Statements (18)
Predicate | Object |
---|---|
gptkbp:instanceOf |
side-channel attack
|
gptkbp:alsoKnownAs |
timing attack
|
gptkbp:category |
information security
computer security exploit |
gptkbp:countermeasures |
constant-time algorithms
randomized delays |
gptkbp:exploits |
variations in computation time
|
gptkbp:firstDescribed |
gptkb:Paul_Kocher
1996 |
https://www.w3.org/2000/01/rdf-schema#label |
TIME attack
|
gptkbp:relatedTo |
cache timing attack
power analysis attack |
gptkbp:supportedBy |
secret information
|
gptkbp:target |
cryptographic algorithms
|
gptkbp:usedFor |
encryption algorithms
password validation |
gptkbp:bfsParent |
gptkb:CRIME_attack
|
gptkbp:bfsLayer |
6
|