Sciweavers

CHES
2004
Springer
187views Cryptology» more  CHES 2004»
13 years 10 months ago
A New Attack with Side Channel Leakage During Exponent Recoding Computations
In this paper we propose a new side channel attack, where exponent recodings for public key cryptosystems such as RSA and ECDSA are considered. The known side channel attacks and c...
Yasuyuki Sakai, Kouichi Sakurai
CHES
2004
Springer
89views Cryptology» more  CHES 2004»
13 years 10 months ago
Low-Power Elliptic Curve Cryptography Using Scaled Modular Arithmetic
Erdinç Öztürk, Berk Sunar, Erkay ...
CHES
2004
Springer
130views Cryptology» more  CHES 2004»
13 years 10 months ago
Switching Blindings with a View Towards IDEA
Cryptographic algorithms implemented on smart-cards must be protected against side-channel attacks. Some encryption schemes and hash functions like IDEA, RC6, MD5, SHA-1 alternate ...
Olaf Neiße, Jürgen Pulkus
CHES
2004
Springer
182views Cryptology» more  CHES 2004»
13 years 10 months ago
Pipelined Computation of Scalar Multiplication in Elliptic Curve Cryptosystems
In the current work we propose a pipelining scheme for implementing Elliptic Curve Cryptosystems (ECC). The scalar multiplication is the dominant operation in ECC. It is computed b...
Pradeep Kumar Mishra
CHES
2004
Springer
136views Cryptology» more  CHES 2004»
13 years 10 months ago
Attacking DSA Under a Repeated Bits Assumption
We discuss how to recover the private key for DSA style signature schemes if partial information about the ephemeral keys is revealed. The partial information we examine is of a se...
Peter J. Leadbitter, Dan Page, Nigel P. Smart
CHES
2004
Springer
104views Cryptology» more  CHES 2004»
13 years 10 months ago
Public Key Authentication with One (Online) Single Addition
Marc Girault, David Lefranc
CHES
2004
Springer
99views Cryptology» more  CHES 2004»
13 years 10 months ago
Defeating Countermeasures Based on Randomized BSD Representations
Abstract. The recent development of side channel attacks has lead implementers to use increasingly sophisticated countermeasures in critical operations such as modular exponentiati...
Pierre-Alain Fouque, Frédéric Muller...
CHES
2004
Springer
170views Cryptology» more  CHES 2004»
13 years 10 months ago
Concurrent Error Detection Schemes for Involution Ciphers
Because of the rapidly shrinking dimensions in VLSI, transient and permanent faults arise and will continue to occur in the near future in increasing numbers. Since cryptographic c...
Nikhil Joshi, Kaijie Wu, Ramesh Karri
CHES
2004
Springer
96views Cryptology» more  CHES 2004»
13 years 10 months ago
How to Disembed a Program?
Benoît Chevallier-Mames, David Naccache, Pas...
CHES
2004
Springer
82views Cryptology» more  CHES 2004»
13 years 10 months ago
Fault Analysis of Stream Ciphers
Jonathan J. Hoch, Adi Shamir