Sciweavers

22 search results - page 3 / 5
» ches 2003
Sort
View
CHES
2003
Springer
145views Cryptology» more  CHES 2003»
14 years 1 months ago
Cryptanalysis of DES Implemented on Computers with Cache
This paper presents the results of applying an attack against the Data Encryption Standard (DES) implemented in some applications, using side-channel information based on CPU delay...
Yukiyasu Tsunoo, Teruo Saito, Tomoyasu Suzaki, Mak...
CHES
2004
Springer
121views Cryptology» more  CHES 2004»
14 years 1 months ago
Power Analysis of an FPGA: Implementation of Rijndael: Is Pipelining a DPA Countermeasure?
Since their publication in 1998, power analysis attacks have attracted signiļ¬cant attention within the cryptographic community. So far, they have been successfully applied to diļ...
François-Xavier Standaert, Siddika Berna &O...
CHES
2003
Springer
119views Cryptology» more  CHES 2003»
14 years 1 months ago
Faster Double-Size Modular Multiplication from Euclidean Multipliers
Abstract. A novel technique for computing a 2n-bit modular multiplication using n-bit arithmetic was introduced at CHES 2002 by Fischer and Seifert. Their technique makes use of an...
Benoît Chevallier-Mames, Marc Joye, Pascal P...
CHES
2003
Springer
104views Cryptology» more  CHES 2003»
14 years 1 months ago
Power-Analysis Attacks on an FPGA - First Experimental Results
Field Programmable Gate Arrays (FPGAs) are becoming increasingly popular, especially for rapid prototyping. For implementations of cryptographic algorithms, not only the speed and ...
Siddika Berna Örs, Elisabeth Oswald, Bart Pre...
CHES
2003
Springer
149views Cryptology» more  CHES 2003»
14 years 1 months ago
Attacking Unbalanced RSA-CRT Using SPA
Abstract. Eļ¬ƒcient implementations of RSA on computationally limited devices, such as smartcards, often use the CRT technique in combination with Garnerā€™s algorithm in order to ...
Pierre-Alain Fouque, Gwenaëlle Martinet, Guil...