Publication: Measurement program: Investigation on cache-timing attack
| dc.citedby | 0 | |
| dc.contributor.author | Khalid Y. | en_US |
| dc.contributor.author | Dippel U. | en_US |
| dc.contributor.author | Yussof S. | en_US |
| dc.contributor.authorid | 56355084400 | en_US |
| dc.contributor.authorid | 25824819200 | en_US |
| dc.contributor.authorid | 16023225600 | en_US |
| dc.date.accessioned | 2023-12-28T07:30:45Z | |
| dc.date.available | 2023-12-28T07:30:45Z | |
| dc.date.issued | 2009 | |
| dc.description.abstract | Recent cryptanalysis is able to reduce the strength of a cipher, without breaking the cipher as such, like in traditional cryptographic attacks. This is achieved by obtaining, and subsequently utilizing, some hardware information to recover the secret key or the message, or at least part thereof. This kind of attack is called side channel attack, and has changed the conceptual idea of cryptography from a black box system with a single input and a single output to a complex system, that produces plural, unexpected outputs, the so-called side-channel information in addition to the intended cryptographic output. This additional output can be used to break an implementation of a cipher. Cache-timing is one type of side channel attacks that is mostly done in general purpose computers. In this paper we are investigating cache-timing attacks, and show some experimental results that motivated us to develop a portable measurement program for such attacks. �2009 IEEE. | en_US |
| dc.description.nature | Final | en_US |
| dc.identifier.ArtNo | 5431494 | |
| dc.identifier.doi | 10.1109/MICC.2009.5431494 | |
| dc.identifier.epage | 192 | |
| dc.identifier.scopus | 2-s2.0-77952215942 | |
| dc.identifier.spage | 187 | |
| dc.identifier.uri | https://www.scopus.com/inward/record.uri?eid=2-s2.0-77952215942&doi=10.1109%2fMICC.2009.5431494&partnerID=40&md5=01fabdeecb86a51025557d0da52d3fe1 | |
| dc.identifier.uri | https://irepository.uniten.edu.my/handle/123456789/29679 | |
| dc.pagecount | 5 | |
| dc.source | Scopus | |
| dc.sourcetitle | Proceedings - MICC 2009: 2009 IEEE 9th Malaysia International Conference on Communications with a Special Workshop on Digital TV Contents | |
| dc.subject | AES | |
| dc.subject | Cache-timing attack | |
| dc.subject | Measurement program | |
| dc.subject | Side channel attacks | |
| dc.subject | Cryptography | |
| dc.subject | Digital television | |
| dc.subject | General purpose computers | |
| dc.subject | Security of data | |
| dc.subject | Black box system | |
| dc.subject | Complex systems | |
| dc.subject | Measurement programs | |
| dc.subject | Secret key | |
| dc.subject | Side channel attack | |
| dc.subject | Side-channel information | |
| dc.subject | Single input | |
| dc.subject | Single output | |
| dc.subject | Timing attacks | |
| dc.subject | Time measurement | |
| dc.title | Measurement program: Investigation on cache-timing attack | en_US |
| dc.type | Conference paper | en_US |
| dspace.entity.type | Publication |