Sciweavers

8 search results - page 2 / 2
» Power consumption profile analysis for security attack simul...
Sort
View
ICCD
2008
IEEE
142views Hardware» more  ICCD 2008»
14 years 3 months ago
Making register file resistant to power analysis attacks
— Power analysis attacks are a type of side-channel attacks that exploits the power consumption of computing devices to retrieve secret information. They are very effective in br...
Shuo Wang, Fan Zhang, Jianwei Dai, Lei Wang, Zhiji...
DATE
2003
IEEE
65views Hardware» more  DATE 2003»
13 years 11 months ago
Masking the Energy Behavior of DES Encryption
Smart cards are vulnerable to both invasive and non-invasive attacks. Specifically, non-invasive attacks using power and timing measurements to extract the cryptographic key has d...
Hendra Saputra, Narayanan Vijaykrishnan, Mahmut T....
FPL
2003
Springer
114views Hardware» more  FPL 2003»
13 years 11 months ago
Power Analysis of FPGAs: How Practical is the Attack?
Recent developments in information technologies made the secure transmission of digital data a critical design point. Large data flows have to be exchanged securely and involve en...
François-Xavier Standaert, Loïc van Ol...