VOOZH about

URL: https://web.archive.org/web/20101214092512/http://eprint.iacr.org/2010/594.pdf


%PDF-1.4 %���� 1 0 obj << /S /GoTo /D (section.1) >> endobj 4 0 obj (Introduction) endobj 5 0 obj << /S /GoTo /D (subsection.1.1) >> endobj 8 0 obj (Our Contributions) endobj 9 0 obj << /S /GoTo /D (subsection.1.2) >> endobj 12 0 obj (Related Work) endobj 13 0 obj << /S /GoTo /D (subsection.1.3) >> endobj 16 0 obj (Organization of this Document) endobj 17 0 obj << /S /GoTo /D (section.2) >> endobj 20 0 obj (Preliminaries) endobj 21 0 obj << /S /GoTo /D (subsection.2.1) >> endobj 24 0 obj (The CPU Cache and its Side Channels) endobj 25 0 obj << /S /GoTo /D (subsection.2.2) >> endobj 28 0 obj (AES \205 The Advanced Encryption Standard) endobj 29 0 obj << /S /GoTo /D (subsection.2.3) >> endobj 32 0 obj (How to Implement AES) endobj 33 0 obj << /S /GoTo /D (subsection.2.4) >> endobj 36 0 obj (Test Environment) endobj 37 0 obj << /S /GoTo /D (section.3) >> endobj 40 0 obj (Breaking AES given Ideal Measurements) endobj 41 0 obj << /S /GoTo /D (subsection.3.1) >> endobj 44 0 obj (Using Accesses from Two Consecutive Rounds) endobj 45 0 obj << /S /GoTo /D (subsection.3.2) >> endobj 48 0 obj (Using Accesses from Continuous Streams) endobj 49 0 obj << /S /GoTo /D (subsection.3.3) >> endobj 52 0 obj (Key Search) endobj 53 0 obj << /S /GoTo /D (section.4) >> endobj 56 0 obj (Attacking AES in the Real World) endobj 57 0 obj << /S /GoTo /D (subsection.4.1) >> endobj 60 0 obj (CFS \205 The Completely Fair Scheduler) endobj 61 0 obj << /S /GoTo /D (subsection.4.2) >> endobj 64 0 obj (A Denial of Service Attack for CFS) endobj 65 0 obj << /S /GoTo /D (subsection.4.3) >> endobj 68 0 obj (Testing for Cache Accesses) endobj 69 0 obj << /S /GoTo /D (subsection.4.4) >> endobj 72 0 obj (Using Neural Networks to Handle Noise) endobj 73 0 obj << /S /GoTo /D (subsubsection.4.4.1) >> endobj 76 0 obj (Introduction to Artificial Neural Networks) endobj 77 0 obj << /S /GoTo /D (subsubsection.4.4.2) >> endobj 80 0 obj (Inputs and Outputs of Our ANN) endobj 81 0 obj << /S /GoTo /D (subsubsection.4.4.3) >> endobj 84 0 obj (Parameters of the Neural Network) endobj 85 0 obj << /S /GoTo /D (subsubsection.4.4.4) >> endobj 88 0 obj (Sources of Noise) endobj 89 0 obj << /S /GoTo /D (section.5) >> endobj 92 0 obj (Results and Discussion) endobj 93 0 obj << /S /GoTo /D (subsection.5.1) >> endobj 96 0 obj (Results) endobj 97 0 obj << /S /GoTo /D (subsection.5.2) >> endobj 100 0 obj (Accelerating the Key Search) endobj 101 0 obj << /S /GoTo /D (subsection.5.3) >> endobj 104 0 obj (Extensions to AES-192 and AES-256) endobj 105 0 obj << /S /GoTo /D (subsection.5.4) >> endobj 108 0 obj (Decryption without Ciphertext) endobj 109 0 obj << /S /GoTo /D (section.6) >> endobj 112 0 obj (Countermeasures) endobj 113 0 obj << /S /GoTo /D (subsection.6.1) >> endobj 116 0 obj (Academical Generic Mitigation Strategies) endobj 117 0 obj << /S /GoTo /D (subsection.6.2) >> endobj 120 0 obj (Generic \(Semi-Efficient\) Countermeasures) endobj 121 0 obj << /S /GoTo /D (subsection.6.3) >> endobj 124 0 obj (Countermeasures for AES) endobj 125 0 obj << /S /GoTo /D (section*.6) >> endobj 128 0 obj (References) endobj 129 0 obj << /S /GoTo /D [130 0 R /Fit ] >> endobj 148 0 obj << /Length 4688 /Filter /FlateDecode >> stream xڭZYs�F�~����R$�1~u���syb%�>��E#��h����_f��쇉`�������� ���ν���7�O����4��' ���i{�&��w��;��T�����{s��#w�}~0��?�~,Ї�jv���CQ���|�{S f��a��EGhE~z`h��{�CU��<����eN�1��N�w��w� ��}jʎ����ٙn0�v�f]�'㻍�9YI��k��M���y���ڭ��c]a;�<�ih��b���2'���R�T�t�� ����;��b�;/���wA���'ݾ��}w���ٿ�:���#�`���s�V҄�7U�������u�,}��3e�{/Z훶n1ͮz�I��&1��2pi7��t�o�)u� >=��u��L�,�(vb?�O�(�D�,zo���Q���vd>�ޕ$'�K&��S��\��l��.���7�Ķ8c.$�.��pߔ[��C�:��PLH>y�J���]����Rɧk{r�Aѝ�C����*՟h�^;w�_rZ�,I�6�x �͢���X�� Z��U����U��� �˫���[�=H���d����k�p���4�ߕ��%����t��Þ�� �8Tu��,�L+�t B�����+�z��AP�R�|���t�_ �)-<�hı&f�[�ʱ�A0@�I�e� Rg�_K�����D��+V|e��� ѫ���Z9=tݕ�zd�� lAS���S[.F��*�#�5J k���u�ě�~=�-�0 ǂ��4�={ kbv�Ê��N��#]�&���;�^0L[��G��\��9��t�Fq��Mg�ƚ�PϖP��Y��R��b�c�N��39