An Exploration of Mechanisms for Dynamic Cryptographic Instruction Set Extension (English)
Free access
- New search for: Grabher, Philipp
- New search for: Großschädl, Johann
- New search for: Hoerder, Simon
- New search for: Järvinen, Kimmo
- New search for: Page, Dan
- New search for: Tillich, Stefan
- New search for: Wójcik, Marcin
- New search for: Grabher, Philipp
- New search for: Großschädl, Johann
- New search for: Hoerder, Simon
- New search for: Järvinen, Kimmo
- New search for: Page, Dan
- New search for: Tillich, Stefan
- New search for: Wójcik, Marcin
In:
Cryptographic Hardware and Embedded Systems – CHES 2011
1
;
1-16
;
2011
- Article/Chapter (Book) / Electronic Resource
-
Title:An Exploration of Mechanisms for Dynamic Cryptographic Instruction Set Extension
-
Contributors:Grabher, Philipp ( author ) / Großschädl, Johann ( author ) / Hoerder, Simon ( author ) / Järvinen, Kimmo ( author ) / Page, Dan ( author ) / Tillich, Stefan ( author ) / Wójcik, Marcin ( author )
-
Published in:Lecture Notes in Computer Science ; 6917, 1 ; 1-16
-
Publisher:
- New search for: Springer Berlin Heidelberg
-
Place of publication:Berlin, Heidelberg
-
Publication date:2011-01-01
-
Size:16 pages
-
ISBN:
-
ISSN:
-
DOI:
-
Type of media:Article/Chapter (Book)
-
Type of material:Electronic Resource
-
Language:English
-
Keywords:
-
Source:
Table of contents eBook
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 1
-
An Exploration of Mechanisms for Dynamic Cryptographic Instruction Set ExtensionGrabher, Philipp / Großschädl, Johann / Hoerder, Simon / Järvinen, Kimmo / Page, Dan / Tillich, Stefan / Wójcik, Marcin et al. | 2011
- 17
-
FPGA-Based True Random Number Generation Using Circuit Metastability with Adaptive Feedback ControlMajzoobi, Mehrdad / Koushanfar, Farinaz / Devadas, Srinivas et al. | 2011
- 33
-
Generic Side-Channel Countermeasures for Reconfigurable DevicesGüneysu, Tim / Moradi, Amir et al. | 2011
- 49
-
Improved Collision-Correlation Power Analysis on First Order Protected AESClavier, Christophe / Feix, Benoit / Gagnerot, Georges / Roussellet, Mylène / Verneuil, Vincent et al. | 2011
- 63
-
Higher-Order Glitches Free Implementation of the AES Using Secure Multi-party Computation ProtocolsProuff, Emmanuel / Roche, Thomas et al. | 2011
- 79
-
Protecting AES with Shamir’s Secret Sharing SchemeGoubin, Louis / Martinelli, Ange et al. | 2011
- 95
-
A Fast and Provably Secure Higher-Order Masking of AES S-BoxKim, HeeSeok / Hong, Seokhie / Lim, Jongin et al. | 2011
- 108
-
Software Implementation of Binary Elliptic Curves: Impact of the Carry-Less Multiplier on Scalar MultiplicationTaverne, Jonathan / Faz-Hernández, Armando / Aranha, Diego F. / Rodríguez-Henríquez, Francisco / Hankerson, Darrel / López, Julio et al. | 2011
- 124
-
High-Speed High-Security SignaturesBernstein, Daniel J. / Duif, Niels / Lange, Tanja / Schwabe, Peter / Yang, Bo-Yin et al. | 2011
- 143
-
To Infinity and Beyond: Combined Attack on ECC Using Points of Low OrderFan, Junfeng / Gierlichs, Benedikt / Vercauteren, Frederik et al. | 2011
- 160
-
Random Sampling for Short Lattice Vectors on Graphics CardsSchneider, Michael / Göttert, Norman et al. | 2011
- 176
-
Extreme Enumeration on GPU and in CloudsKuo, Po-Chun / Schneider, Michael / Dagdelen, Özgür / Reichelt, Jan / Buchmann, Johannes / Cheng, Chen-Mou / Yang, Bo-Yin et al. | 2011
- 192
-
Modulus Fault Attacks against RSA-CRT SignaturesBrier, Éric / Naccache, David / Nguyen, Phong Q. / Tibouchi, Mehdi et al. | 2011
