Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 217,273,814 papers from all fields of science
Search
Sign In
Create Free Account
Side-channel attack
Known as:
Side channel
, Side channel attack
, Side-channel attacks
Expand
In cryptography, a side-channel attack is any attack based on information gained from the physical implementation of a cryptosystem, rather than…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
32 relations
Acoustic cryptanalysis
Algorithm
Argon2
Asynchronous circuit
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2015
Highly Cited
2015
Last-Level Cache Side-Channel Attacks are Practical
Fangfei Liu
,
Y. Yarom
,
Qian Ge
,
Gernot Heiser
,
R. Lee
IEEE Symposium on Security and Privacy
2015
Corpus ID: 2741260
We present an effective implementation of the Prime+Probe side-channel attack against the last-level cache. We measure the…
Expand
Highly Cited
2015
Highly Cited
2015
Controlled-Channel Attacks: Deterministic Side Channels for Untrusted Operating Systems
Yuanzhong Xu
,
Weidong Cui
,
Marcus Peinado
IEEE Symposium on Security and Privacy
2015
Corpus ID: 6344906
The presence of large numbers of security vulnerabilities in popular feature-rich commodity operating systems has inspired a long…
Expand
Highly Cited
2014
Highly Cited
2014
FLUSH+RELOAD: A High Resolution, Low Noise, L3 Cache Side-Channel Attack
Y. Yarom
,
K. Falkner
USENIX Security Symposium
2014
Corpus ID: 5171267
Sharing memory pages between non-trusting processes is a common method of reducing the memory footprint of multi-tenanted systems…
Expand
Highly Cited
2012
Highly Cited
2012
Cross-VM side channels and their use to extract private keys
Yinqian Zhang
,
A. Juels
,
M. Reiter
,
T. Ristenpart
Conference on Computer and Communications…
2012
Corpus ID: 3387110
This paper details the construction of an access-driven side-channel attack by which a malicious virtual machine (VM) extracts…
Expand
Highly Cited
2009
Highly Cited
2009
A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks (extended version)
François-Xavier Standaert
,
T. Malkin
,
M. Yung
IACR Cryptology ePrint Archive
2009
Corpus ID: 6531936
The fair evaluation and comparison of side-channel attacks and countermeasures has been a long standing open question, limiting…
Expand
Highly Cited
2007
Highly Cited
2007
New cache designs for thwarting software cache-based side channel attacks
Zhenghong Wang
,
R. Lee
International Symposium on Computer Architecture
2007
Corpus ID: 2882026
Software cache-based side channel attacks are a serious new class of threats for computers. Unlike physical side channel attacks…
Expand
Highly Cited
2007
Highly Cited
2007
An information-theoretic model for adaptive side-channel attacks
Boris Köpf
,
D. Basin
Conference on Computer and Communications…
2007
Corpus ID: 1957641
We present a model of adaptive side-channel attacks which we combine with information-theoretic metrics to quantify the…
Expand
Highly Cited
2006
Highly Cited
2006
Threshold Implementations Against Side-Channel Attacks and Glitches
S. Nikova
,
Christian Rechberger
,
V. Rijmen
International Conference on Information…
2006
Corpus ID: 21332994
Implementations of cryptographic algorithms are vulnerable to side-channel attacks. Masking techniques are employed to counter…
Expand
Highly Cited
2005
Highly Cited
2005
A Stochastic Model for Differential Side Channel Cryptanalysis
W. Schindler
,
Kerstin Lemke-Rust
,
C. Paar
Workshop on Cryptographic Hardware and Embedded…
2005
Corpus ID: 2369322
This contribution presents a new approach to optimize the efficiency of differential side channel cryptanalysis against block…
Expand
Highly Cited
2002
Highly Cited
2002
Weierstraß Elliptic Curves and Side-Channel Attacks
Éric Brier
,
M. Joye
International Conference on Theory and Practice…
2002
Corpus ID: 42187532
Recent attacks show how an unskilled implementation of elliptic curve cryptosystems may reveal the involved secrets from a single…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE