Sciweavers

MOBILIGHT
2010
13 years 5 months ago
Stealthy Compromise of Wireless Sensor Nodes with Power Analysis Attacks
Node capture is considered as one of the most critical issues in the security of wireless sensor networks. A popular approach to thwart the problem relies on the detection of event...
Giacomo de Meulenaer, François-Xavier Stand...
TC
2002
13 years 10 months ago
Examining Smart-Card Security under the Threat of Power Analysis Attacks
Thomas S. Messerges, Ezzy A. Dabbish, Robert H. Sl...
SEC
2008
14 years 9 days ago
An Operation-Based Metric for CPA Resistance
Differential power analysis (DPA) is a strong attack upon cryptographic devices such as smartcards. Correlation power analysis (CPA) is a specific form of DPA where the Hamming-wei...
Jing Pan, J. I. den Hartog, Erik P. de Vink
EIT
2008
IEEE
14 years 20 days ago
Experiments in attacking FPGA-based embedded systems using differential power analysis
Abstract--In the decade since the concept was publicly introduced, power analysis attacks on cryptographic systems have become an increasingly studied topic in the computer securit...
Song Sun, Zijun Yan, Joseph Zambreno
ISLPED
1995
ACM
116views Hardware» more  ISLPED 1995»
14 years 2 months ago
Activity-sensitive architectural power analysis for the control path
Prompted by demands for portability and low-cost packaging, the electronics industry has begun to view power consumption as a critical design criteria. As such there is a growing ...
Paul E. Landman, Jan M. Rabaey
ASPDAC
1995
ACM
104views Hardware» more  ASPDAC 1995»
14 years 2 months ago
Power analysis of a 32-bit embedded microcontroller
A new approach for power analysis of microprocessorshas recently been proposed [1]. The idea is to look at the power consumption in a microprocessor from the point of view of the ...
Vivek Tiwari, Mike Tien-Chien Lee
FSE
2000
Springer
153views Cryptology» more  FSE 2000»
14 years 2 months ago
Bitslice Ciphers and Power Analysis Attacks
In this paper, we present techniques to protect bitslice block ciphers against power analysis attacks. We analyze and extend a technique proposed in [14]. We apply the technique to...
Joan Daemen, Michael Peeters, Gilles Van Assche
CHES
2006
Springer
124views Cryptology» more  CHES 2006»
14 years 2 months ago
A Proposition for Correlation Power Analysis Enhancement
Cryptographic devices are vulnerable to the nowadays well known side channel leakage analysis. Secret data can be revealed by power analysis attacks such as Simple Power Analysis (...
Thanh-Ha Le, Jessy Clédière, C&eacut...
ICCAD
1994
IEEE
144views Hardware» more  ICCAD 1994»
14 years 3 months ago
Power analysis of embedded software: a first step towards software power minimization
Embedded computer systems are characterized by the presence of a dedicated processor and the software that runs on it. Power constraints are increasingly becoming the critical com...
Vivek Tiwari, Sharad Malik, Andrew Wolfe
CHES
2000
Springer
135views Cryptology» more  CHES 2000»
14 years 3 months ago
Protecting Smart Cards from Passive Power Analysis with Detached Power Supplies
Power analysis is a very successful cryptanalytic technique which extracts secret information from smart cards by analysing the power consumed during the execution of their interna...
Adi Shamir