Unveiling RSA Vulnerabilities: Cache-Timing Attacks Explained 🔐
Discover how cache-timing attacks can compromise RSA key generation. Learn from the research by Cabrera Aldaya et al. on potential security risks and mitigation strategies in cryptographic hardware.

IACR
595 views • Dec 31, 2019

About this video
Paper by Alejandro Cabrera Aldaya, Cesar Pereida García, Luis Manuel Alvarez Tapia, Billy Bob Brumley presented at Cryptographic Hardware and Embedded Systems Conference 2019
See https://iacr.org/cryptodb/data/paper.php?pubkey=29851
See https://iacr.org/cryptodb/data/paper.php?pubkey=29851
Video Information
Views
595
Duration
20:34
Published
Dec 31, 2019