Sciweavers

CRYPTO
2010
Springer
228views Cryptology» more  CRYPTO 2010»
14 years 19 days ago
On Generalized Feistel Networks
We prove beyond-birthday-bound security for most of the well-known types of generalized Feistel networks: (1) unbalanced Feistel networks, where the n-bit to m-bit round functions ...
Viet Tung Hoang, Phillip Rogaway
CHES
2010
Springer
132views Cryptology» more  CHES 2010»
14 years 19 days ago
Fast Exhaustive Search for Polynomial Systems in F2
Charles Bouillaguet, Hsieh-Chung Chen, Chen-Mou Ch...
CHES
2010
Springer
187views Cryptology» more  CHES 2010»
14 years 19 days ago
Garbled Circuits for Leakage-Resilience: Hardware Implementation and Evaluation of One-Time Programs - (Full Version)
The power of side-channel leakage attacks on cryptographic implementations is evident. Today's practical defenses are typically attack-specific countermeasures against certain...
Kimmo Järvinen, Vladimir Kolesnikov, Ahmad-Re...
CHES
2010
Springer
210views Cryptology» more  CHES 2010»
14 years 19 days ago
Flash Memory 'Bumping' Attacks
This paper introduces a new class of optical fault injection attacks called bumping attacks. These attacks are aimed at data extraction from secure embedded memory, which usually s...
Sergei Skorobogatov
CHES
2010
Springer
166views Cryptology» more  CHES 2010»
14 years 19 days ago
Algebraic Side-Channel Analysis in the Presence of Errors
Measurement errors make power analysis attacks difficult to mount when only a single power trace is available: the statistical methods that make DPA attacks so successful are not a...
Yossef Oren, Mario Kirschbaum, Thomas Popp, Avisha...
CHES
2010
Springer
141views Cryptology» more  CHES 2010»
14 years 19 days ago
Fair and Comprehensive Methodology for Comparing Hardware Performance of Fourteen Round Two SHA-3 Candidates Using FPGAs
Performance in hardware has been demonstrated to be an important factor in the evaluation of candidates for cryptographic standards. Up to now, no consensus exists on how such an e...
Kris Gaj, Ekawat Homsirikamol, Marcin Rogawski
CHES
2010
Springer
175views Cryptology» more  CHES 2010»
14 years 19 days ago
Side-Channel Analysis of Six SHA-3 Candidates
Abstract. In this paper we study six 2nd round SHA-3 candidates from a side-channel cryptanalysis point of view. For each of them, we give the exact procedure and appropriate choic...
Olivier Benoît, Thomas Peyrin
CHES
2010
Springer
172views Cryptology» more  CHES 2010»
14 years 19 days ago
Analysis and Improvement of the Random Delay Countermeasure of CHES 2009
Random delays are often inserted in embedded software to protect against side-channel and fault attacks. At CHES 2009 a new method for generation of random delays was described tha...
Jean-Sébastien Coron, Ilya Kizhvatov
CHES
2010
Springer
141views Cryptology» more  CHES 2010»
14 years 19 days ago
When Failure Analysis Meets Side-Channel Attacks
Jerome Di-Battista, Jean-Christophe Courrèg...