Sciweavers

4 search results - page 1 / 1
» Secure scan: a design-for-test architecture for crypto chips
Sort
View
TODAES
2011
107views more  TODAES 2011»
12 years 11 months ago
Scan-based attacks on linear feedback shift register based stream ciphers
—In this paper, we present an attack on stream cipher implementations by determining the scan chain structure of the linear feedback shift registers in their implementations. Alt...
Yu Liu, Kaijie Wu, Ramesh Karri
ACSAC
2000
IEEE
13 years 9 months ago
The Chinese Remainder Theorem and its Application in a High-Speed RSA Crypto Chip
The performance of RSA hardware is primarily determined by an efficient implementation of the long integer modular arithmetic and the ability to utilize the Chinese Remainder The...
Johann Großschädl
ACSAC
2008
IEEE
13 years 11 months ago
Defending Against Attacks on Main Memory Persistence
Main memory contains transient information for all resident applications. However, if memory chip contents survives power-off, e.g., via freezing DRAM chips, sensitive data such a...
William Enck, Kevin R. B. Butler, Thomas Richardso...