Side-channel attack

Known as: Side channel, Side channel attack, Side-channel attacks 
In cryptography, a side-channel attack is any attack based on information gained from the physical implementation of a cryptosystem, rather than… (More)
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2015
Highly Cited
2015
We present an effective implementation of the Prime+Probe side-channel attack against the last-level cache. We measure the… (More)
  • figure 1
  • figure 3
  • figure 2
  • table I
  • figure 4
Is this relevant?
Highly Cited
2015
Highly Cited
2015
The presence of large numbers of security vulnerabilities in popular feature-rich commodity operating systems has inspired a long… (More)
  • figure 3
  • figure 4
  • figure 5
  • figure 6
  • figure 7
Is this relevant?
Highly Cited
2013
Highly Cited
2013
Flush+Reload is a cache side-channel attack that monitors access to data in shared pages. In this paper we demonstrate how to use… (More)
Is this relevant?
Highly Cited
2012
Highly Cited
2012
This paper details the construction of an access-driven side-channel attack by which a malicious virtual machine (VM) extracts… (More)
Is this relevant?
Highly Cited
2011
Highly Cited
2011
Differential power analysis is a powerful cryptanalytic technique that exploits information leaking from physical implementations… (More)
  • figure 1
  • figure 2
Is this relevant?
Highly Cited
2009
Highly Cited
2009
In 2002, algebraic attacks using overdefined systems of equations have been proposed as a potentially very powerful cryptanalysis… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2006
Highly Cited
2006
The fair evaluation and comparison of side-channel attacks and countermeasures has been a long standing open question, limiting… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2004
Highly Cited
2004
Scan based test is a double edged sword. On one hand, it is a powerful test technique. On the other hand, it is an equally… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • table 1
Is this relevant?
Highly Cited
2002
Highly Cited
2002
Recent attacks show how an unskilled implementation of elliptic curve cryptosystems may reveal the involved secrets from a single… (More)
  • figure 1
  • figure 2
  • figure 3
Is this relevant?
Highly Cited
2001
Highly Cited
2001
Side-channel attacks are a recent class of attacks that have been revealed to be very powerful in practice. By measuring some… (More)
Is this relevant?