<--- Back to Details
First PageDocument Content
Cryptography / Advanced Encryption Standard / X86 instructions / Rambus / Side-channel attack / AES instruction set / Cryptography Research / Masking / Technology / Computing
Date: 2015-08-21 02:18:30
Cryptography
Advanced Encryption Standard
X86 instructions
Rambus
Side-channel attack
AES instruction set
Cryptography Research
Masking
Technology
Computing

Microarchitectures Undo Software Security Measures • To implement secure algorithms, software based cryptography utilizes the ISA through instructions or cryptographic extensions.

Add to Reading List

Source URL: www.hotchips.org

Download Document from Source Website

File Size: 433,27 KB

Share Document on Facebook

Similar Documents

Introduction SCA metrics Optimizing masking costs – nonlinear operations Optimizing masking costs – comparing CAESAR candidates Conclusions

Introduction SCA metrics Optimizing masking costs – nonlinear operations Optimizing masking costs – comparing CAESAR candidates Conclusions

DocID: 1xVSi - View Document

Introduction SCA metrics Optimizing masking costs – nonlinear operations Optimizing masking costs – comparing designs Conclusions

Introduction SCA metrics Optimizing masking costs – nonlinear operations Optimizing masking costs – comparing designs Conclusions

DocID: 1xVzt - View Document

Product: Masking Tape Dimensions: 2” × 165’  2.00

Product: Masking Tape Dimensions: 2” × 165’ 2.00

DocID: 1xVwp - View Document

Vectorizing Higher-Order Masking Benjamin Grégoire, Kostas Papagiannopoulos, Peter Schwabe, and Ko Stoffelen Motivation •

Vectorizing Higher-Order Masking Benjamin Grégoire, Kostas Papagiannopoulos, Peter Schwabe, and Ko Stoffelen Motivation •

DocID: 1xUrF - View Document

Product: Masking Tape Dimensions: 1” × 165’  1.00

Product: Masking Tape Dimensions: 1” × 165’ 1.00

DocID: 1xUdG - View Document