``Ooh Aah... Just a Little Bit'' : A Small Amount of Side Channel Can Go a Long Way (Englisch)
- Neue Suche nach: Benger, N.
- Neue Suche nach: van de Pol, J.
- Neue Suche nach: Smart, N.P.
- Neue Suche nach: Yarom, Y.
- Neue Suche nach: Benger, N.
- Neue Suche nach: van de Pol, J.
- Neue Suche nach: Smart, N.P.
- Neue Suche nach: Yarom, Y.
- Neue Suche nach: Batina, Lejla
- Neue Suche nach: Robshaw, Matthew
In:
Cryptographic hardware and embedded systems; CHES 2014
8731
;
75-92
;
2014
-
ISBN:
-
ISSN:
- Aufsatz (Konferenz) / Print
-
Titel:``Ooh Aah... Just a Little Bit'' : A Small Amount of Side Channel Can Go a Long Way
-
Beteiligte:Benger, N. ( Autor:in ) / van de Pol, J. ( Autor:in ) / Smart, N.P. ( Autor:in ) / Yarom, Y. ( Autor:in ) / Batina, Lejla / Robshaw, Matthew
-
Kongress:International workshop; 16th, Cryptographic hardware and embedded systems; CHES 2014 ; 2014 ; Busan, South Korea
-
Erschienen in:Cryptographic hardware and embedded systems; CHES 2014 , 8731 ; 75-92LECTURE NOTES IN COMPUTER SCIENCE , 8731 ; 75-92
-
Verlag:
- Neue Suche nach: Springer
-
Erscheinungsort:Heidelberg
-
Erscheinungsdatum:01.01.2014
-
Format / Umfang:18 pages
-
Anmerkungen:Includes bibliographical references and index. Also issued online.
-
ISBN:
-
ISSN:
-
Medientyp:Aufsatz (Konferenz)
-
Format:Print
-
Sprache:Englisch
-
Schlagwörter:
-
Datenquelle:
© Metadata Copyright the British Library Board and other contributors. All rights reserved.
Inhaltsverzeichnis Konferenzband
Die Inhaltsverzeichnisse werden automatisch erzeugt und basieren auf den im Index des TIB-Portals verfügbaren Einzelnachweisen der enthaltenen Beiträge. Die Anzeige der Inhaltsverzeichnisse kann daher unvollständig oder lückenhaft sein.
- 1
-
EM Attack Is Non-invasive? - Design Methodology and Validity Verification of EM Attack SensorHomma, N. / Hayashi, Y.-i. / Miura, N. / Fujimoto, D. / Tanaka, D. / Nagata, M. / Aoki, T. et al. | 2014
- 17
-
A New Framework for Constraint-Based Probabilistic Template Side Channel AttacksOren, Y. / Weisse, O. / Wool, A. et al. | 2014
- 35
-
How to Estimate the Success Rate of Higher-Order Side-Channel AttacksLomne, V. / Prouff, E. / Rivain, M. / Roche, T. / Thillard, A. et al. | 2014
- 55
-
Good Is Not Good Enough: Deriving Optimal Distinguishers from Communication TheoryHeuser, A. / Rioul, O. / Guilley, S. et al. | 2014
- 75
-
``Ooh Aah... Just a Little Bit'' : A Small Amount of Side Channel Can Go a Long WayBenger, N. / van de Pol, J. / Smart, N.P. / Yarom, Y. et al. | 2014
- 93
-
Destroying Fault Invariant with Randomization: A Countermeasure for AES against Differential Fault AttacksTupsamudre, H. / Bisht, S. / Mukhopadhyay, D. et al. | 2014
- 112
-
Reversing Stealthy Dopant-Level CircuitsSugawara, T. / Suzuki, D. / Fujii, R. / Tawa, S. / Hori, R. / Shiozaki, M. / Fujino, T. et al. | 2014
- 127
-
Constructing S-boxes for Lightweight Cryptography with Feistel StructureLi, Y. / Wang, M. et al. | 2014
- 147
-
A Statistical Model for Higher Order DPA on Masked DevicesDing, A.A. / Zhang, L. / Fei, Y. / Luo, P. et al. | 2014
- 170
-
Fast Evaluation of Polynomials over Binary Finite Fields and Application to Side-Channel CountermeasuresCoron, J.-S. / Roy, A. / Vivek, S. et al. | 2014
