Sciweavers

CHES
2004
Springer
230views Cryptology» more  CHES 2004»
13 years 10 months ago
Correlation Power Analysis with a Leakage Model
Abstract. A classical model is used for the power consumption of cryptographic devices. It is based on the Hamming distance of the data handled with regard to an unknown but consta...
Eric Brier, Christophe Clavier, Francis Olivier
CHES
2004
Springer
128views Cryptology» more  CHES 2004»
13 years 10 months ago
Long Modular Multiplication for Cryptographic Applications
Abstract. A digit-serial, multiplier-accumulator based cryptographic coprocessor architecture is proposed, similar to fix-point DSP's with enhancements, supporting long modula...
Laszlo Hars
CHES
2004
Springer
126views Cryptology» more  CHES 2004»
13 years 10 months ago
Leak Resistant Arithmetic
In this paper we show how the usage of Residue Number Systems (RNS) can easily be turned into a natural defense against many side-channel attacks (SCA). We introduce a Leak Resista...
Jean-Claude Bajard, Laurent Imbert, Pierre-Yvan Li...
CHES
2004
Springer
167views Cryptology» more  CHES 2004»
13 years 10 months ago
Comparing Elliptic Curve Cryptography and RSA on 8-bit CPUs
Strong public-key cryptography is often considered to be too computationally expensive for small devices if not accelerated by cryptographic hardware. We revisited this statement a...
Nils Gura, Arun Patel, Arvinderpal Wander, Hans Eb...
CHES
2004
Springer
148views Cryptology» more  CHES 2004»
13 years 10 months ago
Aspects of Hyperelliptic Curves over Large Prime Fields in Software Implementations
We present an implementation of elliptic curves and of hyperelliptic curves of genus 2 and 3 over prime fields. To achieve a fair comparison between the different types of groups,...
Roberto Maria Avanzi
CHES
2004
Springer
155views Cryptology» more  CHES 2004»
13 years 10 months ago
A Low-Cost ECC Coprocessor for Smartcards
Abstract. In this article we present a low-cost coprocessor for smartcards which supports all necessary mathematical operations for a fast calculation of the Elliptic Curve Digital...
Harald Aigner, Holger Bock, Markus Hütter, Jo...
AES
2004
Springer
190views Cryptology» more  AES 2004»
13 years 10 months ago
Small Size, Low Power, Side Channel-Immune AES Coprocessor: Design and Synthesis Results
Abstract. When cryptosystems are being used in real life, hardware and software implementations themselves present a fruitful field for attacks. Side channel attacks exploit infor...
Elena Trichina, Tymur Korkishko, Kyung-Hee Lee
AES
2004
Springer
102views Cryptology» more  AES 2004»
13 years 10 months ago
A Three Rounds Property of the AES
Rijndael is the new Advanced Encryption Standard designed by V. Rijmen and J. Daemen and chosen as AES by the NIST in October 2000. Surprisingly, the number of cryptanalyses agains...
Marine Minier
AES
2004
Springer
142views Cryptology» more  AES 2004»
13 years 10 months ago
Complementation-Like and Cyclic Properties of AES Round Functions
Abstract. While it is known previously that the cycle lengths of individual components of the AES round function are very small, we demonstrate here that the cycle length of the S-...
Tri Van Le, Rüdiger Sparr, Ralph Wernsdorf, Y...