• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 100,481
Next 10 →

Differential Power Analysis

by Paul Kocher, Joshua Jaffe, Benjamin Jun , 1999
"... Cryptosystem designers frequently assume that secrets will be manipulated in closed, reliable computing environments. Unfortunately, actual computers and microchips leak information about the operations they process. This paper examines specific methods for analyzing power consumption measuremen ..."
Abstract - Cited by 1121 (7 self) - Add to MetaCart
Cryptosystem designers frequently assume that secrets will be manipulated in closed, reliable computing environments. Unfortunately, actual computers and microchips leak information about the operations they process. This paper examines specific methods for analyzing power consumption

Differential Power Analysis of a

by Mceliece Cryptosystem, Cong Chen, Thomas Eisenbarth, Ingo Von Maurich, Rainer Steinw
"... Abstract. This work presents the first differential power analysis of an implementation of the McEliece cryptosystem. Target of this side-channel attack is a state-of-the-art FPGA implementation of the efficient QC-MDPC McEliece decryption operation as presented at DATE 2014. The presented cryptanal ..."
Abstract - Add to MetaCart
Abstract. This work presents the first differential power analysis of an implementation of the McEliece cryptosystem. Target of this side-channel attack is a state-of-the-art FPGA implementation of the efficient QC-MDPC McEliece decryption operation as presented at DATE 2014. The presented

Resistance against Differential Power Analysis for Elliptic Curve Cryptosystems

by Jean-Sebastien Coron , 1999
"... Differential Power Analysis, first introduced by Kocher et al. in [14], is a powerful technique allowing to recover secret smart card information by monitoring power signals. In [14] a specific DPA attack against smart-cards running the DES algorithm was described. As few as 1000 encryptions were su ..."
Abstract - Cited by 250 (2 self) - Add to MetaCart
Differential Power Analysis, first introduced by Kocher et al. in [14], is a powerful technique allowing to recover secret smart card information by monitoring power signals. In [14] a specific DPA attack against smart-cards running the DES algorithm was described. As few as 1000 encryptions were

On Second-Order Differential Power Analysis

by Marc Joye, Pascal Paillier, Berry Schoenmakers - Cryptographic Hardware and Embedded Systems – CHES 2005, 7th International Workshop , 2005
"... Abstract. Differential Power Analysis (DPA) is a powerful cryptanalytic technique aiming at extracting secret data from a cryptographic device by collecting power consumption traces and averaging over a series of acquisitions. In order to prevent the leakage, hardware designers and software programm ..."
Abstract - Cited by 23 (0 self) - Add to MetaCart
Abstract. Differential Power Analysis (DPA) is a powerful cryptanalytic technique aiming at extracting secret data from a cryptographic device by collecting power consumption traces and averaging over a series of acquisitions. In order to prevent the leakage, hardware designers and software

with Differential Power Analysis

by Giorgio Di Natale, Marie-lise Flottes, Bruno Rouzeyre, Giorgio Di Natale, Marie-lise Flottes, Bruno Rouzeyre, Observability Stuck-at-faults, Hal Id Lirmm, Giorgio Di Natale, Marie-lise Flottes, Bruno Rouzeyre , 2008
"... HAL is a multi-disciplinary open access archive for the deposit and dissemination of sci-entific research documents, whether they are pub-lished or not. The documents may come from teaching and research institutions in France or abroad, or from public or private research centers. L’archive ouverte p ..."
Abstract - Add to MetaCart
HAL is a multi-disciplinary open access archive for the deposit and dissemination of sci-entific research documents, whether they are pub-lished or not. The documents may come from teaching and research institutions in France or abroad, or from public or private research centers. L’archive ouverte pluridisciplinaire HAL, est destinée au dépôt et a ̀ la diffusion de documents scientifiques de niveau recherche, publiés ou non, émanant des établissements d’enseignement et de recherche français ou étrangers, des laboratoires publics ou privés. Observability of Stuck-at-Faults

Differential Power Analysis of Stream Ciphers

by W. Fischer, B. M. Gammel, O. Kniffler, J. Velten - of Lecture Notes in Computer Science , 2007
"... Abstract. Side-channel attacks on block ciphers and public key algorithms have been discussed extensively. However, there is only sparse literature about side-cannel attacks on stream ciphers. The few existing references mainly treat timing [8] and template attacks [10], or provide a theoretical ana ..."
Abstract - Cited by 8 (0 self) - Add to MetaCart
analysis [6], [7] of weaknesses of stream cipher constructions. In this paper we present attacks on two focus candidates, Trivium and Grain, of the eSTREAM stream cipher project. The attacks exploit the resynchronization phase of ciphers. A novel concept for choosing initial value vectors is introduced

Differential Power Analysis of Stream Ciphers

by Berndt M. Gammel, Oliver Kniffler, Joachim Velten
"... Abstract. Side-channel attacks on block ciphers and public key algorithms have been discussed extensively. However, there is only sparse literature about side-cannel attacks on stream ciphers. The few existing references mainly treat timing [10] and template attacks [13], or provide a theoretical an ..."
Abstract - Cited by 2 (0 self) - Add to MetaCart
. For both stream ciphers we are able to reveal the complete key. Keywords: side-channel attack, power analysis, DPA, stream cipher, Trivium, Grain. 1

Differential Power Analysis Model and Some Results

by Sylvain Guilley, Renaud Pacalet - In proceedings of CARDIS 2004 , 2004
"... Abstract CMOS gates consume different amounts of power whether their output has a falling or a rising edge. Therefore the overall power consumption of a CMOS circuit leaks information about the activity of every single gate. This explains why, using differential power analysis (DPA), one can infer t ..."
Abstract - Cited by 25 (5 self) - Add to MetaCart
Abstract CMOS gates consume different amounts of power whether their output has a falling or a rising edge. Therefore the overall power consumption of a CMOS circuit leaks information about the activity of every single gate. This explains why, using differential power analysis (DPA), one can infer

Differential Power Analysis of an AES Implementation

by Technische Universität Graz, Inffeldgasse A, Andreas Schuster, Supervised Elisabeth Oswald, Tu Graz, Andreas Schuster, Supervised Elisabeth Oswald , 2004
"... Implementation Version 1.0 ..."
Abstract - Add to MetaCart
Implementation Version 1.0

Resistance Against Differential Power Analysis

by unknown authors
"... x given some element y = gx of G. The discrete logarithm problem overan EC seems to be much harder than in other groups such as the multiplicative ..."
Abstract - Add to MetaCart
x given some element y = gx of G. The discrete logarithm problem overan EC seems to be much harder than in other groups such as the multiplicative
Next 10 →
Results 1 - 10 of 100,481
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University