Back to Results
First PageMeta Content
Block cipher modes of operation / Encryption software / Mask / Entropy / Cryptography / Advanced Encryption Standard / Stream cipher


Detecting Hidden Leakages Amir Moradi1 , Sylvain Guilley2,3 , Annelie Heuser2? 1 Horst Görtz Institute for IT Security, Ruhr University Bochum, Germany
Add to Reading List

Document Date: 2014-03-28 12:51:32


Open Document

File Size: 2,16 MB

Share Result on Facebook

City

Paris / /

Company

Secure-IC S.A.S. / Google / Xilinx / the AES / Crypto Group / /

Country

Germany / France / /

/

Facility

Horst Görtz Institute / /

IndustryTerm

discussions and analysis tools / substitution permutation network / embedded cryptographic solutions / software implementation / software-based platforms / masked software implementations / /

Organization

Horst Görtz Institute for IT Security / /

Position

CPA / /

Product

S.A.S / /

ProgrammingLanguage

C / /

Technology

encryption / FPGA / secret key / flash memory / stream cipher / /

SocialTag