×

Found 58 Documents (Results 1–58)

Evaluation and improvement of generic-emulating DPA attacks. (English) Zbl 1380.94129

Güneysu, Tim (ed.) et al., Cryptographic hardware and embedded systems – CHES 2015. 17th international workshop, Saint-Malo, France, September 13–16, 2015. Proceedings. Berlin: Springer (ISBN 978-3-662-48323-7/pbk; 978-3-662-48324-4/ebook). Lecture Notes in Computer Science 9293, 416-432 (2015).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Blind source separation from single measurements using singular spectrum analysis. (English) Zbl 1380.94017

Güneysu, Tim (ed.) et al., Cryptographic hardware and embedded systems – CHES 2015. 17th international workshop, Saint-Malo, France, September 13–16, 2015. Proceedings. Berlin: Springer (ISBN 978-3-662-48323-7/pbk; 978-3-662-48324-4/ebook). Lecture Notes in Computer Science 9293, 42-59 (2015).
MSC:  94A08
PDFBibTeX XMLCite
Full Text: DOI

ASCA, SASCA and DPA with enumeration: which one beats the other and when? (English) Zbl 1375.94130

Iwata, Tetsu (ed.) et al., Advances in cryptology – ASIACRYPT 2015. 21st international conference on the theory and application of cryptology and information security, Auckland, New Zealand, November 29 – December 3, 2015. Proceedings. Part II. Berlin: Springer (ISBN 978-3-662-48799-0/pbk; 978-3-662-48800-3/ebook). Lecture Notes in Computer Science 9453, 291-312 (2015).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Making masking security proofs concrete. (English) Zbl 1370.94508

Oswald, Elisabeth (ed.) et al., Advances in cryptology – EUROCRYPT 2015. 34th annual international conference on the theory and applications of cryptographic techniques, Sofia, Bulgaria, April 26–30, 2015. Proceedings. Part I. Berlin: Springer (ISBN 978-3-662-46799-2/pbk; 978-3-662-46800-5/ebook). Lecture Notes in Computer Science 9056, 401-429 (2015).
MSC:  94A62
PDFBibTeX XMLCite
Full Text: DOI Link

Simpler and more efficient rank estimation for side-channel security assessment. (English) Zbl 1367.94311

Leander, Gregor (ed.), Fast software encryption. 22nd international workshop, FSE 2015, Istanbul, Turkey, March 8–11, 2015. Revised selected papers. Berlin: Springer (ISBN 978-3-662-48115-8/pbk; 978-3-662-48116-5/ebook). Lecture Notes in Computer Science 9054, 117-129 (2015).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

LS-designs: bitslice encryption for efficient masked software implementations. (English) Zbl 1382.94111

Cid, Carlos (ed.) et al., Fast software encryption. 21st international workshop, FSE 2014, London, UK, March 3–5, 2014. Revised selected papers. Berlin: Springer (ISBN 978-3-662-46705-3/pbk; 978-3-662-46706-0/ebook). Lecture Notes in Computer Science 8540, 18-37 (2015).
MSC:  94A60 68P25
PDFBibTeX XMLCite
Full Text: DOI HAL

Support vector machines for improved IP detection with soft physical hash functions. (English) Zbl 1440.94054

Prouff, Emmanuel (ed.), Constructive side-channel analysis and secure design. 5th international workshop, COSADE 2014, Paris, France, April 13–15, 2014. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 8622, 112-128 (2014).
MSC:  94A60 68P25
PDFBibTeX XMLCite
Full Text: DOI

FPGA implementations of SPRING and their countermeasures against side-channel attacks. (English) Zbl 1396.94063

Batina, Lejla (ed.) et al., Cryptographic hardware and embedded systems – CHES 2014. 16th international workshop, Busan, South Korea, September 23–26, 2014. Proceedings. Berlin: Springer (ISBN 978-3-662-44708-6/pbk). Lecture Notes in Computer Science 8731, 414-432 (2014).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Soft analytical side-channel attacks. (English) Zbl 1306.94096

