Sciweavers

76 search results - page 3 / 16
» On the Masking Countermeasure and Higher-Order Power Analysi...
Sort
View
26
Voted
ICDM
2006
IEEE
158views Data Mining» more  ICDM 2006»
14 years 1 months ago
Detection of Interdomain Routing Anomalies Based on Higher-Order Path Analysis
Internet routing dynamics have been extensively studied in the past few years. However, dynamics such as interdomain Border Gateway Protocol (BGP) behavior are still poorly unders...
Murat Can Ganiz, Sudhan Kanitkar, Mooi Choo Chuah,...
ESORICS
2002
Springer
14 years 7 months ago
Hamming Weight Attacks on Cryptographic Hardware - Breaking Masking Defense
It is believed that masking is an effective countermeasure against power analysis attacks: before a certain operation involving a key is performed in a cryptographic chip, the inpu...
Marcin Gomulkiewicz, Miroslaw Kutylowski
ACNS
2008
Springer
103views Cryptology» more  ACNS 2008»
14 years 1 months ago
A Very Compact "Perfectly Masked" S-Box for AES
Implementations of the Advanced Encryption Standard (AES), including hardware applications with limited resources (e.g., smart cards), may be vulnerable to ā€œside-channel attacksā...
D. Canright, Lejla Batina
PKC
2004
Springer
151views Cryptology» more  PKC 2004»
14 years 25 days ago
On the Optimal Parameter Choice for Elliptic Curve Cryptosystems Using Isogeny
The isogeny for elliptic curve cryptosystems was initially used for the eļ¬ƒcient improvement of order counting methods. Recently, Smart proposed the countermeasure using isogeny f...
Toru Akishita, Tsuyoshi Takagi
FSE
2005
Springer
118views Cryptology» more  FSE 2005»
14 years 1 months ago
A Side-Channel Analysis Resistant Description of the AES S-Box
So far, eļ¬ƒcient algorithmic countermeasures to secure the AES algorithm against (ļ¬rst-order) diļ¬€erential side-channel attacks have been very expensive to implement. In this a...
Elisabeth Oswald, Stefan Mangard, Norbert Pramstal...