Author:
Groot Bruinderink Leon,Hülsing Andreas,Lange Tanja,Yarom Yuval
Publisher
Springer Berlin Heidelberg
Reference38 articles.
1. Alkim, E., Ducas, L., Pöppelmann, T., Schwabe, P.: Post-quantum key exchange - a new hope. IACR Cryptology ePrint Archive 2015/1092 (2015)
2. Bernstein, D.J.: Cache-timing attacks on AES (2005). Preprint available at
http://cr.yp.to/antiforgery/cachetiming-20050414.pdf
3. Bos, J.W., Costello, C., Naehrig, M., Stebila, D.: Post-quantum key exchange for the TLS protocol from the ring learning with errors problem. In: S&P 2015, pp. 553–570. IEEE Computer Society (2015)
4. Groot Bruinderink, L., Hülsing, A., Lange, T., Yarom, Y.: Flush, Gauss, and reload - a cache attack on the BLISS lattice-based signature scheme. IACR Cryptology ePrint Archive 2016/300 (2016)
5. Lecture Notes in Computer Science;J Buchmann,2014
Cited by
116 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Cips: The Cache Intrusion Prevention System;Lecture Notes in Computer Science;2024
2. Polytopes in the Fiat-Shamir with Aborts Paradigm;Lecture Notes in Computer Science;2024
3. Exploring Flush+Reload Side Channel Attack Vulnerabilities: Detection and Countermeasures;2023 2nd International Conference on Automation, Computing and Renewable Systems (ICACRS);2023-12-11
4. Masking the GLP Lattice-Based Signature Scheme at Any Order;Journal of Cryptology;2023-11-29
5. Side-Channel Vulnerabilities in Discrete Ziggurat Sampler in Post-Quantum Cryptography;2023 3rd International Conference on Emerging Smart Technologies and Applications (eSmarTA);2023-10-10