Sciweavers

52 search results - page 10 / 11
» Side channel power analysis of an AES-256 bootloader
Sort
View
ITNG
2007
IEEE
14 years 18 days ago
SPA resistant Elliptic Curve Cryptosystem using Addition Chains
: There has been a lot of interest in recent years in the problems faced by cryptosystems due to side channel attacks. Algorithms for elliptic curve point scalar multiplication suc...
Andrew Byrne, Nicolas Meloni, Francis M. Crowe, Wi...
IMA
2005
Springer
127views Cryptology» more  IMA 2005»
13 years 11 months ago
On the Automatic Construction of Indistinguishable Operations
Abstract. An increasingly important design constraint for software running on ubiquitous computing devices is security, particularly against physical methods such as side-channel a...
Manuel Barbosa, Dan Page
ASIACRYPT
2008
Springer
13 years 8 months ago
Twisted Edwards Curves Revisited
This paper introduces fast algorithms for performing group operations on twisted Edwards curves, pushing the recent speed limits of Elliptic Curve Cryptography (ECC) forward in a ...
Hüseyin Hisil, Kenneth Koon-Ho Wong, Gary Car...
CHES
2009
Springer
265views Cryptology» more  CHES 2009»
14 years 6 months ago
Higher-Order Masking and Shuffling for Software Implementations of Block Ciphers
Differential Power Analysis (DPA) is a powerful side channel key recovery attack that efficiently breaks block ciphers implementations. In software, two main techniques are usually...
Matthieu Rivain, Emmanuel Prouff, Julien Doget
VTC
2006
IEEE
14 years 10 days ago
Soft Detection with Linear Precoding for Spatial Multiplexing Systems
— We present a precoded reduced-complexity soft detection (PRCSD) algorithm for spatial multiplexing systems. The linear operations at both transmit and receive sides based on co...
Yong Li, Jaekyun Moon