Sciweavers

CHES
2009
Springer
158views Cryptology» more  CHES 2009»
14 years 12 months ago
A New Side-Channel Attack on RSA Prime Generation
Thomas Finke, Max Gebhardt, Werner Schindler
CHES
2009
Springer
192views Cryptology» more  CHES 2009»
14 years 12 months ago
CDs Have Fingerprints Too
Abstract. We introduce a new technique for extracting unique fingerprints from identical CDs. The proposed technique takes advantage of manufacturing variability found in the lengt...
Ghaith Hammouri, Aykutlu Dana, Berk Sunar
CHES
2009
Springer
162views Cryptology» more  CHES 2009»
14 years 12 months ago
Hardware Accelerator for the Tate Pairing in Characteristic Three Based on Karatsuba-Ofman Multipliers
Abstract. This paper is devoted to the design of fast parallel accelerators for the cryptographic Tate pairing in characteristic three over supersingular elliptic curves. We propos...
Jean-Luc Beuchat, Jérémie Detrey, Ni...
CHES
2009
Springer
162views Cryptology» more  CHES 2009»
14 years 12 months ago
Programmable and Parallel ECC Coprocessor Architecture: Tradeoffs between Area, Speed and Security
Elliptic Curve Cryptography implementations are known to be vulnerable to various side-channel attacks and fault injection attacks, and many countermeasures have been proposed. How...
Xu Guo, Junfeng Fan, Patrick Schaumont, Ingrid Ver...
CHES
2009
Springer
121views Cryptology» more  CHES 2009»
14 years 12 months ago
A Design Methodology for a DPA-Resistant Cryptographic LSI with RSL Techniques
Minoru Saeki, Daisuke Suzuki, Koichi Shimizu, Akas...
CHES
2009
Springer
265views Cryptology» more  CHES 2009»
14 years 12 months ago
Higher-Order Masking and Shuffling for Software Implementations of Block Ciphers
Differential Power Analysis (DPA) is a powerful side channel key recovery attack that efficiently breaks block ciphers implementations. In software, two main techniques are usually...
Matthieu Rivain, Emmanuel Prouff, Julien Doget