Sciweavers

126 search results - page 6 / 26
» Power Analysis of FPGAs: How Practical is the Attack
Sort
View
CHES
2005
Springer
123views Cryptology» more  CHES 2005»
14 years 9 days ago
Improved Higher-Order Side-Channel Attacks with FPGA Experiments
We demonstrate that masking a block cipher implementation does not sufficiently improve its security against side-channel attacks. Under exactly the same hypotheses as in a Differ...
Eric Peeters, François-Xavier Standaert, Ni...
FDTC
2009
Springer
100views Cryptology» more  FDTC 2009»
14 years 1 months ago
Using Optical Emission Analysis for Estimating Contribution to Power Analysis
—This paper shows that optical emissions from an operating chip have a good correlation with power traces and can therefore be used to estimate the contribution of different area...
Sergei P. Skorobogatov
IWDW
2005
Springer
14 years 8 days ago
Security of DM Quantization Watermarking Schemes: A Practical Study for Digital Images
Abstract. In this paper, the security of Dither Modulation Quantization Index Modulation schemes for digital images is analyzed. Both pixel and DCT coefficient quantization schemes...
Patrick Bas, Jarmo Hurri
IACR
2011
132views more  IACR 2011»
12 years 6 months ago
Tamper-Proof Circuits: How to Trade Leakage for Tamper-Resilience
Abstract. Tampering attacks are cryptanalytic attacks on the implementation of cryptographic algorithms (e.g., smart cards), where an adversary introduces faults with the hope that...
Sebastian Faust, Krzysztof Pietrzak, Daniele Ventu...
EUROCRYPT
2009
Springer
14 years 7 months ago
A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks
The fair evaluation and comparison of side-channel attacks and countermeasures has been a long standing open question, limiting further developments in the field. Motivated by this...
François-Xavier Standaert, Moti Yung, Tal M...