Sciweavers

4 search results - page 1 / 1
» Scalable PP-1 block cipher
Sort
View
AMCS
2010
172views Mathematics» more  AMCS 2010»
13 years 11 months ago
Scalable PP-1 block cipher
Krzysztof Bucholc, Krzysztof Chmiel, Anna Grochole...
NCA
2005
IEEE
14 years 4 months ago
Leveraging the Multiprocessing Capabilities of Modern Network Processors for Cryptographic Acceleration
The Kasumi block cipher provides integrity and confidentiality services for 3G wireless networks, but it also forms a bottleneck due to its computational overhead. Especially in ...
Gunnar Gaubatz, Berk Sunar
CHES
2009
Springer
265views Cryptology» more  CHES 2009»
14 years 11 months ago
Higher-Order Masking and Shuffling for Software Implementations of Block Ciphers
Differential Power Analysis (DPA) is a powerful side channel key recovery attack that efficiently breaks block ciphers implementations. In software, two main techniques are usually...
Matthieu Rivain, Emmanuel Prouff, Julien Doget
TCOS
2010
13 years 5 months ago
PET SNAKE: A Special Purpose Architecture to Implement an Algebraic Attack in Hardware
Abstract. In [24] Raddum and Semaev propose a technique to solve systems of polynomial equations over F2 as occurring in algebraic attacks on block ciphers. This approach is known ...
Willi Geiselmann, Kenneth Matheis, Rainer Steinwan...