Sciweavers

986 search results - page 54 / 198
» Protecting the Intranet Against
Sort
View
DFT
2007
IEEE
101views VLSI» more  DFT 2007»
14 years 3 months ago
Power Attacks Resistance of Cryptographic S-Boxes with Added Error Detection Circuits
Many side-channel attacks on implementations of cryptographic algorithms have been developed in recent years demonstrating the ease of extracting the secret key. In response, vari...
Francesco Regazzoni, Thomas Eisenbarth, Johann Gro...
SP
2007
IEEE
102views Security Privacy» more  SP 2007»
14 years 3 months ago
Improving the Robustness of Private Information Retrieval
Since 1995, much work has been done creating protocols for private information retrieval (PIR). Many variants of the basic PIR model have been proposed, including such modificati...
Ian Goldberg
CSFW
2010
IEEE
14 years 1 months ago
Vulnerability Bounds and Leakage Resilience of Blinded Cryptography under Timing Attacks
—We establish formal bounds for the number of min-entropy bits that can be extracted in a timing attack against a cryptosystem that is protected by blinding, the state-of-the art...
Boris Köpf, Geoffrey Smith
CARDIS
2004
Springer
216views Hardware» more  CARDIS 2004»
14 years 2 months ago
Differential Fault Analysis Attack Resistant Architectures for the Advanced Encryption Standard
: We present two architectures for protecting a hardware implementation of AES against side-channel attacks known as Differential Fault Analysis attacks. The first architecture, wh...
Mark G. Karpovsky, Konrad J. Kulikowski, Alexander...
VLSISP
2008
139views more  VLSISP 2008»
13 years 9 months ago
Fault Tolerance Analysis of Communication System Interleavers: the 802.11a Case Study
The study of Multiple Soft errors on memory modules caused by radiation effects represents an interesting field of current research. The fault tolerance of these devices in radiati...
Pilar Reyes, Pedro Reviriego, Juan Antonio Maestro...