CHES
15 years 2 months ago
2005 Springer
Data remanence is the residual physical representation of data that has been erased or overwritten. In non-volatile programmable devices, such as UV EPROM, EEPROM or Flash, bits ar...
127
click to vote
CHES
15 years 2 months ago
2005 Springer
Abstract. In this paper, the evaluation of random bit generators for security applications is discussed and the concept of stateless generator is introduced. It is shown how, for t...
CHES
15 years 2 months ago
2005 Springer
A key step in the Advanced Encryption Standard (AES) algorithm is the “S-box.” Many implementations of AES have been proposed, for various goals, that effect the S-box in vari...
CHES
2005 Springer Scalable Hardware for Sparse Systems of Linear Equations, with Applications to Integer Factorization
15 years 2 months ago
Motivated by the goal of factoring large integers using the Number Field Sieve, several special-purpose hardware designs have been recently proposed for solving large sparse system...
CHES
15 years 2 months ago
2005 Springer
Embedded devices implementing cryptographic services are the result of a trade-off between cost, performance and security. Aside from flaws in the protocols and the algorithms us...
|