17
views
0
recommends
+1 Recommend
0 collections
    0
    shares
      • Record: found
      • Abstract: not found
      • Article: not found

      MemJam: A False Dependency Attack Against Constant-Time Crypto Implementations

      Read this article at

      ScienceOpenPublisher
      Bookmark
          There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.

          Related collections

          Most cited references40

          • Record: found
          • Abstract: not found
          • Conference Proceedings: not found

          Controlled-Channel Attacks: Deterministic Side Channels for Untrusted Operating Systems

            Bookmark
            • Record: found
            • Abstract: not found
            • Article: not found

            Remote timing attacks are practical

              Bookmark
              • Record: found
              • Abstract: not found
              • Conference Proceedings: not found

              Cross-VM side channels and their use to extract private keys

                Bookmark

                Author and article information

                Journal
                International Journal of Parallel Programming
                Int J Parallel Prog
                Springer Science and Business Media LLC
                0885-7458
                1573-7640
                August 2019
                November 9 2018
                August 2019
                : 47
                : 4
                : 538-570
                Article
                10.1007/s10766-018-0611-9
                81e325ba-6364-4133-9332-00dafac1190d
                © 2019

                http://www.springer.com/tdm

                History

                Comments

                Comment on this article