Trace-driven cache attacks on AES (short paper)
Citations
500 citations
Cites methods from "Trace-driven cache attacks on AES (..."
...[11] and Acıiçmez and Koç [3][4], using a power side channel of a MIPS microprocessor in an idealized simulation....
[...]
387 citations
Cites background from "Trace-driven cache attacks on AES (..."
...2, which is known to be insecure and susceptible to cache attacks [2, 4, 5, 16, 21, 22, 39, 53]....
[...]
...When attacking an insecure implementation of a cryptographic algorithm, an attacker can often gain significantly more information if it is possible to perform measurements during the encryption [2, 13], i....
[...]
362 citations
348 citations
295 citations
Cites background from "Trace-driven cache attacks on AES (..."
...In trace-driven attacks, the attacker learns the outcome of each of the victim’s memory accesses in terms of cache hits and misses [2,56,126]....
[...]
References
3,989 citations
2,140 citations
"Trace-driven cache attacks on AES (..." refers methods in this paper
...The implementation we analyze is described in [9] and it is suitable for 32-bit architectures....
[...]
1,050 citations
474 citations
"Trace-driven cache attacks on AES (..." refers background in this paper
...[7,1]), these two phases may overlap and may be performed simultaneously....
[...]
348 citations
"Trace-driven cache attacks on AES (..." refers background in this paper
...The attacks presented in [3,12,6] are also based on internal collisions....
[...]