Sciweavers

210 search results - page 9 / 42
» Wiretap Channel With Side Information
Sort
View
PKC
2005
Springer
93views Cryptology» more  PKC 2005»
15 years 3 months ago
On the Optimization of Side-Channel Attacks by Advanced Stochastic Methods
Abstract. A number of papers on side-channel attacks have been published where the side-channel information was not exploited in an optimal manner, which reduced their efficiency. ...
Werner Schindler
AES
2004
Springer
190views Cryptology» more  AES 2004»
15 years 3 months ago
Small Size, Low Power, Side Channel-Immune AES Coprocessor: Design and Synthesis Results
Abstract. When cryptosystems are being used in real life, hardware and software implementations themselves present a fruitful field for attacks. Side channel attacks exploit infor...
Elena Trichina, Tymur Korkishko, Kyung-Hee Lee
IOLTS
2005
IEEE
120views Hardware» more  IOLTS 2005»
15 years 3 months ago
Side-Channel Issues for Designing Secure Hardware Implementations
Selecting a strong cryptographic algorithm makes no sense if the information leaks out of the device through sidechannels. Sensitive information, such as secret keys, can be obtai...
Lejla Batina, Nele Mentens, Ingrid Verbauwhede
ITNG
2006
IEEE
15 years 4 months ago
Side-Channel Leakage Tolerant Architectures
Side-channel attacks compare side-channel leakage predictions or estimations with side-channel leakage measurements. The estimations are based on the exact value of a few select s...
Kris Tiri, Patrick Schaumont, Ingrid Verbauwhede
CORR
2004
Springer
112views Education» more  CORR 2004»
14 years 10 months ago
Source Coding with Fixed Lag Side Information
We consider source coding with fixed lag side information at the decoder. We focus on the special case of perfect side information with unit lag corresponding to source coding wit...
Emin Martinian, Gregory W. Wornell