Sciweavers

44
Voted
CHES
2010
Springer
119views Cryptology» more  CHES 2010»
14 years 10 months ago
Performance Analysis of the SHA-3 Candidates on Exotic Multi-core Architectures
Joppe W. Bos, Deian Stefan
40
Voted
CHES
2010
Springer
141views Cryptology» more  CHES 2010»
14 years 10 months ago
When Failure Analysis Meets Side-Channel Attacks
Jerome Di-Battista, Jean-Christophe Courrèg...
78
Voted
CHES
2010
Springer
193views Cryptology» more  CHES 2010»
14 years 10 months ago
New High Entropy Element for FPGA Based True Random Number Generators
Michal Varchola, Milos Drutarovsky
54
Voted
CHES
2010
Springer
147views Cryptology» more  CHES 2010»
14 years 10 months ago
256 Bit Standardized Crypto for 650 GE - GOST Revisited
Axel Poschmann, San Ling, Huaxiong Wang
65
Voted
CHES
2010
Springer
214views Cryptology» more  CHES 2010»
14 years 10 months ago
Correlation-Enhanced Power Analysis Collision Attack
Side-channel based collision attacks are a mostly disregarded alternative to DPA for analyzing unprotected implementations. The advent of strong countermeasures, such as masking, h...
Amir Moradi, Oliver Mischke, Thomas Eisenbarth
74
Voted
CHES
2010
Springer
132views Cryptology» more  CHES 2010»
14 years 10 months ago
Efficient Techniques for High-Speed Elliptic Curve Cryptography
In this paper, a thorough bottom-up optimization process (field, point and scalar arithmetic) is used to speed up the computation of elliptic curve point multiplication and report ...
Patrick Longa, Catherine H. Gebotys
55
Voted
CHES
2010
Springer
244views Cryptology» more  CHES 2010»
14 years 10 months ago
Public Key Perturbation of Randomized RSA Implementations
Alexandre Berzati, Cécile Canovas-Dumas, Lo...
71
Voted
CHES
2010
Springer
133views Cryptology» more  CHES 2010»
14 years 10 months ago
ARMADILLO: A Multi-purpose Cryptographic Primitive Dedicated to Hardware
This paper describes and analyzes the security of a general-purpose cryptographic function design, with application in RFID tags and sensor networks. Based on these analyzes, we su...
Stéphane Badel, Nilay Dagtekin, Jorge Nakah...
83
Voted
CHES
2010
Springer
159views Cryptology» more  CHES 2010»
14 years 10 months ago
Provably Secure Higher-Order Masking of AES
Implementations of cryptographic algorithms are vulnerable to Side Channel Analysis (SCA). To counteract it, masking schemes are usually involved which randomize key-dependent data...
Matthieu Rivain, Emmanuel Prouff
74
Voted
CHES
2010
Springer
534views Cryptology» more  CHES 2010»
14 years 10 months ago
PRINTcipher: A Block Cipher for IC-Printing
Lars R. Knudsen, Gregor Leander, Axel Poschmann, M...