Sciweavers

12 search results - page 1 / 3
» Probing Attacks on Tamper-Resistant Devices
Sort
View
CHES
1999
Springer
99views Cryptology» more  CHES 1999»
14 years 3 months ago
Probing Attacks on Tamper-Resistant Devices
Abstract. This paper describes a new type of attack on tamper-resistant cryptographic hardware. We show that by locally observing the value of a few RAM or adress bus bits (possibl...
Helena Handschuh, Pascal Paillier, Jacques Stern
SPW
1997
Springer
14 years 3 months ago
Low Cost Attacks on Tamper Resistant Devices
Ross J. Anderson, Markus G. Kuhn
SBCCI
2006
ACM
124views VLSI» more  SBCCI 2006»
14 years 5 months ago
A cryptography core tolerant to DFA fault attacks
This work describes a hardware approach for the concurrent fault detection and error correction in a cryptographic core. It has been shown in the literature that transient faults ...
Carlos Roberto Moratelli, Érika F. Cota, Ma...
CRYPTO
2003
Springer
87views Cryptology» more  CRYPTO 2003»
14 years 4 months ago
Private Circuits: Securing Hardware against Probing Attacks
Can you guarantee secrecy even if an adversary can eavesdrop on your brain? We consider the problem of protecting privacy in circuits, when faced with an adversary that can access ...
Yuval Ishai, Amit Sahai, David Wagner
ICPADS
2005
IEEE
14 years 4 months ago
An Active Detecting Method Against SYN Flooding Attack
SYN flooding attacks are a common type of Distributed Denial-of-Service (DDoS) attack. Early detection is desirable but traditional passive detection methods are inaccurate in th...
Bin Xiao, Wei Chen, Yanxiang He, Edwin Hsing-Mean ...