.1233, pp.37-51, 1997. ,
Remote Timing Attacks Are Still Practical, Lecture Notes in Computer Science, vol.6879, pp.355-371, 2011. ,
CacheQuote: Efficiently Recovering Long-term Secrets of SGX EPID via Cache Attacks, IACR Trans. Cryptogr. Hardw. Embed. Syst, vol.2018, issue.2, pp.171-191, 2018. ,
Highorder Timing Attacks, Proceedings of the First Workshop on Cryptography and Security in Computing Systems, CS2 '14, pp.7-12, 2014. ,
On the Performance and Security of Multiplication in GF (2 N ), Cryptography, vol.2, issue.3, p.25, 2018.,
URL : https://hal.archives-ouvertes.fr/hal-02288010
Correlated Extra-Reductions Defeat Blinded Regular Exponentiation, Cryptographic Hardware and Embedded Systems -CHES 2016 -18th International Conference, vol.9813, pp.3-22, 2016.,
URL : https://hal.archives-ouvertes.fr/hal-01362463
Binary Data Analysis for Source Code Leakage Assessment, Innovative Security Solutions for Information Technology and Communications -11th International Conference, vol.11359, pp.391-409, 2018. ,
Detecting Cache-Timing Vulnerabilities in Post-Quantum Cryptography Algorithms, 3rd IEEE International Verification and Security Workshop, pp.7-12, 2018. ,
make sure DSA signing exponentiations really are constant-time, vol.25, pp.1639-1650 ,
A survey of microarchitectural timing attacks and countermeasures on contemporary hardware, J. Cryptographic Engineering, vol.8, issue.1, pp.1-27, 2018. ,
, Prefetch Side-Channel Attacks: Bypassing SMAP and Kernel ASLR, vol.25, pp.368-379
Flush+Flush: A Fast and Stealthy Cache Attack, Detection of Intrusions and Malware, and Vulnerability Assessment -13th International Conference, DIMVA 2016, vol.9721, pp.279-299, 2016. ,
, Description: Secure Transport failed to validate the authenticity of the connection. This issue was addressed by restoring missing validation steps. Impact: An attacker with a privileged network position may capture or modify data in sessions protected by SSL/TLS, 2014.
, Fault Analysis in Cryptography. Information Security and Cryptography, 2012.
Timing Attacks on, Advances in Cryptology -CRYPTO '96, 16th Annual International Cryptology Conference, vol.1109, pp.104-113, 1996. ,
Differential power analysis, Lecture Notes in Computer Science, vol.1666, pp.388-397, 1999. ,
What could possibly go wrong with <insert x86 instruction here>?, 2016. ,
Hello from the Other Side: SSH over Robust Cache Covert Channels in the Cloud, 24th Annual Network and Distributed System Security Symposium, 2017. ,
Cache-Timing Attacks still threaten IoT devices, Codes, Cryptology and Information Security -Third International Conference, vol.2, 2019.,
URL : https://hal.archives-ouvertes.fr/hal-02319488
Efficient Cache Attacks on AES, and Countermeasures, J. Cryptology, vol.23, issue.1, pp.37-71, 2010. ,
Sliding Windows Succumbs to Big Mac Attack, Lecture Notes in Computer Science, vol.2162, pp.286-299, 2001. ,
, Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016.