Sciweavers

168 search results - page 1 / 34
» Statistics and Secret Leakage
Sort
View
FC
2000
Springer
80views Cryptology» more  FC 2000»
13 years 8 months ago
Statistics and Secret Leakage
Jean-Sébastien Coron, Paul C. Kocher, David...
ICCAD
2009
IEEE
121views Hardware» more  ICCAD 2009»
13 years 2 months ago
MOLES: Malicious off-chip leakage enabled by side-channels
Economic incentives have driven the semiconductor industry to separate design from fabrication in recent years. This trend leads to potential vulnerabilities from untrusted circui...
Lang Lin, Wayne Burleson, Christof Paar
CIS
2007
Springer
13 years 11 months ago
Controlled Secret Leakage
— Privacy is the claim of individuals, groups and institutions to determine for themselves, when, how and to what extent information about them is communicated to others. How to ...
Tianjie Cao, Shi Huang, Hui Cui, Yipeng Wu, Qihan ...
FSE
2008
Springer
103views Cryptology» more  FSE 2008»
13 years 6 months ago
New Form of Permutation Bias and Secret Key Leakage in Keystream Bytes of RC4
Consider the permutation S in RC4. Roos pointed out in 1995 that after the Key Scheduling Algorithm (KSA) of RC4, each of the initial bytes of the permutation, i.e., S[y] for smal...
Subhamoy Maitra, Goutam Paul