157
click to vote
CARDIS
15 years 10 months ago
2004 Springer
: We present two architectures for protecting a hardware implementation of AES against side-channel attacks known as Differential Fault Analysis attacks. The first architecture, wh...
137
Voted
CARDIS
15 years 10 months ago
2004 Springer
Smart card applications often handle privacy-sensitive information, and therefore must obey certain security policies. Typically, such policies are described as high-level security...
142
click to vote
CARDIS
15 years 10 months ago
2004 Springer
: One major challenge for digitally signing a document is the so called “what you see is what you sign” problem. XML as a meta language for encoding semistructured data offers ...
134
click to vote
CARDIS
15 years 10 months ago
2004 Springer
CMOS gates consume different amounts of power whether their output has a falling or a rising edge. Therefore the overall power consumption of a CMOS circuit leaks information about...
128
Voted
CARDIS
15 years 10 months ago
2004 Springer
More and more services provided by Internet pose a problem of privacy and anonymity. One cryptographic tool that could be used for solving this problem is the group signature [1, 5...
|