










 | |
Documenti
-
D.Brumley
e D. Boneh, "Remote timing attacks are practical", http://crypto.stanford.edu/~dabo/papers/ssl-timing.pdf
-
J.F. Dhem, F. Koeune, P.-A. Leroux, P. Mestré, J.-J. Quisquater, e J.-L.
Willems, "A practical implementation of the timing attack", www.cs.jhu.edu/~fabian/courses/CS600.624/Timing-full.pdf
-
P.Kocher, "Timing attacks on implementations of Diffie-Hellman, RSA,
DSS, and other systems", www.cryptography.com/resources/whitepapers/TimingAttacks.pdf
-
S.Levy, "The
open secret", scritto il 7 Aprile 1999, http://www.wired.com/wired/archive/7.04/crypto.html
-
Progetto OpenSSL : http://www.openssl.org
-
R. L. Rivest, A. Shamir, L. Adleman, "A method for obtaining digital signatures and
public-key cryptosystems". (1978).
-
RSA Laboratories. http://www.rsasecurity.com/rsalabs/node.asp?id=2098
-
B.Schneier, "Risks of relying on cryptography", Communications of the ACM , vol. 42,
numero 10, Ottobre 1999, http://www.schneier.com/essay-021.html
-
US-CERT Vulnerability
Note VU#997481, http://www.kb.cert.org/vuls/id/997481
-
G.Blom. Probability and Statistics: Theory and Applications.
Springer-Verlag, 1989.
-
J.F. Dhem,F. Koeune,P .A. Leroux,P . Mestr´e,J.J. Quisquater,and J.L.Willems.
A Practical Implementation of the Timing Attack. Technical
Report CG-1998/1,Univ ersit´e catholique de Louvain,1998. http://www.dice.ucl.ac.be/crypto.
-
D. Chaum. Blind Signatures for Untraceable
Payments. In R. Rivest and A. Sherman and D. Chaum,editor, Advances in
Cryptology - Proceedings of CRYPTO 82,volume 0,pagine 199–203. Plenum
Press,1983.
-
A. Hevia and M. Kiwi. Strength of Two Data Encryption Standard
Implementation Under Timing Attacks. ACM Transactions on Information and
System Security,2(4):416–437,Novembre 1999.
-
W. Schindler. A Timing Attack against RSA with the Chinese Remainder
Theorem. In C¸ . K. Ko¸c and C. Paar,editors, Cryptographic Hardware and
Embedded Systems - CHES 2000,v olume 1965 of LNCS,pagine 109–124.
Springer-Verlag,Agosto 2000.
|