Sciweavers

4101 search results - page 1 / 821
» Differential Power Analysis
Sort
View
CHES
2000
Springer
121views Cryptology» more  CHES 2000»
13 years 10 months ago
On Boolean and Arithmetic Masking against Differential Power Analysis
Abstract. Since the announcement of the Differential Power Analysis (DPA) by Paul Kocher and al., several countermeasures were proposed in order to protect software implementations...
Jean-Sébastien Coron, Louis Goubin
DELTA
2008
IEEE
14 years 22 days ago
An Integrated Validation Environment for Differential Power Analysis
Integrated systems represent the most common solution for storage and transmission of confidential data. However, cryptographic devices can be subject to passive attacks that cons...
Giorgio Di Natale, Marie-Lise Flottes, Bruno Rouze...
DATE
2010
IEEE
132views Hardware» more  DATE 2010»
13 years 4 months ago
Differential Power Analysis enhancement with statistical preprocessing
—Differential Power Analysis (DPA) is a powerful Side-Channel Attack (SCA) targeting as well symmetric as asymmetric ciphers. Its principle is based on a statistical treatment of...
Victor Lomné, Amine Dehbaoui, Philippe Maur...
EIT
2008
IEEE
13 years 8 months ago
Experiments in attacking FPGA-based embedded systems using differential power analysis
Abstract--In the decade since the concept was publicly introduced, power analysis attacks on cryptographic systems have become an increasingly studied topic in the computer securit...
Song Sun, Zijun Yan, Joseph Zambreno
CARDIS
2004
Springer
149views Hardware» more  CARDIS 2004»
13 years 11 months ago
Differential Power Analysis Model and Some Results
CMOS gates consume different amounts of power whether their output has a falling or a rising edge. Therefore the overall power consumption of a CMOS circuit leaks information about...
Sylvain Guilley, Philippe Hoogvorst, Renaud Pacale...