Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
timing attacks
biblio
On Aggregation of Information in Timing Attacks
Submitted by grigby1 on Mon, 10/05/2020 - 1:48pm
Information Flow
timing attacks
timing
system vulnerability
Side-Channels
real-world attacks
real-world adversaries
pubcrawl
program diagnostics
program compositionality
multiple timing measurements
Mathematical model
information-flow analysis
Compositionality
information aggregation reasoning
high-profile timing attacks
divide-and-conquer method
divide and conquer methods
cryptosystems
Cryptography
Computational modeling
Analytical models
Aggregates
Computing Theory and Compositionality
Human Factors
Human behavior
biblio
Timing Analysis for Diffie Hellman Key Exchange In U-BOOT Using Raspberry Pi
Submitted by grigby1 on Mon, 12/30/2019 - 2:18pm
telecommunication security
public key cryptography
Raspberry Pi
Raspberry-pi
Resiliency
Scalability
Secret key
security schemes
side channel attack
system-on-chip
pubcrawl
timing
Timing attack
timing attacks
timing patterns
tools
U-Boot bare metal
unsecure communication channel
word length 2048.0 bit
word length 64.0 bit
embedded systems
cryptographic
cryptographic era
Cryptographic Protocols
Cryptography
DHKE protocol
diffie hellman key exchange
Diffie Hellman Key Exchange protocol
Discrete Log Hard Problem
embedded device
brute force attacks
exponentiation
firmware
Force
GMP bignum library
Metals
modular exponentiation
networked embedded systems security
Protocols
biblio
Betweenness Centrality and Cache Privacy in Information-Centric Networks
Submitted by grigby1 on Mon, 11/04/2019 - 12:40pm
anonymity
anonymity set
betweenness centrality
cache privacy
caching
ICN
information-centric networking
Metrics
Named-Data Networking
NDN
pubcrawl
resilience
Resiliency
Router Systems Security
timing attacks
biblio
On Secure Implementations of Quantum-Resistant Supersingular Isogeny Diffie-Hellman
Submitted by grigby1 on Wed, 05/30/2018 - 4:06pm
Scalability
pubcrawl
public key cryptography
quantum computing
quantum-resistant SIDH protocol
quantum-resistant supersingular isogeny Diffie-Hellman protocol
random number generation
resilience
Resiliency
Protocols
secret kernel point
secret scalars
side-channel analysis
signature based defense
simple power analysis
timing
timing attacks
true random number generator
Elliptic curves
Cryptographic Protocols
Cryptography
Differential Power Analysis
double-point multiplication
ECDH key exchange
Electronic mail
elliptic curve Diffie-Hellman key exchange
elliptic curve isomorphism
ALU
elliptic curve theory
Fault Attacks
Fermat little theorem inversion
Hardware
hardware architectures
isogeny-based cryptography
oracle attacks
Post-quantum cryptography
biblio
Decomposition Instead of Self-composition for Proving the Absence of Timing Channels
Submitted by K_Hooper on Wed, 05/02/2018 - 10:45am
Computing Theory
resilience
Blazer
composability
decomposition
Metrics
pubcrawl
Subtrails
taint analysis
timing attacks
verification
biblio
Evolving side-channel resistant reconfigurable hardware for elliptic curve cryptography
Submitted by grigby1 on Tue, 12/12/2017 - 1:25pm
Metrics
Xilinx Kintex-7 FPGA
timing attacks
side-channel resistant reconfigurable hardware
side-channel attacks
security-level
Scalability
Resiliency
reconfigurable hardware design
public-key cryptosystems
public key cryptography
pubcrawl
propagation delay minimization
power analysis attacks
noninvasive side channel attacks
minimisation
Algorithm design and analysis
Hardware
genetic algorithms
genetic algorithm
fitness function
field programmable gate arrays
Evolutionary algorithm
Elliptic curves
elliptic curve discrete logarithm
Elliptic curve cryptography
elliptic curve cryptographic hardware
elliptic curve cryptographic combinational logic circuits
Cryptographic Protocols
cryptographic applications
combinational circuits
circuit size minimization
biblio
"Make Sure DSA Signing Exponentiations Really Are Constant-Time"
Submitted by grigby1 on Wed, 05/17/2017 - 1:52pm
Applied cryptography
cache-timing attacks
CVE-2016-2178
digital signatures
DSA
exponentiation
Human behavior
Kerberos
Metrics
OpenSSL
pubcrawl
Resiliency
side-channel analysis
timing attacks
biblio
Prefetch Side-Channel Attacks: Bypassing SMAP and Kernel ASLR
Submitted by grigby1 on Mon, 03/20/2017 - 10:45am
ASLR
channel coding
command injection attacks
composability
injection
injection attacks
kernel vulnerabilities
Metrics
pubcrawl
Resiliency
timing attacks
windows operating systems security