Back to Results
First PageMeta Content
Modular arithmetic / Public-key cryptography / Computer arithmetic / Electronic commerce / RSA / Blinding / Montgomery reduction / Modular multiplicative inverse / Euclidean algorithm / Cryptography / Mathematics / Abstract algebra


New Branch Prediction Vulnerabilities in OpenSSL and Necessary Software Countermeasures Onur Acıic¸mez1 , Shay Gueron2,3 , and Jean-Pierre Seifert4 1
Add to Reading List

Document Date: 2007-02-06 20:58:58


Open Document

File Size: 250,57 KB

Share Result on Facebook

City

Haifa / San Jose / /

Company

Jean-Pierre Seifert4 1 Samsung Information Systems / IDC / I SRAEL 3 Intel Corporation / the AES / /

/

Facility

University of Innsbruck / BIGNUM library / openSSL CRT-RSA library / University of Haifa / /

IndustryTerm

security applications / software writers / software mitigation techniques / software mitigation methodology / careful software analysis / software implementation / cryptographic applications / n-bit long product / purpose processors / software mitigation methods / software countermeasures / concrete reconstruction algorithm / exponentiation algorithms / prediction algorithms / security systems / cryptographic algorithm / cryptographic software applications / Good prediction mechanisms/algorithms / exponentiation algorithm / /

NaturalFeature

Introduction Side channel / /

OperatingSystem

Microsoft Windows / /

Organization

USA Department of Mathematics / BIGNUM Division / University of Haifa / University of Innsbruck / Institute for Computer Science / /

Person

Mod Exp / /

Position

spy / SBPA spy / Mp / /

Technology

encryption / CRT algorithm / corresponding algorithm / cryptography / BBEA algorithm / BEEA algorithm / public key / Sliding Windows / concrete reconstruction algorithm / using prediction algorithms / Binary Extended Euclidean algorithm / purpose processors / exponentiation algorithms / private key / same processor / secret key / operating system / exponentiation algorithm / digital signature / Good prediction mechanisms/algorithms / Fixed Window Exponentiation Algorithm / operating systems / S&M algorithm / SWE algorithm / cryptographic algorithm / /

SocialTag