Keyphrases
Side Channel
82%
Vulnerability
61%
Microarchitecture
61%
Side-channel Analysis
52%
Private Key
44%
Cache Timing Attack
35%
RSA Key Generation
35%
Mozilla
35%
Simultaneous multithreading
35%
OpenSSL
35%
Constant Time
35%
Fault Attack
35%
Binary GCD
35%
Tampering Attack
35%
Inversion Algorithm
35%
Online Template Attacks
35%
Cryptosystem
35%
Elliptic Curve Digital Signature Algorithm (ECDSA)
26%
Key Recovery Attack
26%
Information Extraction
17%
GCD Function
17%
High-resolution
17%
Concrete Security
17%
Word Size
17%
Time Code
17%
Trace Data
17%
Lattice Problems
17%
Trace Cache
17%
Cache Timing
17%
Mishandling
17%
Critical Security
17%
Desynchronization
17%
Deployed Software
17%
Electromagnetic Emanation
17%
Runtime Decision
17%
Critical Software
17%
Multi-precision Arithmetic
17%
Side-channel Leakage
17%
Traditional Wall
17%
New Codes
17%
Parsing
17%
Bulk Processing
17%
Success Rate
17%
Path Traversal
17%
Limited Information
17%
Hyper-threading
17%
Execution Engine
17%
Software Defect
17%
Software Library
17%
That-trace
17%
Computer Science
side-channel
100%
Side Channel
94%
Microarchitecture
76%
Side Channel Attack
70%
Channel Analysis
52%
Cryptography
47%
Key Generation
35%
Security Vulnerability
23%
Multithreading
23%
Software Library
17%
Information Extraction
17%
Precision Arithmetic
17%
Granularity
17%
Software Defect
17%
Problem Instance
17%
Computation Step
17%
Security Requirements
17%
Critical Software
17%
Security Analysis
17%
Security Evaluation
11%
Secret Information
11%
Elliptic curve scalar multiplication
11%
Default Implementation
11%
Power Consumption
11%
Attack Surface
11%
Evaluation Metric
11%
Execution Engine
11%
Memory Subsystem
11%
Application Scenario
11%
Target Application
11%
Security Framework
11%
Analysis Target
11%
Attackers
11%
Fault Injection
8%