Sciweavers

CHES
2006
Springer
137views Cryptology» more  CHES 2006»
15 years 16 days ago
Provably Secure S-Box Implementation Based on Fourier Transform
Cryptographic algorithms implemented in embedded devices must withstand Side Channel Attacks such as the Differential Power Analysis (DPA). A common method of protecting symmetric ...
Emmanuel Prouff, Christophe Giraud, Sébasti...
CHES
2006
Springer
124views Cryptology» more  CHES 2006»
15 years 16 days ago
A Proposition for Correlation Power Analysis Enhancement
Cryptographic devices are vulnerable to the nowadays well known side channel leakage analysis. Secret data can be revealed by power analysis attacks such as Simple Power Analysis (...
Thanh-Ha Le, Jessy Clédière, C&eacut...
50
Voted
CHES
2006
Springer
86views Cryptology» more  CHES 2006»
15 years 16 days ago
Breaking Ciphers with COPACOBANA - A Cost-Optimized Parallel Code Breaker
Sandeep Kumar, Christof Paar, Jan Pelzl, Gerd Pfei...
98
Voted
CHES
2006
Springer
158views Cryptology» more  CHES 2006»
15 years 16 days ago
Hardware/Software Co-design of Elliptic Curve Cryptography on an 8051 Microcontroller
8-bit microcontrollers like the 8051 still hold a considerable share of the embedded systems market and dominate in the smart card industry. The performance of 8-bit microcontrolle...
Manuel Koschuch, Joachim Lechner, Andreas Weitzer,...
81
Voted
CHES
2006
Springer
87views Cryptology» more  CHES 2006»
15 years 16 days ago
Instruction Set Extensions for Efficient AES Implementation on 32-bit Processors
Stefan Tillich, Johann Großschädl
CHES
2006
Springer
75views Cryptology» more  CHES 2006»
15 years 16 days ago
Towards Security Limits in Side-Channel Attacks
François-Xavier Standaert, Eric Peeters, C&...
CHES
2006
Springer
179views Cryptology» more  CHES 2006»
15 years 16 days ago
Offline Hardware/Software Authentication for Reconfigurable Platforms
Abstract. Many Field-Programmable Gate Array (FPGA) based systems utilize third-party intellectual property (IP) in their development. When they are deployed in non-networked envir...
Eric Simpson, Patrick Schaumont
64
Voted
CHES
2006
Springer
188views Cryptology» more  CHES 2006»
15 years 16 days ago
A Generalized Method of Differential Fault Attack Against AES Cryptosystem
Abstract. In this paper we describe two differential fault attack techniques against Advanced Encryption Standard (AES). We propose two models for fault occurrence; we could find a...
Amir Moradi, Mohammad T. Manzuri Shalmani, Mahmoud...
CHES
2006
Springer
134views Cryptology» more  CHES 2006»
15 years 16 days ago
Read-Proof Hardware from Protective Coatings
In cryptography it is assumed that adversaries only have black box access to the secret keys of honest parties. In real life, however, the black box approach is not sufficient beca...
Pim Tuyls, Geert Jan Schrijen, Boris Skoric, Jan v...
71
Voted
CHES
2006
Springer
74views Cryptology» more  CHES 2006»
15 years 16 days ago
Optically Enhanced Position-Locked Power Analysis
Abstract. This paper introduces a refinement of the power-analysis attack on integrated circuits. By using a laser to illuminate a specific area on the chip surface, the current th...
Sergei P. Skorobogatov