Sciweavers

SACRYPT
2015
Springer
9 years 11 months ago
Related-Key Attack on Full-Round PICARO
Side-channel cryptanalysis is a very efficient class of attacks that recovers secret information by exploiting the physical leakage of a device executing a cryptographic computatio...
Anne Canteaut, Virginie Lallemand, María Na...
84
Voted
SACRYPT
2015
Springer
9 years 11 months ago
ECC on Your Fingertips: A Single Instruction Approach for Lightweight ECC Design in GF(p)
Lightweight implementation of Elliptic Curve Cryptography on FPGA has been a popular research topic due to the boom of ubiquitous computing. In this paper we propose a novel single...
Debapriya Basu Roy, Poulami Das 0003, Debdeep Mukh...
SACRYPT
2015
Springer
9 years 11 months ago
Masking Large Keys in Hardware: A Masked Implementation of McEliece
Instantiations of the McEliece cryptosystem which are considered computationally secure even in a post-quantum era still require hardening against side channel attacks for practica...
Cong Chen, Thomas Eisenbarth, Ingo von Maurich, Ra...
SACRYPT
2015
Springer
9 years 11 months ago
Analysis of the CAESAR Candidate Silver
In this paper, we present the first third-party cryptanalysis against the authenticated encryption scheme Silver. In high-level, Silver builds a tweakable block cipher by tweaking...
Jérémy Jean, Yu Sasaki, Lei Wang 003...
SACRYPT
2015
Springer
9 years 11 months ago
Key-Recovery Attacks Against the MAC Algorithm Chaskey
Abstract. Chaskey is a Message Authentication Code (MAC) for 32bit microcontrollers proposed by Mouha et. al at SAC 2014. Its underlying blockcipher uses an Even-Mansour constructi...
Chrysanthi Mavromati