Sciweavers

1019 search results - page 100 / 204
» Cryptographic Design Vulnerabilities
Sort
View
142
Voted
ISPASS
2008
IEEE
15 years 10 months ago
Metrics for Architecture-Level Lifetime Reliability Analysis
Abstract— This work concerns metrics for evaluating microarchitectural enhancements to improve processor lifetime reliability. A commonly reported reliability metric is mean time...
Pradeep Ramachandran, Sarita V. Adve, Pradip Bose,...
DELTA
2008
IEEE
15 years 10 months ago
An Integrated Validation Environment for Differential Power Analysis
Integrated systems represent the most common solution for storage and transmission of confidential data. However, cryptographic devices can be subject to passive attacks that cons...
Giorgio Di Natale, Marie-Lise Flottes, Bruno Rouze...
AINA
2007
IEEE
15 years 10 months ago
Random Oracle Instantiation in Distributed Protocols Using Trusted Platform Modules
The random oracle model is an idealized theoretical model that has been successfully used for designing many cryptographic algorithms and protocols. Unfortunately, a series of res...
Vandana Gunupudi, Stephen R. Tate
ISCAS
2006
IEEE
120views Hardware» more  ISCAS 2006»
15 years 10 months ago
Fast bit permutation unit for media enhanced microprocessors
— Bit and subword permutations are useful in many multimedia and cryptographic applications. New shift and permute instructions have been added to the instruction set of general-...
Giorgos Dimitrakopoulos, Christos Mavrokefalidis, ...
ACSAC
2005
IEEE
15 years 9 months ago
Fault Attacks on Dual-Rail Encoded Systems
Fault induction attacks are a serious concern for designers of secure embedded systems. An ideal solution would be a generic circuit transformation that would produce circuits tha...
Jason Waddle, David Wagner