Timing Cryptanalysis Attack
Matt Blaze
mab at crypto.com
Mon Dec 11 15:02:56 PST 1995
>The trivial way to handle this is simply to check user time with the
>right system calls and make sure it always comes out the same with an
>apropriate number of sleeps.
Of course, this works against a remote adversary, but not against one
on the same machine who can look at actual CPU consumption (which doesn't
increase when the target is blocked).
-matt
More information about the cypherpunks-legacy
mailing list