Sciweavers

12 search results - page 3 / 3
» Cache Attacks and Countermeasures: The Case of AES
Sort
View
CHES
2007
Springer
327views Cryptology» more  CHES 2007»
13 years 11 months ago
On the Power of Bitslice Implementation on Intel Core2 Processor
Abstract. This paper discusses the state-of-the-art fast software implementation of block ciphers on Intel’s new microprocessor Core2, particularly concentrating on “bitslice i...
Mitsuru Matsui, Junko Nakajima
ICISC
2009
132views Cryptology» more  ICISC 2009»
13 years 3 months ago
Side-Channel Analysis of Cryptographic Software via Early-Terminating Multiplications
Abstract. The design of embedded processors demands a careful tradeoff between many conflicting objectives such as performance, silicon area and power consumption. Finding such a t...
Johann Großschädl, Elisabeth Oswald, Da...