Sciweavers

9 search results - page 1 / 2
» GBDE-GEOM Based Disk Encryption
Sort
View
BSDCON
2003
13 years 6 months ago
GBDE-GEOM Based Disk Encryption
The ever increasing mobility of computers has made protection of data on digital storage media an important requirement in a number of applications and situations. GBDE is a stron...
Poul-Henning Kamp
WISA
2004
Springer
13 years 10 months ago
Encrypted Watermarks and Linux Laptop Security
The most common way to implement full-disk encryption (as opposed to encrypted file systems) in the GNU/Linux operating system is using the encrypted loop device, known as CryptoL...
Markku-Juhani Olavi Saarinen
CTRSA
2006
Springer
146views Cryptology» more  CTRSA 2006»
13 years 9 months ago
Cache Attacks and Countermeasures: The Case of AES
We describe several software side-channel attacks based on inter-process leakage through the state of the CPU's memory cache. This leakage reveals memory access patterns, whic...
Dag Arne Osvik, Adi Shamir, Eran Tromer
ICISC
2007
77views Cryptology» more  ICISC 2007»
13 years 6 months ago
Improving Upon the TET Mode of Operation
Naor and Reingold had proposed the construction of a strong pseudo-random permutation (SPRP) by using a layer of ECB encryption between two layers of invertible block-wise universa...
Palash Sarkar
JOC
2010
92views more  JOC 2010»
13 years 4 days ago
Efficient Cache Attacks on AES, and Countermeasures
We describe several software side-channel attacks based on inter-process leakage through the state of the CPU's memory cache. This leakage reveals memory access patterns, whic...
Eran Tromer, Dag Arne Osvik, Adi Shamir