Sciweavers

20 search results - page 1 / 4
» Bitslice Ciphers and Power Analysis Attacks
Sort
View
FSE
2000
Springer
153views Cryptology» more  FSE 2000»
15 years 1 months ago
Bitslice Ciphers and Power Analysis Attacks
In this paper, we present techniques to protect bitslice block ciphers against power analysis attacks. We analyze and extend a technique proposed in [14]. We apply the technique to...
Joan Daemen, Michael Peeters, Gilles Van Assche
CHES
2007
Springer
327views Cryptology» more  CHES 2007»
15 years 3 months ago
On the Power of Bitslice Implementation on Intel Core2 Processor
Abstract. This paper discusses the state-of-the-art fast software implementation of block ciphers on Intel’s new microprocessor Core2, particularly concentrating on “bitslice i...
Mitsuru Matsui, Junko Nakajima
CASES
2010
ACM
14 years 7 months ago
A comprehensive analysis of performance and side-channel-leakage of AES SBOX implementations in embedded software
The Advanced Encryption Standard is used in almost every new embedded application that needs a symmetric-key cipher. In such embedded applications, high-performance as well as res...
Ambuj Sinha, Zhimin Chen, Patrick Schaumont
CTRSA
2007
Springer
153views Cryptology» more  CTRSA 2007»
15 years 1 months ago
Differential Power Analysis of Stream Ciphers
Side-channel attacks on block ciphers and public key algorithms have been discussed extensively. However, there is only sparse literature about side-cannel attacks on stream cipher...
Wieland Fischer, Berndt M. Gammel, O. Kniffler, J....
90
Voted
JDCTA
2010
175views more  JDCTA 2010»
14 years 4 months ago
Evolution Cipher against Differential Power Attack
: Differntial Power Attack (DPA) is one kind of Side Channel Attacks (SCAs). There are two phases in DPA attacks: sample collection and statistical analysis, which can be utilized ...
Shubo Liu, Ming Tang, Si Gao, Huanguo Zhang