Sciweavers

CHES
2006
Springer
75views Cryptology» more  CHES 2006»
15 years 7 months ago
Towards Security Limits in Side-Channel Attacks
François-Xavier Standaert, Eric Peeters, C&...
139
Voted
CHES
2006
Springer
179views Cryptology» more  CHES 2006»
15 years 7 months ago
Offline Hardware/Software Authentication for Reconfigurable Platforms
Abstract. Many Field-Programmable Gate Array (FPGA) based systems utilize third-party intellectual property (IP) in their development. When they are deployed in non-networked envir...
Eric Simpson, Patrick Schaumont
130
Voted
ECAI
2004
Springer
15 years 7 months ago
Knowledge-Based Cinematography and Its Applications
Automated control of a virtual camera is useful for both linear animation and interactive virtual environments. We have constructed a knowledge-based system that allows users to e...
Doron A. Friedman, Yishai A. Feldman
CHES
2006
Springer
188views Cryptology» more  CHES 2006»
15 years 7 months ago
A Generalized Method of Differential Fault Attack Against AES Cryptosystem
Abstract. In this paper we describe two differential fault attack techniques against Advanced Encryption Standard (AES). We propose two models for fault occurrence; we could find a...
Amir Moradi, Mohammad T. Manzuri Shalmani, Mahmoud...
142
Voted
CHES
2006
Springer
134views Cryptology» more  CHES 2006»
15 years 7 months ago
Read-Proof Hardware from Protective Coatings
In cryptography it is assumed that adversaries only have black box access to the secret keys of honest parties. In real life, however, the black box approach is not sufficient beca...
Pim Tuyls, Geert Jan Schrijen, Boris Skoric, Jan v...