Sciweavers

372 search results - page 7 / 75
» On the Security of a Unified Countermeasure
Sort
View
ACISP
2004
Springer
14 years 27 days ago
On Security of XTR Public Key Cryptosystems Against Side Channel Attacks
The XTR public key system was introduced at Crypto 2000. Application of XTR in cryptographic protocols leads to substantial savings both in communication and computational overhead...
Dong-Guk Han, Jongin Lim, Kouichi Sakurai
CHES
2005
Springer
117views Cryptology» more  CHES 2005»
14 years 1 months ago
DPA Leakage Models for CMOS Logic Circuits
In this paper, we propose new models for directly evaluating DPA leakage from logic information in CMOS circuits. These models are based on the transition probability for each gate...
Daisuke Suzuki, Minoru Saeki, Tetsuya Ichikawa
GLOBECOM
2006
IEEE
14 years 1 months ago
Wormhole Attack in Wireless Ad Hoc Networks: Analysis and Countermeasure
— The wormhole attack is one of the most severe security attacks in wireless ad hoc networks. In this paper, we analyze the effect of the wormhole attack in shortest path routing...
Majid Khabbazian, Hugues Mercier, Vijay K. Bhargav...
CHES
2009
Springer
162views Cryptology» more  CHES 2009»
14 years 8 months ago
Programmable and Parallel ECC Coprocessor Architecture: Tradeoffs between Area, Speed and Security
Elliptic Curve Cryptography implementations are known to be vulnerable to various side-channel attacks and fault injection attacks, and many countermeasures have been proposed. How...
Xu Guo, Junfeng Fan, Patrick Schaumont, Ingrid Ver...
SP
2002
IEEE
143views Security Privacy» more  SP 2002»
13 years 7 months ago
Partitioning Attacks: Or How to Rapidly Clone Some GSM Cards
In this paper, we introduce a new class of side
Josyula R. Rao, Pankaj Rohatgi, Helmut Scherzer, S...