Sciweavers

11 search results - page 1 / 3
» Side Channel Attacks on Irregularly Decimated Generators
Sort
View
104
Voted
ICISC
2007
117views Cryptology» more  ICISC 2007»
14 years 11 months ago
Side Channel Attacks on Irregularly Decimated Generators
Abstract. We investigate three side channel attacks on ABSG, a variant of irregularly decimated generators (IDG). The three attacks are timing analysis, phase-shift fault analysis ...
Chuan-Wen Loe, Khoongming Khoo
60
Voted
CHES
2009
Springer
158views Cryptology» more  CHES 2009»
15 years 10 months ago
A New Side-Channel Attack on RSA Prime Generation
Thomas Finke, Max Gebhardt, Werner Schindler
99
Voted
ACNS
2003
Springer
147views Cryptology» more  ACNS 2003»
15 years 3 months ago
Side-Channel Attack on Substitution Blocks
1 We describe a side-channel attack on a substitution block, which is usually implemented as a table lookup operation. In particular, we have investigated smartcard implementations...
Roman Novak
SBCCI
2005
ACM
136views VLSI» more  SBCCI 2005»
15 years 3 months ago
Current mask generation: a transistor level security against DPA attacks
The physical implementation of cryptographic algorithms may leak to some attacker security information by the side channel data, as power consumption, timing, temperature or elect...
Daniel Mesquita, Jean-Denis Techer, Lionel Torres,...
98
Voted
CHES
2009
Springer
150views Cryptology» more  CHES 2009»
15 years 10 months ago
An Efficient Method for Random Delay Generation in Embedded Software
Random delays are a countermeasure against a range of side channel and fault attacks that is often implemented in embedded software. We propose a new method for generation of rando...
Ilya Kizhvatov, Jean-Sébastien Coron