161
click to vote
CARDIS
15 years 10 months ago
2004 Springer
: We present two architectures for protecting a hardware implementation of AES against side-channel attacks known as Differential Fault Analysis attacks. The first architecture, wh...
152
click to vote
CARDIS
15 years 10 months ago
2004 Springer
Considering the typical amount of memory available on a smart card, it is essential to minimize the size of the runtime environment to leave as much memory as possible to applicati...
149
click to vote
CARDIS
15 years 10 months ago
2004 Springer
: One major challenge for digitally signing a document is the so called “what you see is what you sign” problem. XML as a meta language for encoding semistructured data offers ...
146
click to vote
CARDIS
15 years 10 months ago
2004 Springer
Smart card applications often handle privacy-sensitive information, and therefore must obey certain security policies. Typically, such policies are described as high-level security...
143
Voted
CARDIS
15 years 10 months ago
2004 Springer
CMOS gates consume different amounts of power whether their output has a falling or a rising edge. Therefore the overall power consumption of a CMOS circuit leaks information about...
|