Sciweavers

623 search results - page 9 / 125
» Side-Channel Issues for Designing Secure Hardware Implementa...
Sort
View
CRYPTO
2010
Springer
170views Cryptology» more  CRYPTO 2010»
14 years 8 months ago
Securing Computation against Continuous Leakage
We present a general method to compile any cryptographic algorithm into one which resists side channel attacks of the only computation leaks information variety for an unbounded nu...
Shafi Goldwasser, Guy N. Rothblum
HOST
2009
IEEE
14 years 9 months ago
Experiences in Hardware Trojan Design and Implementation
Abstract-- We report our experiences in designing and implementing several hardware Trojans within the framework of the Embedded System Challenge competition that was held as part ...
Yier Jin, Nathan Kupp, Yiorgos Makris
CHES
2010
Springer
159views Cryptology» more  CHES 2010»
15 years 21 days ago
Provably Secure Higher-Order Masking of AES
Implementations of cryptographic algorithms are vulnerable to Side Channel Analysis (SCA). To counteract it, masking schemes are usually involved which randomize key-dependent data...
Matthieu Rivain, Emmanuel Prouff
SAMOS
2007
Springer
15 years 5 months ago
A Side-channel Attack Resistant Programmable PKC Coprocessor for Embedded Applications
—This paper describes the design of a programmable coprocessor for Public Key Cryptography (PKC) on an FPGA. The implementation provides a very broad range of functions together ...
Nele Mentens, Kazuo Sakiyama, Lejla Batina, Bart P...
ICPP
2000
IEEE
15 years 4 months ago
Issues in Designing and Implementing a Scalable Virtual Interface Architecture
The Virtual Interface Architecture brings the benefits of low latency User-level Networking to a cluster environment. With an increasing number of communication channels created ...
Shailabh Nagar, Anand Sivasubramaniam, Jorge Rodri...