Sciweavers

33 search results - page 5 / 7
» FPGA Implementations of the DES and Triple-DES Masked Agains...
Sort
View
CHES
2006
Springer
137views Cryptology» more  CHES 2006»
13 years 11 months ago
Provably Secure S-Box Implementation Based on Fourier Transform
Cryptographic algorithms implemented in embedded devices must withstand Side Channel Attacks such as the Differential Power Analysis (DPA). A common method of protecting symmetric ...
Emmanuel Prouff, Christophe Giraud, Sébasti...
ISCAS
2007
IEEE
120views Hardware» more  ISCAS 2007»
14 years 1 months ago
DPA Using Phase-Based Waveform Matching against Random-Delay Countermeasure
— We propose Differential Power Analysis (DPA) with a phase-based waveform matching technique. Conventionally, a trigger signal and a system clock are used to capture the wavefor...
Sei Nagashima, Naofumi Homma, Yuichi Imai, Takafum...
AES
2004
Springer
190views Cryptology» more  AES 2004»
14 years 26 days ago
Small Size, Low Power, Side Channel-Immune AES Coprocessor: Design and Synthesis Results
Abstract. When cryptosystems are being used in real life, hardware and software implementations themselves present a fruitful field for attacks. Side channel attacks exploit infor...
Elena Trichina, Tymur Korkishko, Kyung-Hee Lee
FPL
2003
Springer
114views Hardware» more  FPL 2003»
14 years 20 days ago
Power Analysis of FPGAs: How Practical is the Attack?
Recent developments in information technologies made the secure transmission of digital data a critical design point. Large data flows have to be exchanged securely and involve en...
François-Xavier Standaert, Loïc van Ol...
CASES
2010
ACM
13 years 5 months ago
A comprehensive analysis of performance and side-channel-leakage of AES SBOX implementations in embedded software
The Advanced Encryption Standard is used in almost every new embedded application that needs a symmetric-key cipher. In such embedded applications, high-performance as well as res...
Ambuj Sinha, Zhimin Chen, Patrick Schaumont