Sciweavers

62 search results - page 13 / 13
» DPA Attacks and S-Boxes
Sort
View
INTEGRATION
2007
107views more  INTEGRATION 2007»
13 years 5 months ago
Power and electromagnetic analysis: Improved model, consequences and comparisons
Since their publication in 1998 and 2001 respectively, Power and Electromagnetic Analysis (SPA, DPA, EMA) have been successfully used to retrieve secret information stored in cryp...
Eric Peeters, François-Xavier Standaert, Je...
RECONFIG
2009
IEEE
172views VLSI» more  RECONFIG 2009»
14 years 3 days ago
Combined SCA and DFA Countermeasures Integrable in a FPGA Design Flow
Abstract—The main challenge when implementing cryptographic algorithms in hardware is to protect them against attacks that target directly the device. Two strategies are customar...
Shivam Bhasin, Jean-Luc Danger, Florent Flament, T...