Caching techniques can be used to reduce bandwidth consumption and data access delay in wireless ad hoc networks. When cache is used, the issue of cache consistency must be addressed, and maintaining strong cache consistency is desired in some strategic scenarios (e.g., battlefields). In these situa
โฆ LIBER โฆ
Defending against cache-based side-channel attacks
โ Scribed by D Page
- Book ID
- 104404660
- Publisher
- Elsevier Science
- Year
- 2003
- Tongue
- English
- Weight
- 213 KB
- Volume
- 8
- Category
- Article
- ISSN
- 1363-4127
No coin nor oath required. For personal study only.
๐ SIMILAR VOLUMES
Defending against cache consistency atta
โ
Wensheng Zhang; Guohong Cao
๐
Article
๐
2008
๐
Elsevier Science
๐
English
โ 324 KB
An efficient method against side-channel
โ
Liu Shuanggen; Hu Yupu; Xu Wensheng
๐
Article
๐
2006
๐
Wuhan University
๐
English
โ 351 KB
Resistance against side channel attack f
โ
Li Zhu; Da-wu Gu; Chao Wang
๐
Article
๐
2008
๐
Chinese Electronic Periodical Services
๐
English
โ 171 KB
Defending against flooding-based distrib
โ
Chang, R.K.C.
๐
Article
๐
2002
๐
IEEE
๐
English
โ 178 KB
Defending Against Fingerprint-Copy Attac
โ
Goljan, M.; Fridrich, J.; Mo Chen
๐
Article
๐
2011
๐
IEEE
๐
English
โ 807 KB
DES with any reduced masked rounds is no
โ
Jongsung Kim; Yuseop Lee; Sangjin Lee
๐
Article
๐
2010
๐
Elsevier Science
๐
English
โ 685 KB
The literature offers several efficient masking methods for providing resistance to sidechannel attacks against iterative block ciphers, such as Data Encryption Standard (DES) and Advanced Encryption Standard (AES). One of the proposed methods is to apply independent masks to each of the first and l