Sciweavers

CHES
2010
Springer
193views Cryptology» more  CHES 2010»
14 years 19 days ago
New High Entropy Element for FPGA Based True Random Number Generators
Michal Varchola, Milos Drutarovsky
CHES
2010
Springer
147views Cryptology» more  CHES 2010»
14 years 19 days ago
256 Bit Standardized Crypto for 650 GE - GOST Revisited
Axel Poschmann, San Ling, Huaxiong Wang
CHES
2010
Springer
214views Cryptology» more  CHES 2010»
14 years 19 days ago
Correlation-Enhanced Power Analysis Collision Attack
Side-channel based collision attacks are a mostly disregarded alternative to DPA for analyzing unprotected implementations. The advent of strong countermeasures, such as masking, h...
Amir Moradi, Oliver Mischke, Thomas Eisenbarth
CHES
2010
Springer
132views Cryptology» more  CHES 2010»
14 years 19 days ago
Efficient Techniques for High-Speed Elliptic Curve Cryptography
In this paper, a thorough bottom-up optimization process (field, point and scalar arithmetic) is used to speed up the computation of elliptic curve point multiplication and report ...
Patrick Longa, Catherine H. Gebotys
CHES
2010
Springer
244views Cryptology» more  CHES 2010»
14 years 19 days ago
Public Key Perturbation of Randomized RSA Implementations
Alexandre Berzati, Cécile Canovas-Dumas, Lo...
CHES
2010
Springer
133views Cryptology» more  CHES 2010»
14 years 19 days ago
ARMADILLO: A Multi-purpose Cryptographic Primitive Dedicated to Hardware
This paper describes and analyzes the security of a general-purpose cryptographic function design, with application in RFID tags and sensor networks. Based on these analyzes, we su...
Stéphane Badel, Nilay Dagtekin, Jorge Nakah...
CHES
2010
Springer
159views Cryptology» more  CHES 2010»
14 years 19 days ago
Provably Secure Higher-Order Masking of AES
Implementations of cryptographic algorithms are vulnerable to Side Channel Analysis (SCA). To counteract it, masking schemes are usually involved which randomize key-dependent data...
Matthieu Rivain, Emmanuel Prouff
CHES
2010
Springer
534views Cryptology» more  CHES 2010»
14 years 19 days ago
PRINTcipher: A Block Cipher for IC-Printing
Lars R. Knudsen, Gregor Leander, Axel Poschmann, M...
CHES
2010
Springer
189views Cryptology» more  CHES 2010»
14 years 19 days ago
Quark: A Lightweight Hash
The need for lightweight (that is, compact, low-power, low-energy) cryptographic hash functions has been repeatedly expressed by application designers, notably for implementing RFI...
Jean-Philippe Aumasson, Luca Henzen, Willi Meier, ...
CHES
2010
Springer
112views Cryptology» more  CHES 2010»
14 years 19 days ago
An Alternative to Error Correction for SRAM-Like PUFs
We propose a new technique called stable-PUF-marking as an alternative to error correction to get reproducible (i.e. stable) outputs from physical unclonable functions (PUF). The ...
Maximilian Hofer, Christoph Boehm