Side-channel attack

Results: 129



#Item
51Efficient Cache Attacks on AES, and Countermeasures Eran Tromer1 2 , Dag Arne Osvik3 and Adi Shamir2 1 Computer Science and Artificial Intelligence Laboratory, Massachusetts Institute of Technology,

Efficient Cache Attacks on AES, and Countermeasures Eran Tromer1 2 , Dag Arne Osvik3 and Adi Shamir2 1 Computer Science and Artificial Intelligence Laboratory, Massachusetts Institute of Technology,

Add to Reading List

Source URL: www.cs.tau.ac.il

Language: English - Date: 2009-06-25 15:56:23
52On Continuous After-the-Fact Leakage-Resilient Key Exchange  ∗ Mohsen Toorani Department of Informatics

On Continuous After-the-Fact Leakage-Resilient Key Exchange ∗ Mohsen Toorani Department of Informatics

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-12-20 20:07:33
53SCA1 Model: Towards a concrete security approach to the design of cryptosystems secure against side-channel attacks1,2 Filipe Rosado da-Fonseca Lisbon, Portugal Email:

SCA1 Model: Towards a concrete security approach to the design of cryptosystems secure against side-channel attacks1,2 Filipe Rosado da-Fonseca Lisbon, Portugal Email:

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2004-12-23 06:54:05
54Improving the Rules of the DPA Contest Fran¸cois-Xavier Standaert⋆ , Philippe Bulens, Giacomo de Meulenaer, Nicolas Veyrat-Charvillon UCL Crypto Group, Universit´e catholique de Louvain, B-1348 Louvain-la-Neuve. e-ma

Improving the Rules of the DPA Contest Fran¸cois-Xavier Standaert⋆ , Philippe Bulens, Giacomo de Meulenaer, Nicolas Veyrat-Charvillon UCL Crypto Group, Universit´e catholique de Louvain, B-1348 Louvain-la-Neuve. e-ma

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2008-12-08 08:57:29
55An Evaluation of Hash Functions on a Power Analysis Resistant Processor Architecture Simon Hoerder1 , Marcin Wojcik1 , Stefan Tillich1 , Dan Page1 {hoerder, wojcik, tillich, page}@compsci.bristol.ac.uk Department of Comp

An Evaluation of Hash Functions on a Power Analysis Resistant Processor Architecture Simon Hoerder1 , Marcin Wojcik1 , Stefan Tillich1 , Dan Page1 {hoerder, wojcik, tillich, page}@compsci.bristol.ac.uk Department of Comp

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2010-12-01 12:22:01
56Success through confidence: Evaluating the effectiveness of a side-channel attack. Adrian Thillard, Emmanuel Prouff, and Thomas Roche ANSSI, 51, Bd de la Tour-Maubourg, 75700 Paris 07 SP, France .f

Success through confidence: Evaluating the effectiveness of a side-channel attack. Adrian Thillard, Emmanuel Prouff, and Thomas Roche ANSSI, 51, Bd de la Tour-Maubourg, 75700 Paris 07 SP, France .f

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-05-04 07:23:23
57How Different Electrical Circuits of ECC Designs Influence the Shape of Power Traces measured on FPGA Thomas Basmer, Christian Wittke, Zoya Dyka, and Peter Langendoerfer System dept., IHP, Im Technologiepark 25,

How Different Electrical Circuits of ECC Designs Influence the Shape of Power Traces measured on FPGA Thomas Basmer, Christian Wittke, Zoya Dyka, and Peter Langendoerfer System dept., IHP, Im Technologiepark 25,

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-12-19 03:59:09
58A DPA Attack on the Improved Ha-Moon Algorithm? Dong Jin PARK and Pil Joong LEE Information Security Laboratory, Dept. of EEE, POSTECH, Pohang, Korea ,

A DPA Attack on the Improved Ha-Moon Algorithm? Dong Jin PARK and Pil Joong LEE Information Security Laboratory, Dept. of EEE, POSTECH, Pohang, Korea ,

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2004-12-14 23:21:31
59Individualizing Electrical Circuits of Cryptographic Devices as a Means to Hinder Tampering Attacks Zoya Dyka, Thomas Basmer, Christian Wittke and Peter Langendoerfer System dept., IHP Frankfurt(Oder), Germany

Individualizing Electrical Circuits of Cryptographic Devices as a Means to Hinder Tampering Attacks Zoya Dyka, Thomas Basmer, Christian Wittke and Peter Langendoerfer System dept., IHP Frankfurt(Oder), Germany

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-05-08 10:18:14
60How to Keep a Secret: Leakage Deterring Public-key Cryptography? Aggelos Kiayias and Qiang Tang National and Kapodistrian University of Athens and University of Connecticut ,

How to Keep a Secret: Leakage Deterring Public-key Cryptography? Aggelos Kiayias and Qiang Tang National and Kapodistrian University of Athens and University of Connecticut ,

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2013-12-17 11:16:56