Sciweavers

12 search results - page 2 / 3
» Two New Techniques of Side-Channel Cryptanalysis
Sort
View
CHES
2006
Springer
87views Cryptology» more  CHES 2006»
13 years 9 months ago
Templates vs. Stochastic Methods
Template Attacks and the Stochastic Model provide advanced methods for side channel cryptanalysis that make use of `a-priori' knowledge gained from a profiling step. For a sys...
Benedikt Gierlichs, Kerstin Lemke-Rust, Christof P...
FSE
2010
Springer
220views Cryptology» more  FSE 2010»
13 years 10 months ago
Super-Sbox Cryptanalysis: Improved Attacks for AES-Like Permutations
In this paper, we improve the recent rebound and start-from-the-middle attacks on AES-like permutations. Our new cryptanalysis technique uses the fact that one can view two rounds ...
Henri Gilbert, Thomas Peyrin
CCS
2010
ACM
13 years 5 months ago
Sidebuster: automated detection and quantification of side-channel leaks in web application development
A web application is a "two-part" program, with its components deployed both in the browser and in the web server. The communication between these two components inevita...
Kehuan Zhang, Zhou Li, Rui Wang 0010, XiaoFeng Wan...
WISA
2010
Springer
13 years 3 months ago
Improved Trace-Driven Cache-Collision Attacks against Embedded AES Implementations
In this paper we present two attacks that exploit cache events, which are visible in some side channel, to derive a secret key used in an implementation of AES. The first is an imp...
Jean-François Gallais, Ilya Kizhvatov, Mich...
AES
2000
Springer
136views Cryptology» more  AES 2000»
13 years 9 months ago
MARS Attacks! Preliminary Cryptanalysis of Reduced-Round MARS Variants
Abstract. In this paper, we discuss ways to attack various reducedround variants of MARS. We consider cryptanalysis of two reducedround variants of MARS: MARS with the full mixing ...
John Kelsey, Bruce Schneier