{"title":"Timing attacks on RSA: revealing your secrets through the fourth dimension","authors":"W. H. Wong","doi":"10.1145/1144396.1144401","DOIUrl":null,"url":null,"abstract":"Do you think your computer system is secure because you use strong cryptography? Do you think your system is impenetrable because you use a long secret value in the cryptographic computation that attackers cannot guess by brute force? If so, you should know that attackers may be able to exploit your system in an unexpected manner by surreptitiously invading it rather than by directly attempting to break the cryptography.","PeriodicalId":429016,"journal":{"name":"ACM Crossroads","volume":"29 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2005-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"17","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"ACM Crossroads","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/1144396.1144401","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 17
Abstract
Do you think your computer system is secure because you use strong cryptography? Do you think your system is impenetrable because you use a long secret value in the cryptographic computation that attackers cannot guess by brute force? If so, you should know that attackers may be able to exploit your system in an unexpected manner by surreptitiously invading it rather than by directly attempting to break the cryptography.