Sciweavers

32 search results - page 3 / 7
» ches 2009
Sort
View
CHES
2009
Springer
126views Cryptology» more  CHES 2009»
15 years 4 months ago
Practical Electromagnetic Template Attack on HMAC
In this paper, we show a very efficient side channel attack against HMAC. Our attack assumes the presence of a side channel that reveals the Hamming distance of some registers. Aft...
Pierre-Alain Fouque, Gaëtan Leurent, Denis R&...
CHES
2009
Springer
125views Cryptology» more  CHES 2009»
15 years 10 months ago
SSE Implementation of Multivariate PKCs on Modern x86 CPUs
Anna Inn-Tung Chen, Ming-Shing Chen, Tien-Ren Chen...
CHES
2009
Springer
137views Cryptology» more  CHES 2009»
15 years 10 months ago
Faster and Timing-Attack Resistant AES-GCM
We present a bitsliced implementation of AES encryption in counter mode for 64-bit Intel processors. Running at 7.59 cycles/byte on a Core 2, it is up to 25% faster than previous i...
Emilia Käsper, Peter Schwabe
CHES
2009
Springer
150views Cryptology» more  CHES 2009»
15 years 10 months ago
An Efficient Method for Random Delay Generation in Embedded Software
Random delays are a countermeasure against a range of side channel and fault attacks that is often implemented in embedded software. We propose a new method for generation of rando...
Ilya Kizhvatov, Jean-Sébastien Coron
CHES
2009
Springer
162views Cryptology» more  CHES 2009»
15 years 10 months ago
Programmable and Parallel ECC Coprocessor Architecture: Tradeoffs between Area, Speed and Security
Elliptic Curve Cryptography implementations are known to be vulnerable to various side-channel attacks and fault injection attacks, and many countermeasures have been proposed. How...
Xu Guo, Junfeng Fan, Patrick Schaumont, Ingrid Ver...