Are AES x86 cache timing attacks still feasible?
Keaton MowerySriram KeelveedhiHovav ShachamPublished in: CCSW (2012)
Keyphrases
- advanced encryption standard
- cryptographic algorithms
- block cipher
- countermeasures
- security protocols
- encryption algorithms
- prefetching
- traffic analysis
- query processing
- s box
- watermarking technique
- biometric data
- malicious attacks
- back end
- feasible solution
- secret key
- database systems
- main memory
- data access
- hit rate
- security risks
- malicious users
- lightweight
- digital images