Sciweavers

Share
CHES
2007
Springer
118views Cryptology» more  CHES 2007»
9 years 9 months ago
AES Encryption Implementation and Analysis on Commodity Graphics Processing Units
Graphics Processing Units (GPUs) present large potential performance gains within stream processing applications over the standard CPU. These performance gains are best realised wh...
Owen Harrison, John Waldron
CHES
2007
Springer
115views Cryptology» more  CHES 2007»
9 years 12 months ago
Highly Regular Right-to-Left Algorithms for Scalar Multiplication
This papers introduces several binary scalar multiplication algorithms with applications to cryptography. Remarkably, the proposed algorithms regularly repeat the same pattern when...
Marc Joye
CHES
2007
Springer
165views Cryptology» more  CHES 2007»
9 years 12 months ago
FPGA Intrinsic PUFs and Their Use for IP Protection
In recent years, IP protection of FPGA hardware designs has become a requirement for many IP vendors. In [34], Simpson and Schaumont proposed a fundamentally different approach to...
Jorge Guajardo, Sandeep S. Kumar, Geert Jan Schrij...
CHES
2007
Springer
157views Cryptology» more  CHES 2007»
9 years 12 months ago
A Hardware-Assisted Realtime Attack on A5/2 Without Precomputations
Abstract. A5/2 is a synchronous stream cipher that is used for protecting GSM communication. Recently, some powerful attacks [2,10] on A5/2 have been proposed. In this contribution...
Andrey Bogdanov, Thomas Eisenbarth, Andy Rupp
CHES
2007
Springer
106views Cryptology» more  CHES 2007»
9 years 12 months ago
Information Theoretic Evaluation of Side-Channel Resistant Logic Styles
François Macé, François-Xavie...
CHES
2007
Springer
111views Cryptology» more  CHES 2007»
9 years 12 months ago
TEC-Tree: A Low-Cost, Parallelizable Tree for Efficient Defense Against Memory Replay Attacks
Replay attacks are often the most costly attacks to thwart when dealing with off-chip memory integrity. With a trusted System-on-Chip, the existing countermeasures against replay r...
Reouven Elbaz, David Champagne, Ruby B. Lee, Lione...
CHES
2007
Springer
101views Cryptology» more  CHES 2007»
9 years 12 months ago
Power and EM Attacks on Passive 13.56 MHz RFID Devices
Michael Hutter, Stefan Mangard, Martin Feldhofer
CHES
2007
Springer
154views Cryptology» more  CHES 2007»
9 years 12 months ago
Multi-gigabit GCM-AES Architecture Optimized for FPGAs
Abstract. This paper presents a design-space exploration of the Galois/Counter Mode (GCM) algorithm with Advanced Encryption Standard (AES) as underlying block cipher for high thro...
Stefan Lemsitzer, Johannes Wolkerstorfer, Norbert ...
CHES
2007
Springer
327views Cryptology» more  CHES 2007»
9 years 12 months ago
On the Power of Bitslice Implementation on Intel Core2 Processor
Abstract. This paper discusses the state-of-the-art fast software implementation of block ciphers on Intel’s new microprocessor Core2, particularly concentrating on “bitslice i...
Mitsuru Matsui, Junko Nakajima
books