Sarkar, Palash (ed.) et al., Advances in cryptology – ASIACRYPT 2014. 20th international conference on the theory and application of cryptology and information security, Kaoshiung, Taiwan, R.O.C., December 7–11, 2014. Proceedings, Part I. Berlin: Springer (ISBN 978-3-662-45610-1/pbk). Lecture Notes in Computer Science 8873, 282-296 (2014).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Efficient masked S-boxes processing – a step forward. (English) Zbl 1288.94064

Pointcheval, David (ed.) et al., Progress in cryptology – AFRICACRYPT 2014. 7th international conference on cryptology in Africa, Marrakesh, Morocco, May 28–30, 2014. Proceedings. Berlin: Springer (ISBN 978-3-319-06733-9/pbk). Lecture Notes in Computer Science 8469, 251-266 (2014).
MSC:  94A60 68P25
PDFBibTeX XMLCite
Full Text: DOI

How to certify the leakage of a chip? (English) Zbl 1326.94088

Nguyen, Phong Q. (ed.) et al., Advances in cryptology – EUROCRYPT 2014. 33rd annual international conference on the theory and applications of cryptographic techniques, Copenhagen, Denmark, May 11–15, 2014. Proceedings. Berlin: Springer (ISBN 978-3-642-55219-9/pbk). Lecture Notes in Computer Science 8441, 459-476 (2014).
MSC:  94A60 68P25
PDFBibTeX XMLCite
Full Text: DOI

Hardware implementation and side-channel analysis of Lapin. (English) Zbl 1337.94096

Benaloh, Josh (ed.), Topics in cryptology – CT-RSA 2014. The cryptographer’s track at the RSA conference 2014, San Francisco, CA, USA, February 25–28, 2014. Proceedings. Berlin: Springer (ISBN 978-3-319-04851-2/pbk). Lecture Notes in Computer Science 8366, 206-226 (2014).
MSC:  94A62
PDFBibTeX XMLCite
Full Text: DOI HAL

The myth of generic DPA…and the magic of learning. (English) Zbl 1337.94080

Benaloh, Josh (ed.), Topics in cryptology – CT-RSA 2014. The cryptographer’s track at the RSA conference 2014, San Francisco, CA, USA, February 25–28, 2014. Proceedings. Berlin: Springer (ISBN 978-3-319-04851-2/pbk). Lecture Notes in Computer Science 8366, 183-205 (2014).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

An optimal key enumeration algorithm and its application to side-channel attacks. (English) Zbl 1327.94078

Knudsen, Lars R. (ed.) et al., Selected areas in cryptography. 19th international conference, SAC 2012, Windsor, Canada, August 15–16, 2012. Revised selected papers. Berlin: Springer (ISBN 978-3-642-35998-9/pbk; 978-3-642-35999-6/ebook). Lecture Notes in Computer Science 7707, 390-406 (2013).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Block ciphers that are easier to mask: how far can we go? (English) Zbl 1353.94048

Bertoni, Guido (ed.) et al., Cryptographic hardware and embedded systems – CHES 2013. 15th international workshop, Santa Barbara, CA, USA, August 20–23, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-40348-4/pbk). Lecture Notes in Computer Science 8086, 383-399 (2013).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI HAL

Leakage-resilient symmetric cryptography under empirically verifiable assumptions. (English) Zbl 1306.94090

Canetti, Ran (ed.) et al., Advances in cryptology – CRYPTO 2013. 33rd annual cryptology conference, Santa Barbara, CA, USA, August 18–22, 2013. Proceedings, Part I. Berlin: Springer (ISBN 978-3-642-40040-7/pbk). Lecture Notes in Computer Science 8042, 335-352 (2013).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Security evaluations beyond computing power. How to analyze side-channel attacks you cannot mount? (English) Zbl 1306.94095

