Sciweavers

SACRYPT
2015
Springer
8 years 11 days ago
ECC on Your Fingertips: A Single Instruction Approach for Lightweight ECC Design in GF(p)
Lightweight implementation of Elliptic Curve Cryptography on FPGA has been a popular research topic due to the boom of ubiquitous computing. In this paper we propose a novel single...
Debapriya Basu Roy, Poulami Das 0003, Debdeep Mukh...
SACRYPT
2015
Springer
8 years 11 days ago
Masking Large Keys in Hardware: A Masked Implementation of McEliece
Instantiations of the McEliece cryptosystem which are considered computationally secure even in a post-quantum era still require hardening against side channel attacks for practica...
Cong Chen, Thomas Eisenbarth, Ingo von Maurich, Ra...
SACRYPT
2015
Springer
8 years 11 days ago
Analysis of the CAESAR Candidate Silver
In this paper, we present the first third-party cryptanalysis against the authenticated encryption scheme Silver. In high-level, Silver builds a tweakable block cipher by tweaking...
Jérémy Jean, Yu Sasaki, Lei Wang 003...
SACRYPT
2015
Springer
8 years 11 days ago
Key-Recovery Attacks Against the MAC Algorithm Chaskey
Abstract. Chaskey is a Message Authentication Code (MAC) for 32bit microcontrollers proposed by Mouha et. al at SAC 2014. Its underlying blockcipher uses an Even-Mansour constructi...
Chrysanthi Mavromati
SACRYPT
2015
Springer
8 years 11 days ago
Near Collision Side Channel Attacks
Side channel collision attacks are a powerful method to exploit side channel leakage. Otherwise than a few exceptions, collision attacks usually combine leakage from distinct point...
Baris Ege, Thomas Eisenbarth, Lejla Batina