Sciweavers

89 search results - page 14 / 18
» Improved Side Channel Cube Attacks on PRESENT
Sort
View
CTRSA
2001
Springer
122views Cryptology» more  CTRSA 2001»
14 years 12 days ago
Password Authentication Using Multiple Servers
Safe long-term storage of user private keys is a problem in client/server systems. The problem can be addressed with a roaming system that retrieves keys on demand from remote cred...
David P. Jablon
INDOCRYPT
2004
Springer
14 years 1 months ago
Exact Analysis of Montgomery Multiplication
The Montgomery multiplication is often used for an efficient implementations of public-key cryptosystems. This algorithm occasionally needs an extra subtraction in the final step,...
Hisayoshi Sato, Daniel Schepers, Tsuyoshi Takagi
VTC
2007
IEEE
130views Communications» more  VTC 2007»
14 years 2 months ago
Cross-Correlation Analysis of Generalized Distributed Antenna Systems with Cooperative Diversity
— In this paper, geometry-based channel models are proposed to describe the topology of generalized distributed antenna systems with cooperative diversity (GDAS-CD). The system a...
Yifan Chen, Chau Yuen, Yan Zhang, Zhenrong Zhang
CHES
2004
Springer
99views Cryptology» more  CHES 2004»
14 years 1 months ago
Defeating Countermeasures Based on Randomized BSD Representations
Abstract. The recent development of side channel attacks has lead implementers to use increasingly sophisticated countermeasures in critical operations such as modular exponentiati...
Pierre-Alain Fouque, Frédéric Muller...
CASES
2010
ACM
13 years 6 months ago
A comprehensive analysis of performance and side-channel-leakage of AES SBOX implementations in embedded software
The Advanced Encryption Standard is used in almost every new embedded application that needs a symmetric-key cipher. In such embedded applications, high-performance as well as res...
Ambuj Sinha, Zhimin Chen, Patrick Schaumont