Johansson, Thomas (ed.) et al., Advances in cryptology – EUROCRYPT 2013. 32nd annual international conference on the theory and applications of cryptographic techniques, Athens, Greece, May 26–30, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-38347-2/pbk). Lecture Notes in Computer Science 7881, 126-141 (2013).
MSC:  94A60 68P25
PDFBibTeX XMLCite
Full Text: DOI

Practical leakage-resilient pseudorandom objects with minimum public randomness. (English) Zbl 1312.94106

Dawson, Ed (ed.), Topics in cryptology – CT-RSA 2013. The cryptographers’ track at the RSA conference 2013, San Francisco, CA, USA, February 25–March 1, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-36094-7/pbk). Lecture Notes in Computer Science 7779, 223-238 (2013).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Shuffling against side-channel attacks: a comprehensive study with cautionary note. (English) Zbl 1292.94146

Wang, Xiaoyun (ed.) et al., Advances in cryptology – ASIACRYPT 2012. 18th international conference on the theory and application of cryptology and information security, Beijing, China, December 2–6, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-34960-7/pbk). Lecture Notes in Computer Science 7658, 740-757 (2012).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Towards Green cryptography: a comparison of lightweight ciphers from the energy viewpoint. (English) Zbl 1294.94055

Prouff, Emmanuel (ed.) et al., Cryptographic hardware and embedded systems - CHES 2012. 14th international workshop, Leuven, Belgium, September 9–12, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-33026-1/pbk). Lecture Notes in Computer Science 7428, 390-407 (2012).
MSC:  94A60 68P25
PDFBibTeX XMLCite
Full Text: DOI

Towards super-exponential side-channel security with efficient leakage-resilient PRFs. (English) Zbl 1366.94515

Prouff, Emmanuel (ed.) et al., Cryptographic hardware and embedded systems - CHES 2012. 14th international workshop, Leuven, Belgium, September 9–12, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-33026-1/pbk). Lecture Notes in Computer Science 7428, 193-212 (2012).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Unified and optimized linear collision attacks and their application in a non-profiled setting. (English) Zbl 1366.94496

Prouff, Emmanuel (ed.) et al., Cryptographic hardware and embedded systems - CHES 2012. 14th international workshop, Leuven, Belgium, September 9–12, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-33026-1/pbk). Lecture Notes in Computer Science 7428, 175-192 (2012).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Algebraic side-channel attacks beyond the Hamming weight leakage model. (English) Zbl 1366.94524

Prouff, Emmanuel (ed.) et al., Cryptographic hardware and embedded systems - CHES 2012. 14th international workshop, Leuven, Belgium, September 9–12, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-33026-1/pbk). Lecture Notes in Computer Science 7428, 140-154 (2012).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Exploring the feasibility of low cost fault injection attacks on sub-threshold devices through an example of a 65nm AES implementation. (English) Zbl 1436.94036

Juels, Ari (ed.) et al., RFID. Security and privacy. 7th international workshop, RFIDSec 2011, Amherst, USA, June 26–28, 2011. Revised selected papers. Berlin: Springer. Lect. Notes Comput. Sci. 7055, 48-60 (2012).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Compact implementation and performance evaluation of block ciphers in ATtiny devices. (English) Zbl 1304.94052

Mitrokotsa, Aikaterini (ed.) et al., Progress in cryptology – AFRICACRYPT 2012. 5th international conference on cryptology in Africa, Ifrane, Morocco, July 10–12, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-31409-4/pbk). Lecture Notes in Computer Science 7374, 172-187 (2012).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Key-alternating ciphers in a provable setting: encryption using a small number of public permutations. (Extended abstract). (English) Zbl 1290.94044

Pointcheval, David (ed.) et al., Advances in cryptology – EUROCRYPT 2012. 31st annual international conference on the theory and applications of cryptographic techniques, Cambridge, UK, April 15–19, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-29010-7/pbk). Lecture Notes in Computer Science 7237, 45-62 (2012).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Masking with randomized look up tables. Towards preventing side-channel attacks of all orders. (English) Zbl 1300.94094

