{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T18:34:53Z","timestamp":1742927693745,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":23,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642215537"},{"type":"electronic","value":"9783642215544"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-21554-4_7","type":"book-chapter","created":{"date-parts":[[2011,6,13]],"date-time":"2011-06-13T07:29:53Z","timestamp":1307950193000},"page":"110-129","source":"Crossref","is-referenced-by-count":3,"title":["Cache Timing Analysis of RC4"],"prefix":"10.1007","author":[{"given":"Thomas","family":"Chardin","sequence":"first","affiliation":[]},{"given":"Pierre-Alain","family":"Fouque","sequence":"additional","affiliation":[]},{"given":"Delphine","family":"Leresteux","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"7_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"110","DOI":"10.1007\/978-3-642-15031-9_8","volume-title":"Cryptographic Hardware and Embedded Systems, CHES 2010","author":"O. Acii\u00e7mez","year":"2010","unstructured":"Acii\u00e7mez, O., Brumley, B.B., Grabher, P.: New results on instruction cache attacks. In: Mangard, S., Standaert, F.-X. (eds.) CHES 2010. LNCS, vol.\u00a06225, pp. 110\u2013124. Springer, Heidelberg (2010)"},{"key":"7_CR2","unstructured":"Anonymous: RC4 source code. Cypherpunks mailing list (September 1994), \n                    \n                      http:\/\/cypherpunks.venona.com\/date\/1994\/09\/msg00304.html"},{"key":"7_CR3","unstructured":"Bernstein, D.J.: Cache-timing attacks on AES. Technical report (2005)"},{"key":"7_CR4","first-page":"586","volume-title":"ITCC","author":"G. Bertoni","year":"2005","unstructured":"Bertoni, G., Zaccaria, V., Breveglieri, L., Monchiero, M., Palermo, G.: Aes power attack based on induced cache miss and countermeasure. In: ITCC, vol.\u00a0(1), pp. 586\u2013591. IEEE Computer Society, Los Alamitos (2005)"},{"key":"7_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"270","DOI":"10.1007\/978-3-540-71039-4_17","volume-title":"Fast Software Encryption","author":"E. Biham","year":"2008","unstructured":"Biham, E., Carmeli, Y.: Efficient reconstruction of rc4 keys from internal states. In: Nyberg, K. (ed.) FSE 2008. LNCS, vol.\u00a05086, pp. 270\u2013288. Springer, Heidelberg (2008)"},{"key":"7_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"359","DOI":"10.1007\/11502760_24","volume-title":"Fast Software Encryption","author":"E. Biham","year":"2005","unstructured":"Biham, E., Granboulan, L., Nguyen, P.Q.: Impossible Fault Analysis of RC4 and Differential Fault Analysis of RC4. In: Gilbert, H., Handschuh, H. (eds.) FSE 2005. LNCS, vol.\u00a03557, pp. 359\u2013367. Springer, Heidelberg (2005)"},{"key":"7_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"201","DOI":"10.1007\/11894063_16","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2006","author":"J. Bonneau","year":"2006","unstructured":"Bonneau, J., Mironov, I.: Cache-Collision Timing Attacks against AES. In: Goubin, L., Matsui, M. (eds.) CHES 2006. LNCS, vol.\u00a04249, pp. 201\u2013215. Springer, Heidelberg (2006), \n                    \n                      http:\/\/www.springerlink.com\/content\/v34t50772r87g851\/fulltext.pdf"},{"key":"7_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"667","DOI":"10.1007\/978-3-642-10366-7_39","volume-title":"Advances in Cryptology \u2013 ASIACRYPT 2009","author":"B.B. Brumley","year":"2009","unstructured":"Brumley, B.B., Hakala, R.M.: Cache-Timing Template Attacks. In: Matsui, M. (ed.) ASIACRYPT 2009. LNCS, vol.\u00a05912, pp. 667\u2013684. Springer, Heidelberg (2009)"},{"key":"7_CR9","first-page":"293","volume-title":"FOCS","author":"S. Dziembowski","year":"2008","unstructured":"Dziembowski, S., Pietrzak, K.: Leakage-resilient cryptography. In: FOCS, pp. 293\u2013302. IEEE Computer Society, Los Alamitos (2008)"},{"key":"7_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/3-540-45537-X_1","volume-title":"Selected Areas in Cryptography","author":"S.R. Fluhrer","year":"2001","unstructured":"Fluhrer, S.R., Mantin, I., Shamir, A.: Weaknesses in the Key Scheduling Algorithm of RC4. In: Vaudenay, S., Youssef, A.M. (eds.) SAC 2001. LNCS, vol.\u00a02259, pp. 1\u201324. Springer, Heidelberg (2001)"},{"key":"7_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"220","DOI":"10.1007\/10718964_18","volume-title":"Information Security and Privacy","author":"J.D. Goli\u0107","year":"2000","unstructured":"Goli\u0107, J.D.: Iterative Probabilistic Cryptanalysis of RC4 Keystream Generator. In: Clark, A., Boyd, C., Dawson, E.P. (eds.) ACISP 2000. LNCS, vol.\u00a01841, pp. 220\u2013233. Springer, Heidelberg (2000), \n                    \n                      http:\/\/www.springerlink.com\/content\/l1510525523352p4\/fulltext.pdf"},{"key":"7_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"240","DOI":"10.1007\/978-3-540-28632-5_18","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2004","author":"J.J. Hoch","year":"2004","unstructured":"Hoch, J.J., Shamir, A.: Fault Analysis of Stream Ciphers. In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, vol.