Internet routing dynamics have been extensively studied in the past few years. However, dynamics such as interdomain Border Gateway Protocol (BGP) behavior are still poorly unders...
Murat Can Ganiz, Sudhan Kanitkar, Mooi Choo Chuah,...
It is believed that masking is an effective countermeasure against power analysis attacks: before a certain operation involving a key is performed in a cryptographic chip, the inpu...
Implementations of the Advanced Encryption Standard (AES), including hardware applications with limited resources (e.g., smart cards), may be vulnerable to āside-channel attacksā...
The isogeny for elliptic curve cryptosystems was initially used for the eļ¬cient improvement of order counting methods. Recently, Smart proposed the countermeasure using isogeny f...
So far, eļ¬cient algorithmic countermeasures to secure the AES algorithm against (ļ¬rst-order) diļ¬erential side-channel attacks have been very expensive to implement. In this a...
Elisabeth Oswald, Stefan Mangard, Norbert Pramstal...