Sciweavers

13 search results - page 1 / 3
» ches 2000
Sort
View
CHES
2000
Springer
95views Cryptology» more  CHES 2000»
13 years 9 months ago
A Comparative Study of Performance of AES Final Candidates Using FPGAs
Andreas Dandalis, Viktor K. Prasanna, José ...
CHES
2000
Springer
97views Cryptology» more  CHES 2000»
13 years 8 months ago
Software-Hardware Trade-Offs: Application to A5/1 Cryptanalysis
This paper shows how a well-balanced trade-off between a generic workstation and dumb but fast reconfigurable hardware can lead to a more efficient implementation of a cryptanalysi...
Thomas Pornin, Jacques Stern
CHES
2000
Springer
86views Cryptology» more  CHES 2000»
13 years 9 months ago
MiniPASS: Authentication and Digital Signatures in a Constrained Environment
Abstract. We describe an implementation of the PASS polynomial authentication and signature scheme [5, 6] that is suitable for use in highly constrained environments such as SmartC...
Jeffrey Hoffstein, Joseph H. Silverman
CHES
2000
Springer
204views Cryptology» more  CHES 2000»
13 years 9 months ago
Using Second-Order Power Analysis to Attack DPA Resistant Software
Under a simple power leakage model based on Hamming weight, a software implementation of a data-whitening routine is shown to be vulnerable to a first-order Differential Power Anal...
Thomas S. Messerges
CHES
2000
Springer
135views Cryptology» more  CHES 2000»
13 years 9 months ago
Protecting Smart Cards from Passive Power Analysis with Detached Power Supplies
Power analysis is a very successful cryptanalytic technique which extracts secret information from smart cards by analysing the power consumed during the execution of their interna...
Adi Shamir