Location of Repository

Instructor: Yael Tauman Kalai Bounded Memory Leakage

By Scribe Raluca and Ada Popa

Abstract

When designing cryptographic schemes, we usually rely on the assumption that every bit of the secret key is secret. However, in practice, loss of secrecy can happen due to side-channel attacks. For example, an adversary can get secret information using timing attacks, acoustic attacks, or even by getting access to parts of the memory used by a cryptographic protocol such as in the “cold-boot attack ” demonstrated by Halderman et al. [HSH + 09]. With some bits of the secret key revealed, security guarantees may no longer hold

Year: 2011
OAI identifier: oai:CiteSeerX.psu:10.1.1.416.8876
Provided by: CiteSeerX
Download PDF:
Sorry, we are unable to provide the full text but you may find it at the following location(s):
  • http://citeseerx.ist.psu.edu/v... (external link)
  • http://www.cs.bu.edu/~reyzin/t... (external link)
  • Suggested articles


    To submit an update or takedown request for this paper, please submit an Update/Correction/Removal Request.