Sciweavers

CHES
2004
Springer
136views Cryptology» more  CHES 2004»
14 years 5 months ago
Attacking DSA Under a Repeated Bits Assumption
We discuss how to recover the private key for DSA style signature schemes if partial information about the ephemeral keys is revealed. The partial information we examine is of a se...
Peter J. Leadbitter, Dan Page, Nigel P. Smart
CHES
2004
Springer
99views Cryptology» more  CHES 2004»
14 years 5 months ago
Defeating Countermeasures Based on Randomized BSD Representations
Abstract. The recent development of side channel attacks has lead implementers to use increasingly sophisticated countermeasures in critical operations such as modular exponentiati...
Pierre-Alain Fouque, Frédéric Muller...
CHES
2004
Springer
170views Cryptology» more  CHES 2004»
14 years 5 months ago
Concurrent Error Detection Schemes for Involution Ciphers
Because of the rapidly shrinking dimensions in VLSI, transient and permanent faults arise and will continue to occur in the near future in increasing numbers. Since cryptographic c...
Nikhil Joshi, Kaijie Wu, Ramesh Karri
CHES
2004
Springer
96views Cryptology» more  CHES 2004»
14 years 5 months ago
How to Disembed a Program?
Benoît Chevallier-Mames, David Naccache, Pas...
CHES
2004
Springer
82views Cryptology» more  CHES 2004»
14 years 5 months ago
Fault Analysis of Stream Ciphers
Jonathan J. Hoch, Adi Shamir
CHES
2004
Springer
230views Cryptology» more  CHES 2004»
14 years 5 months ago
Correlation Power Analysis with a Leakage Model
Abstract. A classical model is used for the power consumption of cryptographic devices. It is based on the Hamming distance of the data handled with regard to an unknown but consta...
Eric Brier, Christophe Clavier, Francis Olivier
CHES
2004
Springer
128views Cryptology» more  CHES 2004»
14 years 5 months ago
Long Modular Multiplication for Cryptographic Applications
Abstract. A digit-serial, multiplier-accumulator based cryptographic coprocessor architecture is proposed, similar to fix-point DSP's with enhancements, supporting long modula...
Laszlo Hars
CHES
2004
Springer
126views Cryptology» more  CHES 2004»
14 years 5 months ago
Leak Resistant Arithmetic
In this paper we show how the usage of Residue Number Systems (RNS) can easily be turned into a natural defense against many side-channel attacks (SCA). We introduce a Leak Resista...
Jean-Claude Bajard, Laurent Imbert, Pierre-Yvan Li...
CHES
2004
Springer
167views Cryptology» more  CHES 2004»
14 years 5 months ago
Comparing Elliptic Curve Cryptography and RSA on 8-bit CPUs
Strong public-key cryptography is often considered to be too computationally expensive for small devices if not accelerated by cryptographic hardware. We revisited this statement a...
Nils Gura, Arun Patel, Arvinderpal Wander, Hans Eb...