Sciweavers

4 search results - page 1 / 1
» Information Theoretic Evaluation of Side-Channel Resistant L...
Sort
View
CHES
2007
Springer
106views Cryptology» more  CHES 2007»
13 years 11 months ago
Information Theoretic Evaluation of Side-Channel Resistant Logic Styles
François Macé, François-Xavie...
CASES
2010
ACM
13 years 2 months ago
Implementing virtual secure circuit using a custom-instruction approach
Although cryptographic algorithms are designed to resist at least thousands of years of cryptoanalysis, implementing them with either software or hardware usually leaks additional...
Zhimin Chen, Ambuj Sinha, Patrick Schaumont
FDTC
2010
Springer
132views Cryptology» more  FDTC 2010»
13 years 2 months ago
Fault Injection Resilience
Fault injections constitute a major threat to the security of embedded systems. The errors in the cryptographic algorithms have been shown to be extremely dangerous, since powerful...
Sylvain Guilley, Laurent Sauvage, Jean-Luc Danger,...
CHI
2007
ACM
14 years 5 months ago
Authoring sensor-based interactions by demonstration with direct manipulation and pattern recognition
Sensors are becoming increasingly important in interaction design. Authoring a sensor-based interaction comprises three steps: choosing and connecting the appropriate hardware, cr...
Björn Hartmann, Leith Abdulla, Manas Mittal, ...