Sciweavers

Share
warning: Creating default object from empty value in /var/www/modules/taxonomy/taxonomy.module on line 1416.
CHES
2010
Springer
182views Cryptology» more  CHES 2010»
10 years 4 months ago
Developing a Hardware Evaluation Method for SHA-3 Candidates
Luca Henzen, Pietro Gendotti, Patrice Guillet, Enr...
CHES
2010
Springer
142views Cryptology» more  CHES 2010»
10 years 4 months ago
New Results on Instruction Cache Attacks
Onur Aciiçmez, Billy Bob Brumley, Philipp G...
CHES
2010
Springer
183views Cryptology» more  CHES 2010»
10 years 4 months ago
Coordinate Blinding over Large Prime Fields
In this paper we propose a multiplicative blinding scheme for protecting implementations of a scalar multiplication over elliptic curves. Specifically, this blinding method applies...
Michael Tunstall, Marc Joye
CHES
2010
Springer
132views Cryptology» more  CHES 2010»
10 years 5 months ago
Fast Exhaustive Search for Polynomial Systems in F2
Charles Bouillaguet, Hsieh-Chung Chen, Chen-Mou Ch...
CHES
2010
Springer
187views Cryptology» more  CHES 2010»
10 years 5 months ago
Garbled Circuits for Leakage-Resilience: Hardware Implementation and Evaluation of One-Time Programs - (Full Version)
The power of side-channel leakage attacks on cryptographic implementations is evident. Today's practical defenses are typically attack-specific countermeasures against certain...
Kimmo Järvinen, Vladimir Kolesnikov, Ahmad-Re...
CHES
2010
Springer
210views Cryptology» more  CHES 2010»
10 years 5 months ago
Flash Memory 'Bumping' Attacks
This paper introduces a new class of optical fault injection attacks called bumping attacks. These attacks are aimed at data extraction from secure embedded memory, which usually s...
Sergei Skorobogatov
CHES
2010
Springer
166views Cryptology» more  CHES 2010»
10 years 5 months ago
Algebraic Side-Channel Analysis in the Presence of Errors
Measurement errors make power analysis attacks difficult to mount when only a single power trace is available: the statistical methods that make DPA attacks so successful are not a...
Yossef Oren, Mario Kirschbaum, Thomas Popp, Avisha...
CHES
2010
Springer
141views Cryptology» more  CHES 2010»
10 years 5 months ago
Fair and Comprehensive Methodology for Comparing Hardware Performance of Fourteen Round Two SHA-3 Candidates Using FPGAs
Performance in hardware has been demonstrated to be an important factor in the evaluation of candidates for cryptographic standards. Up to now, no consensus exists on how such an e...
Kris Gaj, Ekawat Homsirikamol, Marcin Rogawski
CHES
2010
Springer
175views Cryptology» more  CHES 2010»
10 years 5 months ago
Side-Channel Analysis of Six SHA-3 Candidates
Abstract. In this paper we study six 2nd round SHA-3 candidates from a side-channel cryptanalysis point of view. For each of them, we give the exact procedure and appropriate choic...
Olivier Benoît, Thomas Peyrin
CHES
2010
Springer
172views Cryptology» more  CHES 2010»
10 years 5 months ago
Analysis and Improvement of the Random Delay Countermeasure of CHES 2009
Random delays are often inserted in embedded software to protect against side-channel and fault attacks. At CHES 2009 a new method for generation of random delays was described tha...
Jean-Sébastien Coron, Ilya Kizhvatov
books