Sciweavers

Share
6 search results - page 1 / 2
» A New DPA Countermeasure Based on Permutation Tables
Sort
View
SCN
2008
Springer
142views Communications» more  SCN 2008»
9 years 2 months ago
A New DPA Countermeasure Based on Permutation Tables
Abstract. We propose and analyse a new countermeasure against Differential Power Analysis (DPA) for the AES encryption algorithm, based on permutation tables. As opposed to existin...
Jean-Sébastien Coron
CHES
2005
Springer
117views Cryptology» more  CHES 2005»
9 years 8 months ago
DPA Leakage Models for CMOS Logic Circuits
In this paper, we propose new models for directly evaluating DPA leakage from logic information in CMOS circuits. These models are based on the transition probability for each gate...
Daisuke Suzuki, Minoru Saeki, Tetsuya Ichikawa
FDTC
2006
Springer
117views Cryptology» more  FDTC 2006»
9 years 6 months ago
DPA on Faulty Cryptographic Hardware and Countermeasures
Abstract. Balanced gates are an effective countermeasure against power analysis attacks only if they can be guaranteed to maintain their power balance. Traditional testing and reli...
Konrad J. Kulikowski, Mark G. Karpovsky, Alexander...
CHES
2006
Springer
137views Cryptology» more  CHES 2006»
9 years 6 months ago
Provably Secure S-Box Implementation Based on Fourier Transform
Cryptographic algorithms implemented in embedded devices must withstand Side Channel Attacks such as the Differential Power Analysis (DPA). A common method of protecting symmetric ...
Emmanuel Prouff, Christophe Giraud, Sébasti...
ITCC
2005
IEEE
9 years 8 months ago
AES Power Attack Based on Induced Cache Miss and Countermeasure
This paper presents a new attack against a software implementation of the Advanced Encryption Standard. The attack aims at flushing elements of the SBOX from the cache, thus indu...
Guido Bertoni, Vittorio Zaccaria, Luca Breveglieri...
books