Sciweavers

111 search results - page 9 / 23
» Correlation Power Analysis with a Leakage Model
Sort
View
CHES
2006
Springer
81views Cryptology» more  CHES 2006»
15 years 3 months ago
Template Attacks in Principal Subspaces
Side-channel attacks are a serious threat to implementations of cryptographic algorithms. Secret information is recovered based on power consumption, electromagnetic emanations or ...
Cédric Archambeau, Eric Peeters, Fran&ccedi...
CHES
2009
Springer
157views Cryptology» more  CHES 2009»
16 years 6 days ago
Differential Cluster Analysis
Abstract. We propose a new technique called Differential Cluster Analysis for side-channel key recovery attacks. This technique uses cluster analysis to detect internal collisions ...
Lejla Batina, Benedikt Gierlichs, Kerstin Lemke-Ru...
ISLPED
1997
ACM
114views Hardware» more  ISLPED 1997»
15 years 3 months ago
Cycle-accurate macro-models for RT-level power analysis
 In this paper we present a methodology and techniques for generating cycle-accurate macro-models for RTlevel power analysis. The proposed macro-model predicts not only...
Qinru Qiu, Qing Wu, Massoud Pedram, Chih-Shun Ding
121
Voted
ISLPED
2007
ACM
169views Hardware» more  ISLPED 2007»
15 years 1 months ago
Throughput of multi-core processors under thermal constraints
We analyze the effect of thermal constraints on the performance and power of multi-core processors. We propose system-level power and thermal models, and derive expressions for (a...
Ravishankar Rao, Sarma B. K. Vrudhula, Chaitali Ch...
92
Voted
ISLPED
2006
ACM
83views Hardware» more  ISLPED 2006»
15 years 5 months ago
Considering process variations during system-level power analysis
Process variations will increasingly impact the operational characteristics of integrated circuits in nanoscale semiconductor technologies. Researchers have proposed various desig...
Saumya Chandra, Kanishka Lahiri, Anand Raghunathan...