Sciweavers

CHES
2009
Springer
230views Cryptology» more  CHES 2009»
14 years 11 months ago
Designing an ASIP for Cryptographic Pairings over Barreto-Naehrig Curves
Abstract. This paper presents a design-space exploration of an applicationspecific instruction-set processor (ASIP) for the computation of various cryptographic pairings over Barre...
David Kammler, Diandian Zhang, Dominik Auras, Gerd...
CHES
2009
Springer
171views Cryptology» more  CHES 2009»
14 years 11 months ago
Trojan Side-Channels: Lightweight Hardware Trojans through Side-Channel Engineering
Abstract. The general trend in semiconductor industry to separate design from fabrication leads to potential threats from untrusted integrated circuit foundries. In particular, mal...
Christof Paar, Lang Lin, Markus Kasper, Tim Gü...
CHES
2009
Springer
239views Cryptology» more  CHES 2009»
14 years 11 months ago
Algebraic Side-Channel Attacks on the AES: Why Time also Matters in DPA
Algebraic side-channel attacks have been recently introduced as a powerful cryptanalysis technique against block ciphers. These attacks represent both a target algorithm and its ph...
François-Xavier Standaert, Mathieu Renauld,...
CHES
2009
Springer
125views Cryptology» more  CHES 2009»
14 years 11 months ago
SSE Implementation of Multivariate PKCs on Modern x86 CPUs
Anna Inn-Tung Chen, Ming-Shing Chen, Tien-Ren Chen...
CHES
2009
Springer
125views Cryptology» more  CHES 2009»
14 years 11 months ago
Mutual Information Analysis: How, When and Why?
Nicolas Veyrat-Charvillon, François-Xavier ...
CHES
2009
Springer
121views Cryptology» more  CHES 2009»
14 years 11 months ago
MicroEliece: McEliece for Embedded Devices
Christof Paar, Stefan Heyse, Thomas Eisenbarth, Ti...
CHES
2009
Springer
157views Cryptology» more  CHES 2009»
14 years 11 months ago
Differential Cluster Analysis
Abstract. We propose a new technique called Differential Cluster Analysis for side-channel key recovery attacks. This technique uses cluster analysis to detect internal collisions ...
Lejla Batina, Benedikt Gierlichs, Kerstin Lemke-Ru...
CHES
2009
Springer
200views Cryptology» more  CHES 2009»
14 years 11 months ago
Accelerating AES with Vector Permute Instructions
We demonstrate new techniques to speed up the Rijndael (AES) block cipher using vector permute instructions. Because these techniques avoid data- and key-dependent branches and mem...
Mike Hamburg