Login / Signup
Access-Driven Cache Attack on the Stream Cipher DICING Using the Chosen IV.
Yukiyasu Tsunoo
Takeshi Kawabata
Tomoyasu Suzaki
Hiroyasu Kubo
Teruo Saito
Published in:
IEICE Trans. Fundam. Electron. Commun. Comput. Sci. (2010)
Keyphrases
</>
stream cipher
secret key
scheme for wireless sensor networks
smart card
ciphertext
pseudorandom
authentication scheme
embedded processors
access control
data sets
query processing
cost effective
data access
prefetching
public key
memory access
high security
information systems