Most-cited papers on attacks channel side cryptanalysis against

Ranked by citation count via OpenAlex. Citations update on a rolling basis; list regenerates every 24h.

  1. 18 cited
  2. FLUSH+RELOAD: a high resolution, low noise, L3 cache side-channel attack

    2013 · IACR Cryptology ePrint Archive · Yarom, Yuval, Falkner, Katrina

    1,014 cited
  3. Last-Level Cache Side-Channel Attacks are Practical

    2015 · Liu, Fangfei, Yarom, Yuval, Ge, Qian et al.

    991 cited
  4. A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks

    2009 · Lecture notes in computer science · Standaert, François‐Xavier, Malkin, Tal, Yung, Moti

    911 cited
  5. 708 cited
  6. Threshold Implementations Against Side-Channel Attacks and Glitches

    2006 · Lecture notes in computer science · Nikova⋆, Svetla, Rechberger, Christian, Rijmen, Vincent

    432 cited
  7. Practical Timing Side Channel Attacks against Kernel Space ASLR

    2013 · Hund, Ralf, Willems, Carsten, Holz, Thorsten

    398 cited
  8. CATalyst: Defeating last-level cache side channel attacks in cloud computing

    2016 · Liu, Fangfei, Ge, Qian, Yarom, Yuval et al.

    374 cited
  9. 363 cited
  10. Masking against Side-Channel Attacks: A Formal Security Proof

    2013 · Lecture notes in computer science · Prouff, Emmanuel, Rivain, Matthieu

    355 cited
  11. Cross-Tenant Side-Channel Attacks in PaaS Clouds

    2014 · Zhang, Yinqian, Juels, Ari, Reiter, Michael K. et al.

    329 cited
  12. Introduction to Side-Channel Attacks

    2009 · Integrated circuits and systems · Standaert, François‐Xavier

    300 cited
  13. STEALTHMEM: system-level protection against cache-based side channel attacks in the cloud

    2012 · Kim, Taesoo, Peinado, Marcus, Mainar-Ruiz, Gloria

    300 cited
  14. Weierstraß Elliptic Curves and Side-Channel Attacks

    2002 · Lecture notes in computer science · Brier, Éric, Jóye, Marc

    298 cited
  15. FPGA-Based Remote Power Side-Channel Attacks

    2018 · Zhao, Mark, Suh, G. Edward

    295 cited
  16. Complementary dual codes for counter-measures to side-channel attacks

    2016 · Advances in Mathematics of Communications · Carlet, Claude, Guilley, Sylvain

    258 cited
  17. Real time detection of cache-based side-channel attacks using hardware performance counters

    2016 · Applied Soft Computing · Chiappetta, Marco, Savaş, Erkay, Yılmaz, Cemal

    253 cited
  18. Side-Channel Attacks: Ten Years After Its Publication and the Impacts on Cryptographic Module Security Testing.

    2005 · IACR Cryptology ePrint Archive · Zhou, Yongbin, Feng, Dengguo

    243 cited
  19. CloudRadar: A Real-Time Side-Channel Attack Detection System in Clouds

    2016 · Lecture notes in computer science · Zhang, Tianwei, Zhang, Yinqian, Lee, Ruby B.

    235 cited
  20. Systematic Classification of Side-Channel Attacks: A Case Study for Mobile Devices

    2017 · IEEE Communications Surveys & Tutorials · Spreitzer, Raphael, Moonsamy, Veelasha, Korak, Thomas et al.

    226 cited
  21. Practical Mitigations for Timing-Based Side-Channel Attacks on Modern x86 Processors

    2009 · Coppens, Bart, Verbauwhede, Ingrid, Bosschere, Koen De et al.

    214 cited
  22. Shuffling against Side-Channel Attacks: A Comprehensive Study with Cautionary Note

    2012 · Lecture notes in computer science · Veyrat-Charvillon, Nicolas, Medwed, Marcel, Kerckhof, Stéphanie et al.

    203 cited
  23. Prefetch Side-Channel Attacks

    2016 · Gruss, Daniel, Maurice, Clémentine, Fogh, Anders et al.

    202 cited
  24. Univariate side channel attacks and leakage modeling

    2011 · Journal of Cryptographic Engineering · Doget, Julien, Prouff, Emmanuel, Rivain, Matthieu et al.

    197 cited
  25. The Program Counter Security Model: Automatic Detection and Removal of Control-Flow Side Channel Attacks

    2006 · Lecture notes in computer science · Molnár, Dávid, Piotrowski, Matt, Schultz, David et al.

    197 cited
  26. Attack Directories, Not Caches: Side Channel Attacks in a Non-Inclusive World

    2019 · Yan, Mengjia, Sprabery, Read, Gopireddy, Bhargava et al.

    190 cited
  27. PLATYPUS: Software-based Power Side-Channel Attacks on x86

    2021 · Lipp, Moritz, Kogler, Andreas, Oswald, David et al.

    190 cited
  28. Hessian Elliptic Curves and Side-Channel Attacks

    2001 · Lecture notes in computer science · Jóye, Marc, Quisquater, Jean-Jacques

    185 cited

Command palette

Jump anywhere, run any action.