Sciweavers

44 search results - page 8 / 9
» Cryptographic Salt: A Countermeasure against Denial-of-Servi...
Sort
View
GLVLSI
2007
IEEE
107views VLSI» more  GLVLSI 2007»
14 years 10 days ago
Side-channel resistant system-level design flow for public-key cryptography
In this paper, we propose a new design methodology to assess the risk for side-channel attacks, more specifically timing analysis and simple power analysis, at an early design st...
Kazuo Sakiyama, Elke De Mulder, Bart Preneel, Ingr...
ASYNC
2005
IEEE
174views Hardware» more  ASYNC 2005»
13 years 11 months ago
Delay Insensitive Encoding and Power Analysis: A Balancing Act
Unprotected cryptographic hardware is vulnerable to a side-channel attack known as Differential Power Analysis (DPA). This attack exploits data-dependent power consumption of a co...
Konrad J. Kulikowski, Ming Su, Alexander B. Smirno...
DSD
2006
IEEE
135views Hardware» more  DSD 2006»
13 years 9 months ago
Hardware-Software Codesign of a Vector Co-processor for Public Key Cryptography
Until now, most cryptography implementations on parallel architectures have focused on adapting the software to SIMD architectures initially meant for media applications. In this ...
Jacques J. A. Fournier, Simon W. Moore
FSE
2006
Springer
117views Cryptology» more  FSE 2006»
13 years 9 months ago
How Far Can We Go on the x64 Processors?
This paper studies the state-of-the-art software optimization methodology for symmetric cryptographic primitives on the new 64-bit x64 processors, AMD Athlon64 (AMD64) and Intel Pe...
Mitsuru Matsui
FDTC
2010
Springer
132views Cryptology» more  FDTC 2010»
13 years 4 months ago
Fault Injection Resilience
Fault injections constitute a major threat to the security of embedded systems. The errors in the cryptographic algorithms have been shown to be extremely dangerous, since powerful...
Sylvain Guilley, Laurent Sauvage, Jean-Luc Danger,...