Search or ask a question
Pricing
Login
Sign up
Home
Notebook
BETA
Profile
Citation booster
Literature Review
Copilot
Citation generator
Paraphraser
AI Detector
Chrome Extension
Talk with us
Use on ChatGPT
All figures (15)
Table 1: List of widely used AES implementations targeted in TDCAs
Figure 4: πt for different AES implementations
Figure 3: ρt for different AES implementations
Table 6: The number of the new variables and ANF equations that introduced
Figure 6: Data and time complexity
Figure 9: Leakages in TDCA on AES-128
Figure 10: Leakages in TDCA on AES-192
Figure 2: nt for different AES implementations
Figure 11: Leakages in TDCA on AES-256
Figure 5: Cache hit and miss sequences for Types A, B and C
Figure 1: S-Box (Table)Look-up structure targeted in TDCA
Table 4: Comparisons of error-tolerant MDATDCAs on AES with previous work
Figure 8: Number of required cache traces for a full key recovery of error-tolerant MDATDCA on AES
Table 3: Comparisons of error-free MDATDCAs on AES with previous work
Table 5: Comparisons of partially preloaded MDATDCA on AES with previous work
Journal Article
•
DOI
•
A comprehensive study of multiple deductions-based algebraic trace driven cache attacks on AES
[...]
Xinjie Zhao
,
Shize Guo
,
Fan Zhang
1
,
Tao Wang
,
Zhijie Shi
1
,
Zhe Liu
2
,
Jean-François Gallais
2
- Show less
+3 more
•
Institutions (2)
University of Connecticut
1
,
University of Luxembourg
2
01 Nov 2013
-
Computers & Security