Sciweavers

1019 search results - page 8 / 204
» Cryptographic Design Vulnerabilities
Sort
View
107
Voted
SIGCOMM
2004
ACM
15 years 2 months ago
The design and implementation of a next generation name service for the internet
Name services are critical for mapping logical resource names to physical resources in large-scale distributed systems. The Domain Name System (DNS) used on the Internet, however,...
Venugopalan Ramasubramanian, Emin Gün Sirer
HOST
2008
IEEE
15 years 3 months ago
Place-and-Route Impact on the Security of DPL Designs in FPGAs
—Straightforward implementations of cryptographic algorithms are known to be vulnerable to attacks aimed not at the mathematical structure of the cipher but rather at the weak po...
Sylvain Guilley, Sumanta Chaudhuri, Jean-Luc Dange...
CHES
2009
Springer
121views Cryptology» more  CHES 2009»
15 years 10 months ago
A Design Methodology for a DPA-Resistant Cryptographic LSI with RSL Techniques
Minoru Saeki, Daisuke Suzuki, Koichi Shimizu, Akas...
VMCAI
2005
Springer
15 years 2 months ago
Cryptographic Protocol Analysis on Real C Code
Abstract. Implementations of cryptographic protocols, such as OpenSSL for example, contain bugs affecting security, which cannot be detected by just analyzing abstract protocols (e...
Jean Goubault-Larrecq, Fabrice Parrennes
DFT
2007
IEEE
101views VLSI» more  DFT 2007»
15 years 3 months ago
Power Attacks Resistance of Cryptographic S-Boxes with Added Error Detection Circuits
Many side-channel attacks on implementations of cryptographic algorithms have been developed in recent years demonstrating the ease of extracting the secret key. In response, vari...
Francesco Regazzoni, Thomas Eisenbarth, Johann Gro...