Sciweavers

264 search results - page 23 / 53
» Algebraic Side-Channel Attacks
Sort
View
ET
2010
89views more  ET 2010»
13 years 7 months ago
On the Duality of Probing and Fault Attacks
In this work we investigate the problem of simultaneous privacy and integrity protection in cryptographic circuits. We consider a white-box scenario with a powerful, yet limited at...
Berndt M. Gammel, Stefan Mangard
IH
2009
Springer
14 years 3 months ago
Hardware-Based Public-Key Cryptography with Public Physically Unclonable Functions
Abstract. A physically unclonable function (PUF) is a multiple-input, multipleoutput, large entropy physical system that is unreproducible due to its structural complexity. A publi...
Nathan Beckmann, Miodrag Potkonjak
CHES
2007
Springer
94views Cryptology» more  CHES 2007»
14 years 2 months ago
MAME: A Compression Function with Reduced Hardware Requirements
This paper describes a new compression function, MAME designed for hardware-oriented hash functions which can be used in applications reduced hardware requirements. MAME takes a 25...
Hirotaka Yoshida, Dai Watanabe, Katsuyuki Okeya, J...
IMA
2005
Springer
127views Cryptology» more  IMA 2005»
14 years 2 months ago
On the Automatic Construction of Indistinguishable Operations
Abstract. An increasingly important design constraint for software running on ubiquitous computing devices is security, particularly against physical methods such as side-channel a...
Manuel Barbosa, Dan Page
DATE
2010
IEEE
132views Hardware» more  DATE 2010»
13 years 7 months ago
Differential Power Analysis enhancement with statistical preprocessing
—Differential Power Analysis (DPA) is a powerful Side-Channel Attack (SCA) targeting as well symmetric as asymmetric ciphers. Its principle is based on a statistical treatment of...
Victor Lomné, Amine Dehbaoui, Philippe Maur...