Sciweavers

69 search results - page 3 / 14
» Fast Software AES Encryption
Sort
View
FC
2010
Springer
196views Cryptology» more  FC 2010»
15 years 1 months ago
Secure Multiparty AES
Abstract We propose several variants of a secure multiparty computation protocol for AES encryption. The best variant requires 2200 + 400 255 expected elementary operations in expe...
Ivan Damgård, Marcel Keller
101
Voted
ITCC
2005
IEEE
15 years 3 months ago
AES Power Attack Based on Induced Cache Miss and Countermeasure
This paper presents a new attack against a software implementation of the Advanced Encryption Standard. The attack aims at flushing elements of the SBOX from the cache, thus indu...
Guido Bertoni, Vittorio Zaccaria, Luca Breveglieri...
63
Voted
AES
2000
Springer
82views Cryptology» more  AES 2000»
15 years 1 months ago
Fast Implementations of AES Candidates
Of the five AES finalists four—MARS, RC6, Rijndael, Twofish— have not only (expected) good security but also exceptional performance on the PC platforms, especially on those...
Kazumaro Aoki, Helger Lipmaa
97
Voted
WISA
2004
Springer
15 years 2 months ago
Secure and Efficient AES Software Implementation for Smart Cards
In implementing cryptographic algorithms on limited devices such as smart cards, speed and memory optimization had always been a challenge. With the advent of side channel attacks,...
Elena Trichina, Lesya Korkishko
86
Voted
CTRSA
2006
Springer
146views Cryptology» more  CTRSA 2006»
15 years 1 months ago
Cache Attacks and Countermeasures: The Case of AES
We describe several software side-channel attacks based on inter-process leakage through the state of the CPU's memory cache. This leakage reveals memory access patterns, whic...
Dag Arne Osvik, Adi Shamir, Eran Tromer