\u00a03156, pp. 240\u2013253. Springer, Heidelberg (2004)"},{"key":"7_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"164","DOI":"10.1007\/978-3-642-00862-7_11","volume-title":"Topics in Cryptology \u2013 CT-RSA 2009","author":"D. Khovratovich","year":"2009","unstructured":"Khovratovich, D., Biryukov, A., Nikolic, I.: Speeding up collision search for byte-oriented hash functions. In: Fischlin, M. (ed.) CT-RSA 2009. LNCS, vol.\u00a05473, pp. 164\u2013181. Springer, Heidelberg (2009)"},{"key":"7_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"327","DOI":"10.1007\/3-540-49649-1_26","volume-title":"Advances in Cryptology - ASIACRYPT\u201998","author":"L.R. Knudsen","year":"1998","unstructured":"Knudsen, L.R., Meier, W., Preneel, B., Rijmen, V., Verdoolaege, S.: Analysis Methods for (Alleged) RC4. In: Ohta, K., Pei, D. (eds.) ASIACRYPT 1998. LNCS, vol.\u00a01514, pp. 327\u2013341. Springer, Heidelberg (1998), \n                    \n                      http:\/\/www.springerlink.com\/content\/tyqqary0p5kfw7tp\/fulltext.pdf"},{"key":"7_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"433","DOI":"10.1007\/978-3-642-10868-6_26","volume-title":"Cryptography and Coding","author":"G. Leander","year":"2009","unstructured":"Leander, G., Zenner, E., Hawkes, P.: Cache Timing Analysis of LFSR-Based Stream Ciphers. In: Parker, M.G. (ed.) Cryptography and Coding 2009. LNCS, vol.\u00a05921, pp. 433\u2013445. Springer, Heidelberg (2009)"},{"key":"7_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"297","DOI":"10.1007\/978-3-540-85174-5_17","volume-title":"Advances in Cryptology \u2013 CRYPTO 2008","author":"A. Maximov","year":"2008","unstructured":"Maximov, A., Khovratovich, D.: New State Recovery Attack on RC4. In: Wagner, D. (ed.) CRYPTO 2008. LNCS, vol.\u00a05157, pp. 297\u2013316. Springer, Heidelberg (2008)"},{"key":"7_CR17","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1137\/0105003","volume":"5","author":"J. Munkres","year":"1957","unstructured":"Munkres, J.: Algorithms for the Assignment and Transportation Problems. Journal of the Society for Industrial and Applied Mathematics\u00a05, 32\u201338 (1957), \n                    \n                      http:\/\/www.jstor.org\/stable\/2098689","journal-title":"Journal of the Society for Industrial and Applied Mathematics"},{"key":"7_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/11605805_1","volume-title":"Topics in Cryptology \u2013 CT-RSA 2006","author":"D.A. Osvik","year":"2006","unstructured":"Osvik, D.A., Shamir, A., Tromer, E.: Cache Attacks and Countermeasures: The Case of AES. In: Pointcheval, D. (ed.) CT-RSA 2006. LNCS, vol.\u00a03860, pp. 1\u201320. Springer, Heidelberg (2006), \n                    \n                      http:\/\/www.springerlink.com\/content\/f52x1h55g1632l17\/fulltext.pdf"},{"key":"7_CR19","unstructured":"Page, D.: Theoretical Use of Cache Memory as a Cryptanalytic Side-Channel. Technical Report CSTR-02-003, Department of computer science, university of Bristol (2002), \n                    \n                      http:\/\/www.cs.bris.ac.uk\/Publications\/Papers\/1000625.pdf"},{"issue":"2","key":"7_CR20","doi-asserted-by":"publisher","first-page":"468","DOI":"10.1287\/moor.1090.0380","volume":"34","author":"J. Salez","year":"2009","unstructured":"Salez, J., Shah, D.: Belief propagation: An asymptotically optimal algorithm for the random assignment problem. Math. Oper. Res.\u00a034(2), 468\u2013480 (2009)","journal-title":"Math. Oper. Res."},{"key":"7_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"74","DOI":"10.1007\/978-3-642-19574-7_5","volume-title":"Selected Areas in Cryptography","author":"P. Sepehrdad","year":"2011","unstructured":"Sepehrdad, P., Vaudenay, S., Vuagnoux, M.: Discovery and exploitation of new biases in rc4. In: Biryukov, A., Gong, G., Stinson, D.R. (eds.) SAC 2010. LNCS, vol.\u00a06544, pp. 74\u201391. Springer, Heidelberg (2011)"},{"issue":"1","key":"7_CR22","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1007\/s00145-009-9049-y","volume":"23","author":"E. Tromer","year":"2010","unstructured":"Tromer, E., Osvik, D.A., Shamir, A.: Efficient cache attacks on aes, and countermeasures. J. Cryptology\u00a023(1), 37\u201371 (2010)","journal-title":"J. Cryptology"},{"key":"7_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"199","DOI":"10.1007\/978-3-642-04159-4_13","volume-title":"Selected Areas in Cryptography","author":"E. Zenner","year":"2009","unstructured":"Zenner, E.: A Cache Timing Analysis of HC-256. In: Avanzi, R.M., Keliher, L., Sica, F. (eds.) SAC 2008. LNCS, vol.\u00a05381, pp. 199\u2013213. Springer, Heidelberg (2009)"}],"container-title":["Lecture Notes in Computer Science","Applied Cryptography and Network Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-21554-4_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,19]],"date-time":"2019-05-19T20:09:54Z","timestamp":1558296594000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-21554-4_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642215537","9783642215544"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-21554-4_7","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2011]]}}}