- 207
-
Breaking Mifare DESFire MF3ICD40: Power Analysis and Templates in the Real WorldOswald, David / Paar, Christof et al. | 2011
- 223
-
Information Theoretic and Security Analysis of a 65-Nanometer DDSLL AES S-BoxRenauld, Mathieu / Kamel, Dina / Standaert, François-Xavier / Flandre, Denis et al. | 2011
- 240
-
Thwarting Higher-Order Side Channel Analysis with Additive and Multiplicative MaskingsGenelle, Laurie / Prouff, Emmanuel / Quisquater, Michaël et al. | 2011
- 256
-
Extractors against Side-Channel Attacks: Weak or Strong?Medwed, Marcel / Standaert, François-Xavier et al. | 2011
- 273
-
Standardization Works for Security Regarding the Electromagnetic EnvironmentTominaga, Tetsuya et al. | 2011
- 274
-
Meet-in-the-Middle and Impossible Differential Fault Analysis on AESDerbez, Patrick / Fouque, Pierre-Alain / Leresteux, Delphine et al. | 2011
- 292
-
On the Power of Fault Sensitivity Analysis and Collision Side-Channel Attacks in a Combined SettingMoradi, Amir / Mischke, Oliver / Paar, Christof / Li, Yang / Ohta, Kazuo / Sakiyama, Kazuo et al. | 2011
- 312
-
spongent: A Lightweight Hash FunctionBogdanov, Andrey / Knežević, Miroslav / Leander, Gregor / Toz, Deniz / Varıcı, Kerem / Verbauwhede, Ingrid et al. | 2011
- 326
-
The LED Block CipherGuo, Jian / Peyrin, Thomas / Poschmann, Axel / Robshaw, Matt et al. | 2011
- 342
-
Piccolo: An Ultra-Lightweight BlockcipherShibutani, Kyoji / Isobe, Takanori / Hiwatari, Harunaga / Mitsuda, Atsushi / Akishita, Toru / Shirai, Taizo et al. | 2011
- 358
-
Lightweight and Secure PUF Key Storage Using Limits of Machine LearningYu, Meng-Day (Mandel) / M’Raihi, David / Sowell, Richard / Devadas, Srinivas et al. | 2011
- 374
-
Recyclable PUFs: Logically Reconfigurable PUFsKatzenbeisser, Stefan / Koçabas, Ünal / Leest, Vincent / Sadeghi, Ahmad-Reza / Schrijen, Geert-Jan / Schröder, Heike / Wachsmann, Christian et al. | 2011
- 390
-
Uniqueness Enhancement of PUF Responses Based on the Locations of Random Outputting RS LatchesYamamoto, Dai / Sakiyama, Kazuo / Iwamoto, Mitsugu / Ohta, Kazuo / Ochiai, Takao / Takenaka, Masahiko / Itoh, Kouichi et al. | 2011
- 407
-
MECCA: A Robust Low-Overhead PUF Using Embedded Memory ArrayKrishna, Aswin Raghav / Narasimhan, Seetharam / Wang, Xinmu / Bhunia, Swarup et al. | 2011
- 421
-
FPGA Implementation of Pairings Using Residue Number System and Lazy ReductionCheung, Ray C. C. / Duquesne, Sylvain / Fan, Junfeng / Guillermin, Nicolas / Verbauwhede, Ingrid / Yao, Gavin Xiaoxu et al. | 2011
- 442
-
High Speed Cryptoprocessor for η T Pairing on 128-bit Secure Supersingular Elliptic Curves over Characteristic Two FieldsGhosh, Santosh / Roychowdhury, Dipanwita / Das, Abhijit et al. | 2011
- 459
-
Fast Multi-precision Multiplication for Public-Key Cryptography on Embedded MicroprocessorsHutter, Michael / Wenger, Erich et al. | 2011
- 475
-
Small Public Keys and Fast Verification for $\mathcal{M}$ ultivariate $\mathcal{Q}$ uadratic Public Key SystemsPetzoldt, Albrecht / Thomae, Enrico / Bulygin, Stanislav / Wolf, Christopher et al. | 2011
- 491
-
Throughput vs. Area Trade-offs in High-Speed Architectures of Five Round 3 SHA-3 Candidates Implemented Using Xilinx and Altera FPGAsHomsirikamol, Ekawat / Rogawski, Marcin / Gaj, Kris et al. | 2011
- 507
-
Efficient Hashing Using the AES Instruction SetBos, Joppe W. / Özen, Onur / Stam, Martijn et al. | 2011