Sciweavers

CHES
2010
Springer
141views Cryptology» more  CHES 2010»
13 years 5 months ago
When Failure Analysis Meets Side-Channel Attacks
Jerome Di-Battista, Jean-Christophe Courrèg...
CHES
2010
Springer
193views Cryptology» more  CHES 2010»
13 years 5 months ago
New High Entropy Element for FPGA Based True Random Number Generators
Michal Varchola, Milos Drutarovsky
CHES
2010
Springer
147views Cryptology» more  CHES 2010»
13 years 5 months ago
256 Bit Standardized Crypto for 650 GE - GOST Revisited
Axel Poschmann, San Ling, Huaxiong Wang
CHES
2010
Springer
214views Cryptology» more  CHES 2010»
13 years 5 months ago
Correlation-Enhanced Power Analysis Collision Attack
Side-channel based collision attacks are a mostly disregarded alternative to DPA for analyzing unprotected implementations. The advent of strong countermeasures, such as masking, h...
Amir Moradi, Oliver Mischke, Thomas Eisenbarth
CHES
2010
Springer
132views Cryptology» more  CHES 2010»
13 years 5 months ago
Efficient Techniques for High-Speed Elliptic Curve Cryptography
In this paper, a thorough bottom-up optimization process (field, point and scalar arithmetic) is used to speed up the computation of elliptic curve point multiplication and report ...
Patrick Longa, Catherine H. Gebotys
CHES
2010
Springer
244views Cryptology» more  CHES 2010»
13 years 5 months ago
Public Key Perturbation of Randomized RSA Implementations
Alexandre Berzati, Cécile Canovas-Dumas, Lo...
CHES
2010
Springer
133views Cryptology» more  CHES 2010»
13 years 5 months ago
ARMADILLO: A Multi-purpose Cryptographic Primitive Dedicated to Hardware
This paper describes and analyzes the security of a general-purpose cryptographic function design, with application in RFID tags and sensor networks. Based on these analyzes, we su...
Stéphane Badel, Nilay Dagtekin, Jorge Nakah...
CHES
2010
Springer
159views Cryptology» more  CHES 2010»
13 years 5 months ago
Provably Secure Higher-Order Masking of AES
Implementations of cryptographic algorithms are vulnerable to Side Channel Analysis (SCA). To counteract it, masking schemes are usually involved which randomize key-dependent data...
Matthieu Rivain, Emmanuel Prouff
CHES
2010
Springer
534views Cryptology» more  CHES 2010»
13 years 5 months ago
PRINTcipher: A Block Cipher for IC-Printing
Lars R. Knudsen, Gregor Leander, Axel Poschmann, M...