Sciweavers

13 search results - page 3 / 3
» ches 2000
Sort
View
CHES
2000
Springer
111views Cryptology» more  CHES 2000»
13 years 9 months ago
How to Explain Side-Channel Leakage to Your Kids
This paper will attempt to explain some of the side-channel attack techniques in a fashion that is easily comprehensible by the layman. What follows is a presentation of three diļ¬...
David Naccache, Michael Tunstall
CHES
2000
Springer
114views Cryptology» more  CHES 2000»
13 years 8 months ago
Efficient Generation of Prime Numbers
The generation of prime numbers underlies the use of most public-key schemes, essentially as a major primitive needed for the creation of key pairs or as a computation stage appear...
Marc Joye, Pascal Paillier, Serge Vaudenay
CHES
2000
Springer
75views Cryptology» more  CHES 2000»
13 years 9 months ago
A 155 Mbps Triple-DES Network Encryptor
The presented Triple-DES encryptor is a single-chip solution to encrypt network communication. It is optimized for throughput and fast switching between virtual connections like fo...
Herbert Leitold, Wolfgang Mayerwieser, Udo Payer, ...