Side channel attack

Results: 129



#Item
51Block ciphers / CPU cache / Ciphertext / Side channel attack / Lookup table / ICE / UES / Cryptanalysis / Cellular Message Encryption Algorithm / Cryptography / Data Encryption Standard / Advanced Encryption Standard

Efficient Cache Attacks on AES, and Countermeasures Eran Tromer1 2 , Dag Arne Osvik3 and Adi Shamir2 1 Computer Science and Artificial Intelligence Laboratory, Massachusetts Institute of Technology,

Add to Reading List

Source URL: www.cs.tau.ac.il

Language: English - Date: 2009-06-25 15:56:23
52Side channel attack / Advantage / Cryptography / Random oracle / Public-key cryptography

On Continuous After-the-Fact Leakage-Resilient Key Exchange ∗ Mohsen Toorani Department of Informatics

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-12-20 20:07:33
53RSA / Adversary / Cryptographic primitive / Cryptography / Public-key cryptography / Side channel attack

SCA1 Model: Towards a concrete security approach to the design of cryptosystems secure against side-channel attacks1,2 Filipe Rosado da-Fonseca Lisbon, Portugal Email:

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2004-12-23 06:54:05
54Side channel attack / Data Encryption Standard / Entropy / Correlation attack / RSA / Cryptanalysis / Cipher / Cryptography / Espionage / Power analysis

Improving the Rules of the DPA Contest Fran¸cois-Xavier Standaert⋆ , Philippe Bulens, Giacomo de Meulenaer, Nicolas Veyrat-Charvillon UCL Crypto Group, Universit´e catholique de Louvain, B-1348 Louvain-la-Neuve. e-ma

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2008-12-08 08:57:29
55SHA-2 / SHA-1 / NIST hash function competition / HMAC / Keccak / Skein / Crypt / Side channel attack / Computer security / Error detection and correction / Cryptographic hash functions / Cryptography

An Evaluation of Hash Functions on a Power Analysis Resistant Processor Architecture Simon Hoerder1 , Marcin Wojcik1 , Stefan Tillich1 , Dan Page1 {hoerder, wojcik, tillich, page}@compsci.bristol.ac.uk Department of Comp

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2010-12-01 12:22:01
56Measurement / Probability theory / Regression analysis / Normal distribution / Statistical hypothesis testing / Standard deviation / Pearson product-moment correlation coefficient / Errors and residuals in statistics / Variance / Statistics / Statistical inference / Data analysis

Success through confidence: Evaluating the effectiveness of a side-channel attack. Adrian Thillard, Emmanuel Prouff, and Thomas Roche ANSSI, 51, Bd de la Tour-Maubourg, 75700 Paris 07 SP, France .f

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-05-04 07:23:23
57Fabless semiconductor companies / Reconfigurable computing / Xilinx / Field-programmable gate array / Elliptic curve cryptography / Power analysis / Multiplication algorithm / Multiplication / Side channel attack / Electronic engineering / Mathematics / Electronics

How Different Electrical Circuits of ECC Designs Influence the Shape of Power Traces measured on FPGA Thomas Basmer, Christian Wittke, Zoya Dyka, and Peter Langendoerfer System dept., IHP, Im Technologiepark 25,

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-12-19 03:59:09
58Side channel attack / Mathematics / Algorithm / Mathematical logic / Theoretical computer science

A DPA Attack on the Improved Ha-Moon Algorithm? Dong Jin PARK and Pil Joong LEE Information Security Laboratory, Dept. of EEE, POSTECH, Pohang, Korea ,

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2004-12-14 23:21:31
59Elliptic curve cryptography / Reconfigurable computing / Power analysis / Side channel attack / Multiplication / Field-programmable gate array / Advanced Encryption Standard / Elliptic curve point multiplication / Xilinx / Cryptography / Mathematics / Espionage

Individualizing Electrical Circuits of Cryptographic Devices as a Means to Hinder Tampering Attacks Zoya Dyka, Thomas Basmer, Christian Wittke and Peter Langendoerfer System dept., IHP Frankfurt(Oder), Germany

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-05-08 10:18:14
60Advantage / Digital signature / Security parameter / Cryptographic primitive / RSA / Side channel attack / Cipher / Cryptographic protocol / Encryption / Cryptography / Public-key cryptography / Ciphertext indistinguishability

How to Keep a Secret: Leakage Deterring Public-key Cryptography? Aggelos Kiayias and Qiang Tang National and Kapodistrian University of Athens and University of Connecticut ,

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2013-12-17 11:16:56
UPDATE