Timing attack
Top View
- Faster and Timing-Attack Resistant AES-GCM
- Cache Based Remote Timing Attack on the AES
- Update on Security Analysis and Implementations of KNOT
- Timing Attacks on Error Correcting Codes in Post-Quantum Schemes
- Key-Schedule Cryptanalysis of IDEA, G-DES, GOST, SAFER, and Triple-DES
- Cache Timing Attacks on Camellia Block Cipher∗
- Manger's Attack Revisited
- Message Based Random Variable Length Key Encryption Algorithm
- Implementation Attacks with Countermeasures on the FALCON Signature Scheme
- Strength of Two Data Encryption Standard
- The OCB Authenticated-Encryption Algorithm
- Timing Attacks and Countermeasures
- Remote Timing Attacks Are Still Practical⋆
- AEGIS: a Fast Authenticated Encryption Algorithm (V1)
- Timing Attack Against Protected RSA-CRT Implementation Used in Polarssl
- Improved Timing Attacks Against the Secret Permutation in the Mceliece PKC Dominic Bucerzan, Pierre-Louis Cayrel, Vlad Dragoi, Tania Richmond
- Boring Crypto Daniel J. Bernstein University of Illinois at Chicago & Technische Universiteit Eindhoven
- Cryptography and Encryption Basics