Naccache, David (ed.), Cryptography and security: From theory to applications. Essays dedicated to Jean-Jacques Quisquater on the occasion of his 65th birthday. Berlin: Springer (ISBN 978-3-642-28367-3/pbk). Lecture Notes in Computer Science 6805, 283-299 (2012).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Experimenting linear cryptanalysis. (English) Zbl 1293.94060

Junod, Pascal (ed.) et al., Advanced linear cryptanalysis of block and stream ciphers. Amsterdam: IOS Press (ISBN 978-1-60750-843-4/hbk; 978-1-60750-844-1/ebook). Cryptology and Information Security Series 7, 1-28 (2011).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Generic side-channel distinguishers: improvements and limitations. (English) Zbl 1287.94102

Rogaway, Phillip (ed.), Advances in cryptology – CRYPTO 2011. 31st annual cryptology conference, Santa Barbara, CA, USA, August 14–18, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-22791-2/pbk). Lecture Notes in Computer Science 6841, 354-372 (2011).
MSC:  94A60 68P25
PDFBibTeX XMLCite
Full Text: DOI

Leftover hash lemma, revisited. (English) Zbl 1287.94047

Rogaway, Phillip (ed.), Advances in cryptology – CRYPTO 2011. 31st annual cryptology conference, Santa Barbara, CA, USA, August 14–18, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-22791-2/pbk). Lecture Notes in Computer Science 6841, 1-20 (2011).
MSC:  94A60 94A15 94A17
PDFBibTeX XMLCite
Full Text: DOI

FPGA implementation of a statistical saturation attack against PRESENT. (English) Zbl 1280.94075

Nitaj, Abderrahmane (ed.) et al., Progress in cryptology – AFRICACRYPT 2011. 4th international conference on cryptology in Africa, Dakar, Senegal, July 5–7, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-21968-9/pbk). Lecture Notes in Computer Science 6737, 100-116 (2011).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

A formal study of power variability issues and side-channel attacks for nanoscale devices. (English) Zbl 1281.94051

Paterson, Kenneth G. (ed.), Advances in cryptology – EUROCRYPT 2011. 30th annual international conference on the theory and applications of cryptographic techniques, Tallinn, Estonia, May 15–19, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-20464-7/pbk). Lecture Notes in Computer Science 6632, 109-128 (2011).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

The world is not enough: another look on second-order DPA. (English) Zbl 1290.94132

Abe, Masayuki (ed.), Advances in cryptology – ASIACRYPT 2010. 16th international conference on the theory and application of cryptology and information security, Singapore, December 5–9, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-17372-1/pbk). Lecture Notes in Computer Science 6477, 112-129 (2010).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Algebraic side-channel attacks. (English) Zbl 1281.94050

Bao, Feng (ed.) et al., Information security and cryptology. 5th international conference, Inscrypt 2009, Beijing, China, December 12-15, 2009. Revised selected papers. Berlin: Springer (ISBN 978-3-642-16341-8/pbk). Lecture Notes in Computer Science 6151, 393-410 (2010).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

How leaky is an extractor? (English) Zbl 1285.94098

Abdalla, Michel (ed.) et al., Progress in cryptology – LATINCRYPT 2010. First international conference on cryptology and information security in Latin America, Puebla, Mexico, August 8–11, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-14711-1/pbk). Lecture Notes in Computer Science 6212, 294-304 (2010).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Cryptographic hardware and embedded systems – CHES 2010. 12th international workshop, Santa Barbara, USA, August 17–20, 2010. Proceedings. (English) Zbl 1193.68012

Lecture Notes in Computer Science 6225. Berlin: Springer (ISBN 978-3-642-15030-2/pbk). xiii, 458 p. (2010).
PDFBibTeX XMLCite
Full Text: DOI

Adaptive chosen-message side-channel attacks. (English) Zbl 1315.94105

Zhou, Jianying (ed.) et al., Applied cryptography and network security. 8th international conference, ACNS 2010, Beijing, China, June 22–25, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-13707-5/pbk). Lecture Notes in Computer Science 6123, 186-199 (2010).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Multi-trail statistical saturation attacks. (English) Zbl 1315.94066

