110
click to vote
CHES
15 years 5 months ago
2004 Springer
Abstract. A classical model is used for the power consumption of cryptographic devices. It is based on the Hamming distance of the data handled with regard to an unknown but consta...
88
Voted
CHES
15 years 5 months ago
2004 Springer 111
Voted
CHES
15 years 4 months ago
2004 Springer
In the execution on a smart card, side channel attacks such as simple power analysis (SPA) and the differential power analysis (DPA) have become serious threat [15]. Side channel a...
102
Voted
CHES
15 years 5 months ago
2004 Springer
In this paper we propose a new side channel attack, where exponent recodings for public key cryptosystems such as RSA and ECDSA are considered. The known side channel attacks and c...
96
Voted
CHES
15 years 5 months ago
2004 Springer
In the current work we propose a pipelining scheme for implementing Elliptic Curve Cryptosystems (ECC). The scalar multiplication is the dominant operation in ECC. It is computed b...
|