URL: https://eprint.iacr.org/2010/594.pdf
%PDF-1.4
%����
1 0 obj
<< /S /GoTo /D (section.1) >>
endobj
4 0 obj
(Introduction)
endobj
5 0 obj
<< /S /GoTo /D (subsection.1.1) >>
endobj
8 0 obj
(Our Contributions)
endobj
9 0 obj
<< /S /GoTo /D (subsection.1.2) >>
endobj
12 0 obj
(Related Work)
endobj
13 0 obj
<< /S /GoTo /D (subsection.1.3) >>
endobj
16 0 obj
(Organization of this Document)
endobj
17 0 obj
<< /S /GoTo /D (section.2) >>
endobj
20 0 obj
(Preliminaries)
endobj
21 0 obj
<< /S /GoTo /D (subsection.2.1) >>
endobj
24 0 obj
(The CPU Cache and its Side Channels)
endobj
25 0 obj
<< /S /GoTo /D (subsection.2.2) >>
endobj
28 0 obj
(AES \205 The Advanced Encryption Standard)
endobj
29 0 obj
<< /S /GoTo /D (subsection.2.3) >>
endobj
32 0 obj
(How to Implement AES)
endobj
33 0 obj
<< /S /GoTo /D (subsection.2.4) >>
endobj
36 0 obj
(Test Environment)
endobj
37 0 obj
<< /S /GoTo /D (section.3) >>
endobj
40 0 obj
(Breaking AES given Ideal Measurements)
endobj
41 0 obj
<< /S /GoTo /D (subsection.3.1) >>
endobj
44 0 obj
(Using Accesses from Two Consecutive Rounds)
endobj
45 0 obj
<< /S /GoTo /D (subsection.3.2) >>
endobj
48 0 obj
(Using Accesses from Continuous Streams)
endobj
49 0 obj
<< /S /GoTo /D (subsection.3.3) >>
endobj
52 0 obj
(Key Search)
endobj
53 0 obj
<< /S /GoTo /D (section.4) >>
endobj
56 0 obj
(Attacking AES in the Real World)
endobj
57 0 obj
<< /S /GoTo /D (subsection.4.1) >>
endobj
60 0 obj
(CFS \205 The Completely Fair Scheduler)
endobj
61 0 obj
<< /S /GoTo /D (subsection.4.2) >>
endobj
64 0 obj
(A Denial of Service Attack for CFS)
endobj
65 0 obj
<< /S /GoTo /D (subsection.4.3) >>
endobj
68 0 obj
(Testing for Cache Accesses)
endobj
69 0 obj
<< /S /GoTo /D (subsection.4.4) >>
endobj
72 0 obj
(Using Neural Networks to Handle Noise)
endobj
73 0 obj
<< /S /GoTo /D (subsubsection.4.4.1) >>
endobj
76 0 obj
(Introduction to Artificial Neural Networks)
endobj
77 0 obj
<< /S /GoTo /D (subsubsection.4.4.2) >>
endobj
80 0 obj
(Inputs and Outputs of Our ANN)
endobj
81 0 obj
<< /S /GoTo /D (subsubsection.4.4.3) >>
endobj
84 0 obj
(Parameters of the Neural Network)
endobj
85 0 obj
<< /S /GoTo /D (subsubsection.4.4.4) >>
endobj
88 0 obj
(Sources of Noise)
endobj
89 0 obj
<< /S /GoTo /D (section.5) >>
endobj
92 0 obj
(Results and Discussion)
endobj
93 0 obj
<< /S /GoTo /D (subsection.5.1) >>
endobj
96 0 obj
(Results)
endobj
97 0 obj
<< /S /GoTo /D (subsection.5.2) >>
endobj
100 0 obj
(Accelerating the Key Search)
endobj
101 0 obj
<< /S /GoTo /D (subsection.5.3) >>
endobj
104 0 obj
(Extensions to AES-192 and AES-256)
endobj
105 0 obj
<< /S /GoTo /D (subsection.5.4) >>
endobj
108 0 obj
(Decryption without Ciphertext)
endobj
109 0 obj
<< /S /GoTo /D (section.6) >>
endobj
112 0 obj
(Countermeasures)
endobj
113 0 obj
<< /S /GoTo /D (subsection.6.1) >>
endobj
116 0 obj
(Academical Generic Mitigation Strategies)
endobj
117 0 obj
<< /S /GoTo /D (subsection.6.2) >>
endobj
120 0 obj
(Generic \(Semi-Efficient\) Countermeasures)
endobj
121 0 obj
<< /S /GoTo /D (subsection.6.3) >>
endobj
124 0 obj
(Countermeasures for AES)
endobj
125 0 obj
<< /S /GoTo /D (section*.6) >>
endobj
128 0 obj
(References)
endobj
129 0 obj
<< /S /GoTo /D [130 0 R /Fit ] >>
endobj
148 0 obj <<
/Length 4688
/Filter /FlateDecode
>>
stream
xڭZYs�F�~����R$�1~u���syb%�>��E#��h����_f��쇉`��������
���ν���7�O����4��'���i{�&��w��;��T�����{s��#w�}~0��?�~,Ї�jv���CQ���|�{S
f��a��EGhE~z`h��{�CU��<����eN�1��N�w��w� ��}jʎ����ٙn0�v�f]�'㻍�9YI��k��M���y���ڭ��c]a;�<�ih��b���2'���R�T�t��
����;��b�;/���wA���'ݾ��}w���ٿ�:���#�`���s�V҄�7U�������u�,}��3e�{/Z훶n1ͮz�I��&1��2pi7��t�o�)u�>=��u��L�,�(vb?�O�(�D�,zo���Q���vd>�ޕ$'�K&��S��\��l��.���7�Ķ8c.$�.��pߔ[��C�:��PLH>y�J���]����Rɧk{r�Aѝ�C����*՟h�^;w�_rZ�,I�6�x �͢���X�� Z��U����U��� �˫���[�=H���d����k�p���4�ߕ��%����t��Þ���8Tu��,�L+�t
B�����+�z��AP�R�|���t�_ �)-<�hı&f�[�ʱ�A0@�I�e� Rg�_K�����D��+V|e���ѫ���Z9=tݕ�zd��lAS���S[.F��*�#�5J
k���u�ě�~=�-�0ǂ��4�={ kbv�Ê��N��#]�&���;�^0L[��G��\��9��t�Fq��Mg�ƚ�PϖP��Y��R��b�c�N��39