Zhou, Jianying (ed.) et al., Applied cryptography and network security. 8th international conference, ACNS 2010, Beijing, China, June 22–25, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-13707-5/pbk). Lecture Notes in Computer Science 6123, 123-138 (2010).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Fresh re-keying: security against side-channel and fault attacks for low-cost devices. (English) Zbl 1284.94095

Bernstein, Daniel J. (ed.) et al., Progress in cryptology – AFRICACRYPT 2010. Third international conference on cryptology in Africa, Stellenbosch, South Africa, May 3–6, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-12677-2/pbk). Lecture Notes in Computer Science 6055, 279-296 (2010).
MSC:  94A60 68W35
PDFBibTeX XMLCite
Full Text: DOI Link

Mutual information analysis: how, when and why? (English) Zbl 1290.94135

Clavier, Christophe (ed.) et al., Cryptographic hardware and embedded systems – CHES 2009. 11th international workshop Lausanne, Switzerland, September 6–9, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-04137-2/pbk). Lecture Notes in Computer Science 5747, 429-443 (2009).
MSC:  94A60 94A17
PDFBibTeX XMLCite
Full Text: DOI

A design flow and evaluation framework for DPA-resistant instruction set extensions. (English) Zbl 1290.94122

Clavier, Christophe (ed.) et al., Cryptographic hardware and embedded systems – CHES 2009. 11th international workshop Lausanne, Switzerland, September 6–9, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-04137-2/pbk). Lecture Notes in Computer Science 5747, 205-219 (2009).
MSC:  94A60 68P25
PDFBibTeX XMLCite
Full Text: DOI

Algebraic side-channel attacks on the AES: why time also matters in DPA. (English) Zbl 1290.94123

Clavier, Christophe (ed.) et al., Cryptographic hardware and embedded systems – CHES 2009. 11th international workshop Lausanne, Switzerland, September 6–9, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-04137-2/pbk). Lecture Notes in Computer Science 5747, 97-111 (2009).
MSC:  94A60 68P25
PDFBibTeX XMLCite
Full Text: DOI

How to compare profiled side-channel attacks? (English) Zbl 1284.94112

Abdalla, Michel (ed.) et al., Applied cryptography and network security. 7th international conference, ACNS 2009, Paris-Rocquencourt, France, June 2–5, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-01956-2/pbk). Lecture Notes in Computer Science 5536, 485-498 (2009).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

A unified framework for the analysis of side-channel key recovery attacks. (English) Zbl 1239.94066

Joux, Antoine (ed.), Advances in cryptology – EUROCRYPT 2009. 28th annual international conference on the theory and applications of cryptographic techniques, Cologne, Germany, April 26–30, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-01000-2/pbk). Lecture Notes in Computer Science 5479, 443-461 (2009).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

A statistical saturation attack against the block cipher PRESENT. (English) Zbl 1237.94056

Fischlin, Marc (ed.), Topics in cryptology – CT-RSA 2009. The cryptographers’ track at the RSA conference 2009, San Francisco, CA, USA, April 20–24, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-00861-0/pbk). Lecture Notes in Computer Science 5473, 195-210 (2009).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Improved and multiple linear cryptanalysis of reduced round Serpent. (English) Zbl 1166.94306

Pei, Dingyi (ed.) et al., Information security and cryptology. Third SKLOIS conference, Inscrypt 2007, Xining, China, August 31–September 5, 2007. Revised selected papers. Berlin: Springer (ISBN 978-3-540-79498-1/pbk). Lecture Notes in Computer Science 4990, 51-65 (2008).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Experiments on the multiple linear cryptanalysis of reduced round Serpent. (English) Zbl 1154.94385

