Sciweavers

894 search results - page 45 / 179
» Secure Implementation of Channel Abstractions
Sort
View
CTRSA
2009
Springer
127views Cryptology» more  CTRSA 2009»
14 years 4 months ago
Securing RSA against Fault Analysis by Double Addition Chain Exponentiation
Abstract. Fault Analysis is a powerful cryptanalytic technique that enables to break cryptographic implementations embedded in portable devices more efficiently than any other tech...
Matthieu Rivain
CORR
2006
Springer
175views Education» more  CORR 2006»
13 years 10 months ago
Adaptive Channel Allocation Spectrum Etiquette for Cognitive Radio Networks
Abstract-- In this work, we propose a game theoretic framework to analyze the behavior of cognitive radios for distributed adaptive channel allocation. We define two different obje...
Nie Nie, Cristina Comaniciu
CHES
2007
Springer
95views Cryptology» more  CHES 2007»
14 years 4 months ago
Side Channel Cryptanalysis of a Higher Order Masking Scheme
Abstract. In the recent years, DPA attacks have been widely investigated. In particular, 2-nd order DPA have been improved and successfully applied to break many masked implementat...
Jean-Sébastien Coron, Emmanuel Prouff, Matt...
ICISC
2007
117views Cryptology» more  ICISC 2007»
13 years 11 months ago
Side Channel Attacks on Irregularly Decimated Generators
Abstract. We investigate three side channel attacks on ABSG, a variant of irregularly decimated generators (IDG). The three attacks are timing analysis, phase-shift fault analysis ...
Chuan-Wen Loe, Khoongming Khoo
DATE
2005
IEEE
109views Hardware» more  DATE 2005»
14 years 3 months ago
Design Method for Constant Power Consumption of Differential Logic Circuits
Side channel attacks are a major security concern for smart cards and other embedded devices. They analyze the variations on the power consumption to find the secret key of the en...
Kris Tiri, Ingrid Verbauwhede