{"title":"违反IEEE发布原则的通知AES缓存定时攻击及补救措施","authors":"K. L. Baishnab, A. Nag, F. Talukdar","doi":"10.1109/ELECTRO.2009.5441132","DOIUrl":null,"url":null,"abstract":"This paper explains the different timing attacks on AES and possible approaches/ precautions which can be taken to avoid or minimize the danger of these attacks. The nature and cause of possibilities of attack on AES are mentioned along with the basic model of the attack which was performed to show the weakness of the cipher even after large claims of its non-existence from Authorities and its creators.","PeriodicalId":149384,"journal":{"name":"2009 International Conference on Emerging Trends in Electronic and Photonic Devices & Systems","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2009-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Notice of Violation of IEEE Publication PrinciplesCache-timing attacks on AES and remedies\",\"authors\":\"K. L. Baishnab, A. Nag, F. Talukdar\",\"doi\":\"10.1109/ELECTRO.2009.5441132\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This paper explains the different timing attacks on AES and possible approaches/ precautions which can be taken to avoid or minimize the danger of these attacks. The nature and cause of possibilities of attack on AES are mentioned along with the basic model of the attack which was performed to show the weakness of the cipher even after large claims of its non-existence from Authorities and its creators.\",\"PeriodicalId\":149384,\"journal\":{\"name\":\"2009 International Conference on Emerging Trends in Electronic and Photonic Devices & Systems\",\"volume\":null,\"pages\":null},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2009-12-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2009 International Conference on Emerging Trends in Electronic and Photonic Devices & Systems\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ELECTRO.2009.5441132\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2009 International Conference on Emerging Trends in Electronic and Photonic Devices & Systems","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ELECTRO.2009.5441132","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Notice of Violation of IEEE Publication PrinciplesCache-timing attacks on AES and remedies
This paper explains the different timing attacks on AES and possible approaches/ precautions which can be taken to avoid or minimize the danger of these attacks. The nature and cause of possibilities of attack on AES are mentioned along with the basic model of the attack which was performed to show the weakness of the cipher even after large claims of its non-existence from Authorities and its creators.