Cryptographic side-channels from low-power cache memory

13Citations
Citations of this article
26Readers
Mendeley users who have this article in their library.
Get full text

Abstract

To deliver real world cryptographic applications, we are increasingly reliant on security guarantees from both the underlying mathematics and physical implementation. The micro-processors that execute such applications are often designed with a focus on performance, area or power consumption. This strategy neglects physical security, a fact that has recently been exploited by a new breed of micro-architectural side-channel attacks. We introduce a new attack within this class which targets the use of low power cache memories. Although such caches offer an attractive compromise between performance and power consumption within mobile computing devices, we show that they permit attack where a more considered design strategy would not. © Springer-Verlag Berlin Heidelberg 2007.

Cite

CITATION STYLE

APA

Grabher, P., Großschädl, J., & Page, D. (2007). Cryptographic side-channels from low-power cache memory. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 4887 LNCS, pp. 170–184). Springer Verlag. https://doi.org/10.1007/978-3-540-77272-9_11

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free