Timing Attacks on Cryptosystems: 18 Years Later
dc.contributor.advisor | Washington, Lawrence | en_US |
dc.contributor.author | Glowacki, Clarice | en_US |
dc.contributor.department | Mathematics | en_US |
dc.contributor.publisher | Digital Repository at the University of Maryland | en_US |
dc.contributor.publisher | University of Maryland (College Park, Md.) | en_US |
dc.date.accessioned | 2014-10-11T06:00:38Z | |
dc.date.available | 2014-10-11T06:00:38Z | |
dc.date.issued | 2014 | en_US |
dc.description.abstract | This work applies methodology for cryptosystem timing attacks to elliptic curve encryption using parametric coordinates. Additionally, we attempt to replicate the results found by Paul Kocher regarding timing attacks on RSA cryptosystems. Multiple implementations including Sage, MuPAD, Mathematica, and Python are attempted. Viability of timing attacks with modern computing power is assessed. | en_US |
dc.identifier | https://doi.org/10.13016/M2PG6Z | |
dc.identifier.uri | http://hdl.handle.net/1903/15836 | |
dc.language.iso | en | en_US |
dc.subject.pqcontrolled | Mathematics | en_US |
dc.title | Timing Attacks on Cryptosystems: 18 Years Later | en_US |
dc.type | Thesis | en_US |
Files
Original bundle
1 - 1 of 1
Loading...
- Name:
- Glowacki_umd_0117N_15616.pdf
- Size:
- 605.23 KB
- Format:
- Adobe Portable Document Format