Cross-VM side channels and their use to extract private keys
Top Cited Papers
- 16 October 2012
- proceedings article
- Published by Association for Computing Machinery (ACM)
- p. 305-316
- https://doi.org/10.1145/2382196.2382230
Abstract
No abstract availableKeywords
This publication has 26 references indexed in Scilit:
- LIBSVMACM Transactions on Intelligent Systems and Technology, 2011
- Cache Based Remote Timing Attack on the AESPublished by Springer Nature ,2006
- Virtual machines for enterprise desktop securityInformation Security Technical Report, 2006
- Remote timing attacks are practicalPublished by Elsevier ,2005
- Differential Power AnalysisPublished by Springer Nature ,1999
- Speeding the Pollard and elliptic curve methods of factorizationMathematics of Computation, 1987
- A public key cryptosystem and a signature scheme based on discrete logarithmsIEEE Transactions on Information Theory, 1985
- A method for obtaining digital signatures and public-key cryptosystemsCommunications of the ACM, 1978
- A general method applicable to the search for similarities in the amino acid sequence of two proteinsJournal of Molecular Biology, 1970
- A Maximization Technique Occurring in the Statistical Analysis of Probabilistic Functions of Markov ChainsThe Annals of Mathematical Statistics, 1970