Sciweavers

623 search results - page 2 / 125
» Side-Channel Issues for Designing Secure Hardware Implementa...
Sort
View
CHES
2006
Springer
205views Cryptology» more  CHES 2006»
13 years 9 months ago
Automated Design of Cryptographic Devices Resistant to Multiple Side-Channel Attacks
Balanced dynamic dual-rail gates and asynchronous circuits have been shown, if implemented correctly, to have natural and efficient resistance to side-channel attacks. Despite thei...
Konrad J. Kulikowski, Alexander B. Smirnov, Alexan...
CHES
2011
Springer
254views Cryptology» more  CHES 2011»
12 years 5 months ago
Extractors against Side-Channel Attacks: Weak or Strong?
Randomness extractors are important tools in cryptography. Their goal is to compress a high-entropy source into a more uniform output. Beyond their theoretical interest, they have ...
Marcel Medwed, François-Xavier Standaert
ICISC
2009
132views Cryptology» more  ICISC 2009»
13 years 3 months ago
Side-Channel Analysis of Cryptographic Software via Early-Terminating Multiplications
Abstract. The design of embedded processors demands a careful tradeoff between many conflicting objectives such as performance, silicon area and power consumption. Finding such a t...
Johann Großschädl, Elisabeth Oswald, Da...
DATE
2005
IEEE
122views Hardware» more  DATE 2005»
13 years 11 months ago
A VLSI Design Flow for Secure Side-Channel Attack Resistant ICs
Kris Tiri, Ingrid Verbauwhede
DATE
2005
IEEE
109views Hardware» more  DATE 2005»
13 years 11 months ago
Design Method for Constant Power Consumption of Differential Logic Circuits
Side channel attacks are a major security concern for smart cards and other embedded devices. They analyze the variations on the power consumption to find the secret key of the en...
Kris Tiri, Ingrid Verbauwhede