Sciweavers

17 search results - page 1 / 4
» Masking Large Keys in Hardware: A Masked Implementation of M...
Sort
View
ESORICS
2002
Springer
14 years 4 months ago
Hamming Weight Attacks on Cryptographic Hardware - Breaking Masking Defense
It is believed that masking is an effective countermeasure against power analysis attacks: before a certain operation involving a key is performed in a cryptographic chip, the inpu...
Marcin Gomulkiewicz, Miroslaw Kutylowski
FPL
2006
Springer
219views Hardware» more  FPL 2006»
13 years 8 months ago
FPGA Implementations of the DES and Triple-DES Masked Against Power Analysis Attacks
This paper presents FPGA implementations of the DES and Triple-DES with improved security against power analysis attacks. The proposed designs use Boolean masking, a previously in...
François-Xavier Standaert, Gaël Rouvro...
ISVLSI
2005
IEEE
108views VLSI» more  ISVLSI 2005»
13 years 10 months ago
Analysis of a Mask-Based Nanowire Decoder
A key challenge facing nanotechnologies will be controlling nanoarrays, two orthogonal sets of nanowires that form a crossbar, using a moderate number of mesoscale wires. Three me...
Eric Rachlin, John E. Savage, Benjamin Gojman
TC
2008
13 years 4 months ago
Analysis of Mask-Based Nanowire Decoders
Stochastically assembled nanoscale architectures have the potential to achieve device densities 100 times greater than today's CMOS. A key challenge facing nanotechnologies is...
Eric Rachlin, John E. Savage
CHES
2010
Springer
214views Cryptology» more  CHES 2010»
13 years 6 months ago
Correlation-Enhanced Power Analysis Collision Attack
Side-channel based collision attacks are a mostly disregarded alternative to DPA for analyzing unprotected implementations. The advent of strong countermeasures, such as masking, h...
Amir Moradi, Oliver Mischke, Thomas Eisenbarth