Sciweavers

52 search results - page 2 / 11
» Side channel power analysis of an AES-256 bootloader
Sort
View
CODES
2007
IEEE
14 years 18 days ago
A smart random code injection to mask power analysis based side channel attacks
One of the security issues in embedded system is the ability of an adversary to perform side channel attacks. Power analysis attacks are often very successful, where the power seq...
Jude Angelo Ambrose, Roshan G. Ragel, Sri Paramesw...
TWC
2010
13 years 28 days ago
Joint channel estimation and resource allocation for MIMO systems-part II: multi-user and numerical analysis
This is the second part of a two-part paper on the joint channel estimation and resource allocation problem in MIMO systems with noisy channel estimation at the receiver side and p...
Alkan Soysal, Sennur Ulukus
AES
2004
Springer
190views Cryptology» more  AES 2004»
13 years 11 months ago
Small Size, Low Power, Side Channel-Immune AES Coprocessor: Design and Synthesis Results
Abstract. When cryptosystems are being used in real life, hardware and software implementations themselves present a fruitful field for attacks. Side channel attacks exploit infor...
Elena Trichina, Tymur Korkishko, Kyung-Hee Lee
CANS
2008
Springer
118views Cryptology» more  CANS 2008»
13 years 8 months ago
Workload Characterization of a Lightweight SSL Implementation Resistant to Side-Channel Attacks
Abstract. Ever-growing mobility and ubiquitous wireless Internet access raise the need for secure communication with devices that may be severely constrained in terms of processing...
Manuel Koschuch, Johann Großschädl, Udo...
ACNS
2009
Springer
150views Cryptology» more  ACNS 2009»
13 years 10 months ago
How to Compare Profiled Side-Channel Attacks?
Side-channel attacks are an important class of attacks against cryptographic devices and profiled side-channel attacks are the most powerful type of side-channel attacks. In this s...
François-Xavier Standaert, François ...