Sciweavers

7 search results - page 2 / 2
» A Generic Security API for Symmetric Key Management on Crypt...
Sort
View
ISCA
2005
IEEE
88views Hardware» more  ISCA 2005»
13 years 11 months ago
Architecture for Protecting Critical Secrets in Microprocessors
We propose “secret-protected (SP)” architecture to enable secure and convenient protection of critical secrets for a given user in an on-line environment. Keys are examples of...
Ruby B. Lee, Peter C. S. Kwan, John Patrick McGreg...
WISA
2009
Springer
14 years 10 days ago
You Cannot Hide behind the Mask: Power Analysis on a Provably Secure S-Box Implementation
Power analysis has shown to be successful in breaking symmetric cryptographic algorithms implemented on low resource devices. Prompted by the breaking of many protected implementat...
J. Pan, J. I. den Hartog, Jiqiang Lu