Sciweavers

525 search results - page 28 / 105
» The Davies-Murphy Power Attack
Sort
View
ACISP
2006
Springer
14 years 3 months ago
Cache Based Power Analysis Attacks on AES
Jacques J. A. Fournier, Michael Tunstall
FPL
2004
Springer
81views Hardware» more  FPL 2004»
14 years 3 months ago
Power Analysis Attacks Against FPGA Implementations of the DES
François-Xavier Standaert, Siddika Berna &O...
CHES
2000
Springer
114views Cryptology» more  CHES 2000»
14 years 2 months ago
Montgomery Exponentiation with no Final Subtractions: Improved Results
The Montgomery multiplication is commonly used as the core algorithm for cryptosystems based on modular arithmetic. With the advent of new classes of attacks (timing attacks, power...
Gaël Hachez, Jean-Jacques Quisquater
CODES
2004
IEEE
14 years 1 months ago
Low energy security optimization in embedded cryptographic systems
Future embedded and wireless devices will be increasingly powerful supporting many applications including one of the most crucial, security. Although many wireless and embedded de...
Catherine H. Gebotys