Sciweavers

CHES
2006
Springer
146views Cryptology» more  CHES 2006»
13 years 8 months ago
Path Swapping Method to Improve DPA Resistance of Quasi Delay Insensitive Asynchronous Circuits
This paper presents a Path Swapping (PS) method which enables to enhance the security of Quasi Delay Insensitive Asynchronous Circuits against Power Analysis (PA) attack. This appr...
G. Fraidy Bouesse, Gilles Sicard, Marc Renaudin
CHES
2006
Springer
111views Cryptology» more  CHES 2006»
13 years 8 months ago
Cache-Collision Timing Attacks Against AES
This paper describes several novel timing attacks against the common table-driven software implementation of the AES cipher. We define a general attack strategy using a simplified ...
Joseph Bonneau, Ilya Mironov
CHES
2006
Springer
81views Cryptology» more  CHES 2006»
13 years 8 months ago
Template Attacks in Principal Subspaces
Side-channel attacks are a serious threat to implementations of cryptographic algorithms. Secret information is recovered based on power consumption, electromagnetic emanations or ...
Cédric Archambeau, Eric Peeters, Fran&ccedi...
CHES
2006
Springer
84views Cryptology» more  CHES 2006»
13 years 8 months ago
Integer Factoring Utilizing PC Cluster
Kazumaro Aoki
CHES
2006
Springer
156views Cryptology» more  CHES 2006»
13 years 8 months ago
HIGHT: A New Block Cipher Suitable for Low-Resource Device
In this paper, we propose a new block cipher HIGHT with 64-bit block length and 128-bit key length. It provides low-resource hardware implementation, which is proper to ubiquitous ...
Deukjo Hong, Jaechul Sung, Seokhie Hong, Jongin Li...
CHES
2006
Springer
152views Cryptology» more  CHES 2006»
13 years 8 months ago
Security Evaluation of DPA Countermeasures Using Dual-Rail Pre-charge Logic Style
In recent years, some countermeasures against Differential Power Analysis (DPA) at the logic level have been proposed. At CHES 2005 conference, Popp and Mangard proposed a new coun...
Daisuke Suzuki, Minoru Saeki
CHES
2006
Springer
119views Cryptology» more  CHES 2006»
13 years 8 months ago
NanoCMOS-Molecular Realization of Rijndael
This paper describes the implementation of the Advanced Encryption Standard Algorithm, Rijndael, in a new nanoscale technology, called CMOL. This technology consists of an array of...
Massoud Masoumi, Farshid Raissi, Mahmoud Ahmadian
CHES
2006
Springer
105views Cryptology» more  CHES 2006»
13 years 8 months ago
Implementing Cryptographic Pairings on Smartcards
Abstract. Pairings on elliptic curves are fast coming of age as cryptographic primitives for deployment in new security applications, particularly in the context of implementations...
Michael Scott, Neil Costigan, Wesam Abdulwahab
CHES
2006
Springer
97views Cryptology» more  CHES 2006»
13 years 8 months ago
Challenges for Trusted Computing
Ahmad-Reza Sadeghi
CHES
2006
Springer
108views Cryptology» more  CHES 2006»
13 years 8 months ago
Superscalar Coprocessor for High-Speed Curve-Based Cryptography
Abstract. We propose a superscalar coprocessor for high-speed curvebased cryptography. It accelerates scalar multiplication by exploiting instruction-level parallelism (ILP) dynami...
Kazuo Sakiyama, Lejla Batina, Bart Preneel, Ingrid...