Sciweavers

5762 search results - page 16 / 1153
» R-tree: A Hardware Implementation
Sort
View
ICISC
2008
113views Cryptology» more  ICISC 2008»
13 years 10 months ago
Secure Hardware Implementation of Non-linear Functions in the Presence of Glitches
Hardware implementations of cryptographic algorithms are still vulnerable to side-channel attacks. Side-channel attacks that are based on multiple measurements of the same operatio...
Svetla Nikova, Vincent Rijmen, Martin Schläff...
ISCAS
2006
IEEE
163views Hardware» more  ISCAS 2006»
14 years 2 months ago
ASIC hardware implementation of the IDEA NXT encryption algorithm
— Symmetric-key block ciphers are often used to provide data confidentiality with low complexity, especially in the case of dedicated hardware implementations. IDEA NXT is a nov...
Marco Macchetti, Wenyu Chen
CHES
2006
Springer
246views Cryptology» more  CHES 2006»
14 years 5 days ago
Pinpointing the Side-Channel Leakage of Masked AES Hardware Implementations
This article starts with a discussion of three different attacks on masked AES hardware implementations. This discussion leads to the conclusion that glitches in masked circuits po...
Stefan Mangard, Kai Schramm
ARC
2009
Springer
241views Hardware» more  ARC 2009»
14 years 3 months ago
Fully Pipelined Hardware Implementation of 128-Bit SEED Block Cipher Algorithm
As the need for information security increases in our everyday life, the job of encoding/decoding for secure information delivery becomes a critical issue in data network systems. ...
Jaeyoung Yi, Karam Park, Joonseok Park, Won Woo Ro
IPPS
2005
IEEE
14 years 2 months ago
RC-BLAST: Towards a Portable, Cost-Effective Open Source Hardware Implementation
Basic Local Alignment Search Tool (BLAST) is a standard computer application that molecular biologists use to search for sequence similarity in genomic databases. This report desc...
Krishna Muriki, Keith D. Underwood, Ron Sass