Timing attacks on RSA: revealing your secrets through the fourth dimension.
Wing H. WongPublished in: ACM Crossroads (2005)
Keyphrases
- cryptographic algorithms
- countermeasures
- security mechanisms
- public key
- chosen plaintext
- security protocols
- terrorist attacks
- traffic analysis
- watermarking scheme
- signature scheme
- security risks
- information systems
- elliptic curve cryptography
- malicious attacks
- elliptic curve
- data sets
- computer security
- cryptographic protocols
- signal processing
- key exchange
- recommender systems
- attack detection
- lightweight
- public key cryptosystems
- neural network