Sciweavers

54 search results - page 4 / 11
» Cache Based Remote Timing Attack on the AES
Sort
View
CHES
2010
Springer
214views Cryptology» more  CHES 2010»
13 years 8 months ago
Correlation-Enhanced Power Analysis Collision Attack
Side-channel based collision attacks are a mostly disregarded alternative to DPA for analyzing unprotected implementations. The advent of strong countermeasures, such as masking, h...
Amir Moradi, Oliver Mischke, Thomas Eisenbarth
SACRYPT
2004
Springer
105views Cryptology» more  SACRYPT 2004»
14 years 22 days ago
Provably Secure Masking of AES
A general method to secure cryptographic algorithm implementations against side-channel attacks is the use of randomization techniques and, in particular, masking. Roughly speaking...
Johannes Blömer, Jorge Guajardo, Volker Krumm...
CASES
2010
ACM
13 years 5 months ago
A comprehensive analysis of performance and side-channel-leakage of AES SBOX implementations in embedded software
The Advanced Encryption Standard is used in almost every new embedded application that needs a symmetric-key cipher. In such embedded applications, high-performance as well as res...
Ambuj Sinha, Zhimin Chen, Patrick Schaumont
AES
2000
Springer
117views Cryptology» more  AES 2000»
13 years 11 months ago
A Comparison of AES Candidates on the Alpha 21264
We compare the five candidates for the Advanced Encryption Standard based on their performance on the Alpha 21264, a 64-bit superscalar processor. There are several new features o...
Richard Weiss, Nathan L. Binkert
IDEAS
2007
IEEE
107views Database» more  IDEAS 2007»
14 years 1 months ago
Examining the Performance of a Constraint-Based Database Cache
Constraint-based database caching aims at correctly answering SQL query predicates from a local cache database by exploiting constraints that have previously been used in selectin...
Andreas Bühmann, Joachim Klein 0002