Side channel attack

Results: 129



#Item
91Kazuo / Cryptographic engineering / Morpho / Aoki / Kobe / Japanese language / Side channel attack / TPT

Microsoft Word - SPACES-IntermediateReportForWeb.doc

Add to Reading List

Source URL: www.jst.go.jp

Language: English - Date: 2013-09-02 03:42:08
92FIPS 140-2 / Cryptographic Module Validation Program / Power analysis / Side channel attack / RSA / Cryptography / Cryptography standards / Public-key cryptography

The Non-Invasive Attack Testing Workshop (NIAT 2011)

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2011-09-27 12:39:00
93Differential cryptanalysis / Advanced Encryption Standard / Lookup table / Information theory / Side channel attack / Py / Cryptography / Computing / Stream ciphers

1 On the Optimality of Differential Fault Analyses on CLEFIA ´ Juliane Kr¨amer, Anke St¨uber, Agnes

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-07-23 03:54:34
94Pseudorandom number generators / Secure communication / Cryptographic primitive / Cryptographic engineering / Cryptographically secure pseudorandom number generator / Transport Layer Security / Cryptographic hash function / Side channel attack / Man-in-the-middle attack / Cryptography / Cryptographic software / Cryptographic protocols

Why does cryptographic software fail? A case study and open problems David Lazar, Haogang Chen, Xi Wang, and Nickolai Zeldovich MIT CSAIL if ((err = SSLHashSHA1.update(...)) != 0)

Add to Reading List

Source URL: people.csail.mit.edu

Language: English
95Manufacturing / Joint Test Action Group / Boundary scan / Scan chain / Test compression / Automatic test pattern generation / Block cipher / Man-in-the-middle attack / Side channel attack / Electronic engineering / Electronics / Electronics manufacturing

IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTING Received 30 April 2013; revised 6 October 2013; accepted 22 December[removed]Date of publication 5 February 2014; date of current version 7 May 2014.

Add to Reading List

Source URL: www.computer.org

Language: English - Date: 2014-06-16 15:59:17
96Electrical circuits / Digital electronics / Synchronization / Asynchronous circuit / Clock signal / Quasi Delay Insensitive / Capacitor / Side channel attack / Asynchrony / Electronic engineering / Electronics / Electrical engineering

Microsoft Word - Formalizing and Improving DPA resistance DATE2005.doc

Add to Reading List

Source URL: www.ssi.gouv.fr

Language: English - Date: 2012-11-06 05:29:24
97Cryptographic engineering / Side channel attack / Science / Cryptographic primitive / Algorithmic Number Theory Symposium / Cryptography / Espionage / Workshop on Cryptographic Hardware and Embedded Systems

Workshop on Cryptographic Hardware and Embedded Systems (CHES[removed]sponsored by IACR www.chesworkshop.org

Add to Reading List

Source URL: www.chesworkshop.org

Language: English - Date: 2013-02-20 16:50:26
98CPU cache / Dynamic random-access memory / Synchronous dynamic random-access memory / Side channel attack / Microarchitecture / DIMM / CAS latency / Static random-access memory / SDRAM latency / Computer memory / Computer hardware / Computing

Suppressing the Oblivious RAM Timing Channel While Making Information Leakage and Program Efficiency Trade-offs Christopher W. Fletcher†∗, Ling Ren† , Xiangyao Yu† , Marten Van Dijk‡ , Omer Khan‡ , Srinivas D

Add to Reading List

Source URL: people.csail.mit.edu

Language: English - Date: 2014-01-23 18:47:27
99Cryptographic hash functions / Hashing / Espionage / Keccak / Power analysis / HMAC / Side channel attack / Skein / Error detection and correction / Cryptography / NIST hash function competition

SHA-3 Conference, March 2012, Side Channel Analysis of the SHA-3 Finalists Presentation

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-05-21 16:02:00
100Ubiquitous computing / KeeLoq / Radio-frequency identification / Power analysis / Side channel attack / MIFARE / NLFSR / Smart card / Rolling code / Cryptography / Espionage / Radio electronics

ECRYPT II   ICT[removed]ECRYPT II European Network of Excellence in Cryptology II

Add to Reading List

Source URL: www.ecrypt.eu.org

Language: English - Date: 2009-08-17 14:52:19
UPDATE