Sciweavers

139
Voted
CHES
2000
Springer
97views Cryptology» more  CHES 2000»
15 years 7 months ago
Software-Hardware Trade-Offs: Application to A5/1 Cryptanalysis
This paper shows how a well-balanced trade-off between a generic workstation and dumb but fast reconfigurable hardware can lead to a more efficient implementation of a cryptanalysi...
Thomas Pornin, Jacques Stern
126
Voted
CHES
2000
Springer
114views Cryptology» more  CHES 2000»
15 years 7 months ago
Efficient Generation of Prime Numbers
The generation of prime numbers underlies the use of most public-key schemes, essentially as a major primitive needed for the creation of key pairs or as a computation stage appear...
Marc Joye, Pascal Paillier, Serge Vaudenay
110
Voted
CHES
2000
Springer
121views Cryptology» more  CHES 2000»
15 years 7 months ago
On Boolean and Arithmetic Masking against Differential Power Analysis
Abstract. Since the announcement of the Differential Power Analysis (DPA) by Paul Kocher and al., several countermeasures were proposed in order to protect software implementations...
Jean-Sébastien Coron, Louis Goubin
134
Voted
CHES
2000
Springer
135views Cryptology» more  CHES 2000»
15 years 7 months ago
Differential Power Analysis in the Presence of Hardware Countermeasures
Abstract. The silicon industry has lately been focusing on side channel attacks, that is attacks that exploit information that leaks from the physical devices. Although different c...
Christophe Clavier, Jean-Sébastien Coron, N...
170
Voted
CGI
2000
IEEE
15 years 7 months ago
Local and Global Geometric Methods for Analysis Interrogation, Reconstruction, Modification and Design of Shape
This paper gives an overview of some recent methods useful for local and global shape analysis and for the design of solids. These methods include as new tools for global and loca...
Franz-Erich Wolter, K.-I. Friese