Sciweavers

32 search results - page 3 / 7
» ches 2009
Sort
View
CHES
2009
Springer
126views Cryptology» more  CHES 2009»
15 years 8 months ago
Practical Electromagnetic Template Attack on HMAC
In this paper, we show a very efficient side channel attack against HMAC. Our attack assumes the presence of a side channel that reveals the Hamming distance of some registers. Aft...
Pierre-Alain Fouque, Gaëtan Leurent, Denis R&...
60
Voted
CHES
2009
Springer
125views Cryptology» more  CHES 2009»
16 years 2 months ago
SSE Implementation of Multivariate PKCs on Modern x86 CPUs
Anna Inn-Tung Chen, Ming-Shing Chen, Tien-Ren Chen...
CHES
2009
Springer
137views Cryptology» more  CHES 2009»
16 years 2 months ago
Faster and Timing-Attack Resistant AES-GCM
We present a bitsliced implementation of AES encryption in counter mode for 64-bit Intel processors. Running at 7.59 cycles/byte on a Core 2, it is up to 25% faster than previous i...
Emilia Käsper, Peter Schwabe
CHES
2009
Springer
150views Cryptology» more  CHES 2009»
16 years 2 months ago
An Efficient Method for Random Delay Generation in Embedded Software
Random delays are a countermeasure against a range of side channel and fault attacks that is often implemented in embedded software. We propose a new method for generation of rando...
Ilya Kizhvatov, Jean-Sébastien Coron
CHES
2009
Springer
162views Cryptology» more  CHES 2009»
16 years 2 months ago
Programmable and Parallel ECC Coprocessor Architecture: Tradeoffs between Area, Speed and Security
Elliptic Curve Cryptography implementations are known to be vulnerable to various side-channel attacks and fault injection attacks, and many countermeasures have been proposed. How...
Xu Guo, Junfeng Fan, Patrick Schaumont, Ingrid Ver...