Sciweavers

11 search results - page 1 / 3
» Side Channel Attacks on Irregularly Decimated Generators
Sort
View
ICISC
2007
117views Cryptology» more  ICISC 2007»
13 years 6 months ago
Side Channel Attacks on Irregularly Decimated Generators
Abstract. We investigate three side channel attacks on ABSG, a variant of irregularly decimated generators (IDG). The three attacks are timing analysis, phase-shift fault analysis ...
Chuan-Wen Loe, Khoongming Khoo
CHES
2009
Springer
158views Cryptology» more  CHES 2009»
14 years 5 months ago
A New Side-Channel Attack on RSA Prime Generation
Thomas Finke, Max Gebhardt, Werner Schindler
ACNS
2003
Springer
147views Cryptology» more  ACNS 2003»
13 years 9 months ago
Side-Channel Attack on Substitution Blocks
1 We describe a side-channel attack on a substitution block, which is usually implemented as a table lookup operation. In particular, we have investigated smartcard implementations...
Roman Novak
SBCCI
2005
ACM
136views VLSI» more  SBCCI 2005»
13 years 10 months ago
Current mask generation: a transistor level security against DPA attacks
The physical implementation of cryptographic algorithms may leak to some attacker security information by the side channel data, as power consumption, timing, temperature or elect...
Daniel Mesquita, Jean-Denis Techer, Lionel Torres,...
CHES
2009
Springer
150views Cryptology» more  CHES 2009»
14 years 5 months ago
An Efficient Method for Random Delay Generation in Embedded Software
Random delays are a countermeasure against a range of side channel and fault attacks that is often implemented in embedded software. We propose a new method for generation of rando...
Ilya Kizhvatov, Jean-Sébastien Coron