Sciweavers

15 search results - page 1 / 3
» ches 2008
Sort
View
CHES
2008
Springer
129views Cryptology» more  CHES 2008»
13 years 7 months ago
The Carry Leakage on the Randomized Exponent Countermeasure
Pierre-Alain Fouque, Denis Réal, Fré...
CHES
2008
Springer
135views Cryptology» more  CHES 2008»
13 years 7 months ago
Attack and Improvement of a Secure S-Box Calculation Based on the Fourier Transform
At CHES 2006, a DPA countermeasure based on the Fourier Transform was published. This generic countermeasure aims at protecting from DPA any S-box calculation used in symmetric cry...
Jean-Sébastien Coron, Christophe Giraud, Em...
CHES
2008
Springer
108views Cryptology» more  CHES 2008»
13 years 7 months ago
Exploiting the Power of GPUs for Asymmetric Cryptography
Modern Graphics Processing Units (GPU) have reached a dimension with respect to performance and gate count exceeding conventional Central Processing Units (CPU) by far. Many modern...
Robert Szerwinski, Tim Güneysu
CHES
2008
Springer
128views Cryptology» more  CHES 2008»
13 years 7 months ago
Hash Functions and RFID Tags: Mind the Gap
Abstract. The security challenges posed by RFID-tag deployments are wellknown. In response there is a rich literature on new cryptographic protocols and an on-tag hash function is ...
Andrey Bogdanov, Gregor Leander, Christof Paar, Ax...
CHES
2008
Springer
135views Cryptology» more  CHES 2008»
13 years 7 months ago
Multiple-Differential Side-Channel Collision Attacks on AES
In this paper, two efficient multiple-differential methods to detect collisions in the presence of strong noise are proposed - binary and ternary voting. After collisions have been...
Andrey Bogdanov