In computer networking, OpenSSL is a software library to be used in applications that need to secure communications against eavesdropping or need toâ€¦Â (More)

Semantic Scholar uses AI to extract papers important to this topic.

2016

2016

- Yuval Yarom, Daniel Genkin, Nadia Heninger
- Journal of Cryptographic Engineering
- 2016

The scatterâ€“gather technique is a commonly implemented approach to prevent cache-based timing attacks. In this paper, we showâ€¦Â (More)

Is this relevant?

2015

2015

- Lennart Beringer, Adam Petcher, Katherine Q. Ye, Andrew W. Appel
- USENIX Security Symposium
- 2015

We have proved, with machine-checked proofs in Coq, that an OpenSSL implementation of HMAC with SHA256 correctly implements itsâ€¦Â (More)

Is this relevant?

2014

2014

- Yuval Yarom, Naomi Benger
- IACR Cryptology ePrint Archive
- 2014

We illustrate a vulnerability introduced to elliptic curve cryptographic protocols when implemented using a function of theâ€¦Â (More)

Is this relevant?

2014

2014

- Poul-Henning Kamp
- ACM Queue
- 2014

OpenSSL must die, for it will never get any better.Â

Is this relevant?

2011

2011

- Emilia KÃ¤sper
- Financial Cryptography Workshops
- 2011

We present a 64-bit optimized implementation of the NIST and SECG-standardized elliptic curve P-224. Our implementation is fullyâ€¦Â (More)

Is this relevant?

2008

2008

- Onur AciiÃ§mez, Werner Schindler
- CT-RSA
- 2008

MicroArchitectural Analysis (MA) techniques, more specifically Simple Branch Prediction Analysis (SBPA) and Instruction Cacheâ€¦Â (More)

Is this relevant?

2007

2007

- Onur AciiÃ§mez, Shay Gueron, Jean-Pierre Seifert
- IMA Int. Conf.
- 2007

Software based side-channel attacks allow an unprivileged spy process to extract secret information from a victim (cryptosystemâ€¦Â (More)

Is this relevant?

2007

2007

- Marc Joye, Michael Tunstall
- SECRYPT
- 2007

This paper presents a version of the 2k-ary modular exponentiation algorithm that is secure against current methods of sideâ€¦Â (More)

Is this relevant?

Highly Cited

2003

Highly Cited

2003

- David Brumley, Dan Boneh
- USENIX Security Symposium
- 2003

Timing attacks are usually used to attack weak computing devices such as smartcards. We show that timing attacks apply to generalâ€¦Â (More)

Is this relevant?

2002

2002

network security with openssl cryptography for secure communications. Book lovers, when you need a new book to read, find theâ€¦Â (More)

Is this relevant?