Sciweavers

264 search results - page 6 / 53
» Algebraic Side-Channel Attacks
Sort
View
141
Voted
FSE
2005
Springer
118views Cryptology» more  FSE 2005»
15 years 9 months ago
A Side-Channel Analysis Resistant Description of the AES S-Box
So far, efficient algorithmic countermeasures to secure the AES algorithm against (first-order) differential side-channel attacks have been very expensive to implement. In this a...
Elisabeth Oswald, Stefan Mangard, Norbert Pramstal...
79
Voted
CHES
2009
Springer
140views Cryptology» more  CHES 2009»
16 years 4 months ago
First-Order Side-Channel Attacks on the Permutation Tables Countermeasure
Emmanuel Prouff, Robert P. McEvoy
CCS
2008
ACM
15 years 5 months ago
Deconstructing new cache designs for thwarting software cache-based side channel attacks
Software cache-based side channel attacks present a serious threat to computer systems. Previously proposed countermeasures were either too costly for practical use or only effect...
Jingfei Kong, Onur Aciiçmez, Jean-Pierre Se...
149
Voted
ISCA
2007
IEEE
167views Hardware» more  ISCA 2007»
15 years 9 months ago
New cache designs for thwarting software cache-based side channel attacks
Software cache-based side channel attacks are a serious new class of threats for computers. Unlike physical side channel attacks that mostly target embedded cryptographic devices,...
Zhenghong Wang, Ruby B. Lee
139
Voted
CANS
2006
Springer
129views Cryptology» more  CANS 2006»
15 years 7 months ago
Side Channel Attacks and Countermeasures on Pairing Based Cryptosystems over Binary Fields
Pairings on elliptic curves have been used as cryptographic primitives for the development of new applications such as identity based schemes. For the practical applications, it is...
Tae-Hyun Kim, Tsuyoshi Takagi, Dong-Guk Han, Ho Wo...