Sciweavers

111 search results - page 6 / 23
» Correlation Power Analysis with a Leakage Model
Sort
View
CHES
2005
Springer
117views Cryptology» more  CHES 2005»
15 years 5 months ago
DPA Leakage Models for CMOS Logic Circuits
In this paper, we propose new models for directly evaluating DPA leakage from logic information in CMOS circuits. These models are based on the transition probability for each gate...
Daisuke Suzuki, Minoru Saeki, Tetsuya Ichikawa
ISLPED
2005
ACM
111views Hardware» more  ISLPED 2005»
15 years 5 months ago
Peak temperature control and leakage reduction during binding in high level synthesis
Temperature is becoming a first rate design criterion in ASICs due to its negative impact on leakage power, reliability, performance, and packaging cost. Incorporating awareness o...
Rajarshi Mukherjee, Seda Ogrenci Memik, Gokhan Mem...
IJISEC
2008
119views more  IJISEC 2008»
14 years 11 months ago
Estimating the maximum information leakage
Preventing improper information leaks is a greatest challenge of the modern society. In this paper we present a technique for measuring the ability of several families of adversari...
Alessandro Aldini, Alessandra Di Pierro
CORR
2008
Springer
133views Education» more  CORR 2008»
14 years 11 months ago
From Multi-Keyholes to Measure of Correlation and Power Imbalance in MIMO Channels: Outage Capacity Analysis
An information-theoretic analysis of a multi-keyhole channel, which includes a number of statistically independent keyholes with possibly different correlation matrices, is given. ...
George Levin, Sergey Loyka
114
Voted
ACNS
2009
Springer
150views Cryptology» more  ACNS 2009»
15 years 3 months ago
How to Compare Profiled Side-Channel Attacks?
Side-channel attacks are an important class of attacks against cryptographic devices and profiled side-channel attacks are the most powerful type of side-channel attacks. In this s...
François-Xavier Standaert, François ...