Nyberg, Kaisa (ed.), Fast software encryption. 15th international workshop, FSE 2008, Lausanne, Switzerland, February 10–13, 2008. Revised selected papers. Berlin: Springer (ISBN 978-3-540-71038-7/pbk). Lecture Notes in Computer Science 5086, 382-397 (2008).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Implementation of the AES-128 on Virtex-5 FPGAs. (English) Zbl 1142.94335

Vaudenay, Serge (ed.), Progress in cryptology – AFRICACRYPT 2008. First international conference on cryptology in Africa, Casablanca, Morocco, June 11–14, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-68159-5/pbk). Lecture Notes in Computer Science 5023, 16-26 (2008).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Improving the time complexity of Matsui’s linear cryptanalysis. (English) Zbl 1337.94027

Nam, Kil-Hyun (ed.) et al., Information security and cryptology – ICISC 2007. 10th international conference, Seoul, Korea, November 29–30, 2007. Proceedings. Berlin: Springer (ISBN 978-3-540-76787-9/pbk). Lecture Notes in Computer Science 4817, 77-88 (2007).
MSC:  94A60 65T50
PDFBibTeX XMLCite
Full Text: DOI

SEA: a scalable encryption algorithm for small embedded applications. (English) Zbl 1333.94048

Domingo-Ferrer, Josep (ed.) et al., Smart card research and advanced applications. 7th IFIP WG 8.8/11.2 international conference, CARDIS 2006, Tarragona, Spain, April 19–21, 2006. Proceedings. Berlin: Springer (ISBN 978-3-540-33311-1/pbk; 978-3-540-33312-8/ebook). Lecture Notes in Computer Science 3928, 222-236 (2006).
MSC:  94A60 68P25
PDFBibTeX XMLCite
Full Text: DOI

A tutorial on physical security and side-channel attacks. (English) Zbl 1168.94510

Aldini, Alessandro (ed.) et al., Foundations of security analysis and design III. FOSAD 2004/2005 tutorial lectures. Berlin: Springer (ISBN 3-540-28955-0/pbk). Lecture Notes in Computer Science 3655, 78-108 (2005).
MSC:  94A60 94-01
PDFBibTeX XMLCite
Full Text: DOI

Power analysis of an FPGA. Implementation of Rijndael: is pipelining a DPA countermeasure? (English) Zbl 1104.68498

Joye, Marc (ed.) et al., Cryptographic hardware and embedded systems – CHES 2004. 6th international workshop, Cambridge, MA, USA, August 11–13, 2004. Proceedings. Berlin: Springer (ISBN 3-540-22666-4/pbk). Lecture Notes in Computer Science 3156, 30-44 (2004).
MSC:  68P25 94A60
PDFBibTeX XMLCite
Full Text: DOI

A time-memory tradeoff using distinguished points: New analysis & FPGA results. (English) Zbl 1020.94526

Kaliski, Burton S. jun. (ed.) et al., Cryptographic hardware and embedded systems - CHES 2002. 4th international workshop, Redwood Shores, CA, USA, August 13-15, 2002. Revised papers. Berlin: Springer. Lect. Notes Comput. Sci. 2523, 593-609 (2002).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: Link

An FPGA implementation of the linear cryptanalysis. (English) Zbl 1020.68734

Glesner, Manfred (ed.) et al., Field-programmable logic and applications. Reconfigurable computing is going mainstream. 12th international conference, FPL 2002, Montpellier, France, September 2-4, 2002. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 2438, 845-852 (2002).
MSC:  68U99 94C10 94A60
PDFBibTeX XMLCite
Full Text: Link

A cryptanalytic time-memory tradeoff: First FPGA implementation. (English) Zbl 1020.68853

Glesner, Manfred (ed.) et al., Field-programmable logic and applications. Reconfigurable computing is going mainstream. 12th international conference, FPL 2002, Montpellier, France, September 2-4, 2002. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 2438, 780-789 (2002).
MSC:  68U99 94C10 94A60
PDFBibTeX XMLCite
Full Text: Link

Filter Results by …

Document Type

all top 5

Author

all top 5

Year of Publication

all top 3

Main Field

all top 3

Software