- 188
-
Secure Conversion between Boolean and Arithmetic Masking of Any OrderCoron, J.-S. / Grossschadl, J. / Vadnala, P.K. et al. | 2014
- 206
-
Making RSA-PSS Provably Secure against Non-random FaultsBarthe, G. / Dupressoir, F. / Fouque, P.-A. / Gregoire, B. / Tibouchi, M. / Zapalowicz, J.-C. et al. | 2014
- 223
-
Side-Channel Attack against RSA Key Generation AlgorithmsBauer, A. / Jaulmes, E. / Lomne, V. / Prouff, E. / Roche, T. et al. | 2014
- 242
-
Get Your Hands Off My Laptop: Physical Side-Channel Key-Extraction Attacks on PCsGenkin, D. / Pipman, I. / Tromer, E. et al. | 2014
- 261
-
RSA Meets DPA: Recovering RSA Secret Keys from Noisy Analog DataKunihiro, N. / Honda, J. et al. | 2014
- 279
-
Simple Power Analysis on AES Key Expansion RevisitedClavier, C. / Marion, D. / Wurcker, A. et al. | 2014
- 298
-
Efficient Pairings and ECC for Embedded SystemsUnterluggauer, T. / Wenger, E. et al. | 2014
- 316
-
Curve41417: Karatsuba RevisitedBernstein, D.J. / Chuengsatiansup, C. / Lange, T. et al. | 2014
- 335
-
Cofactorization on Graphics Processing UnitsMiele, A. / Bos, J.W. / Kleinjung, T. / Lenstra, A.K. et al. | 2014
- 353
-
Enhanced Lattice-Based Signatures on Reconfigurable HardwarePoppelmann, T. / Ducas, L. / Guneysu, T. et al. | 2014
- 371
-
Compact Ring-LWE CryptoprocessorRoy, S.S. / Vercauteren, F. / Mentens, N. / Chen, D.D. / Verbauwhede, I. et al. | 2014
- 392
-
ICEPOLE: High-Speed, Hardware-Oriented Authenticated EncryptionMorawiecki, P. / Gaj, K. / Homsirikamol, E. / Matusiewicz, K. / Pieprzyk, J. / Rogawski, M. / Srebrny, M. / Wojcik, M. et al. | 2014
- 414
-
FPGA Implementations of SPRING: And Their Countermeasures against Side-Channel AttacksBrenner, H. / Gaspar, L. / Leurent, G. / Rosen, A. / Standaert, F.-X. et al. | 2014
- 433
-
FOAM: Searching for Hardware-Optimal SPN Structures and Components with a Fair ComparisonKhoo, K. / Peyrin, T. / Poschmann, A.Y. / Yap, H. et al. | 2014
- 451
-
Secure Lightweight Entity Authentication with Strong PUFs: Mission Impossible?Delvaux, J. / Gu, D. / Schellekens, D. / Verbauwhede, I. et al. | 2014
- 476
-
Efficient Power and Timing Side Channels for Physical Unclonable FunctionsRuhrmair, U. / Xu, X. / Solter, J. / Mahmoud, A. / Majzoobi, M. / Koushanfar, F. / Burleson, W. et al. | 2014
- 493
-
Physical Characterization of Arbiter PUFsTajik, S. / Dietz, E. / Frohmann, S. / Seifert, J.-P. / Nedospasov, D. / Helfmeier, C. / Boit, C. / Dittrich, H. et al. | 2014
- 510
-
Bitline PUF: Building Native Challenge-Response PUF Capability into Any SRAMHolcomb, D.E. / Fu, K. et al. | 2014
- 527
-
Embedded Evaluation of Randomness in Oscillator Based Elementary TRNGFischer, V. / Lubicz, D. et al. | 2014
- 544
-
Entropy Evaluation for Oscillator-Based True Random Number GeneratorsMa, Y. / Lin, J. / Chen, T. / Xu, C. / Liu, Z. / Jing, J. et al. | 2014
- 562
-
Side-Channel Leakage through Static Power: Should We Care about in Practice?Moradi, A. et al. | 2014
- 580
-
Gate-Level Masking under a Path-Based Leakage MetricLeiserson, A.J. / Marson, M.E. / Wachs, M.A. et al. | 2014
- 598
-
Early Propagation and Imbalanced Routing, How to Diminish in FPGAsMoradi, A. / Immler, V. et al. | 2014