Sciweavers

7 search results - page 1 / 2
» ches 1999
Sort
View
CHES
1999
Springer
75views Cryptology» more  CHES 1999»
13 years 9 months ago
Efficient Finite Field Basis Conversion Involving Dual Bases
Burton S. Kaliski Jr., Moses Liskov
CHES
1999
Springer
140views Cryptology» more  CHES 1999»
13 years 9 months ago
Power Analysis Attacks of Modular Exponentiation in Smartcards
Abstract. Three new types of power analysis attacks against smartcard implementations of modular exponentiation algorithms are described. The first attack requires an adversary to ...
Thomas S. Messerges, Ezzy A. Dabbish, Robert H. Sl...
CHES
1999
Springer
99views Cryptology» more  CHES 1999»
13 years 9 months ago
Probing Attacks on Tamper-Resistant Devices
Abstract. This paper describes a new type of attack on tamper-resistant cryptographic hardware. We show that by locally observing the value of a few RAM or adress bus bits (possibl...
Helena Handschuh, Pascal Paillier, Jacques Stern
CHES
1999
Springer
104views Cryptology» more  CHES 1999»
13 years 9 months ago
A Scalable Architecture for Montgomery Multiplication
Abstract. This paper describes the methodology and design of a scalable Montgomery multiplication module. There is no limitation on the maximum number of bits manipulated by the mu...
Alexandre F. Tenca, Çetin Kaya Koç