Sciweavers

35 search results - page 4 / 7
» ae 2009
Sort
View
76
Voted
FDTC
2009
Springer
126views Cryptology» more  FDTC 2009»
15 years 5 months ago
WDDL is Protected against Setup Time Violation Attacks
—In order to protect crypto-systems against side channel attacks various countermeasures have been implemented such as dual-rail logic or masking. Faults attacks are a powerful t...
Nidhal Selmane, Shivam Bhasin, Sylvain Guilley, Ta...
AE
2009
Springer
15 years 2 days ago
Artificial Evolution for 3D PET Reconstruction
This paper presents a method to take advantage of artificial evolution in positron emission tomography reconstruction. This imaging technique produces datasets that correspond to t...
Franck Patrick Vidal, Delphine Lazaro-Ponthus, Sam...
80
Voted
ACSAC
2009
IEEE
15 years 5 months ago
Symmetric Cryptography in Javascript
—We take a systematic approach to developing a symmetric cryptography library in Javascript. We study various strategies for optimizing the code for the Javascript interpreter, a...
Emily Stark, Michael Hamburg, Dan Boneh
78
Voted
ASIACRYPT
2009
Springer
15 years 5 months ago
Rebound Attack on the Full Lane Compression Function
In this work, we apply the rebound attack to the AES based SHA-3 candidate Lane. The hash function Lane uses a permutation based compression function, consisting of a linear messag...
Krystian Matusiewicz, María Naya-Plasencia,...
84
Voted
CHES
2009
Springer
137views Cryptology» more  CHES 2009»
15 years 11 months ago
Faster and Timing-Attack Resistant AES-GCM
We present a bitsliced implementation of AES encryption in counter mode for 64-bit Intel processors. Running at 7.59 cycles/byte on a Core 2, it is up to 25% faster than previous i...
Emilia Käsper, Peter Schwabe