-
1
-
-
37149012925
-
Security-Performance Trade-offs in Embedded Systems Using Flexible ECC Hardware
-
Alrimeih, H., Rakhmatov, D.: Security-Performance Trade-offs in Embedded Systems Using Flexible ECC Hardware. IEEE Design & Test of Computers 24(6), 556-569 (2007)
-
(2007)
IEEE Design & Test of Computers
, vol.24
, Issue.6
, pp. 556-569
-
-
Alrimeih, H.1
Rakhmatov, D.2
-
2
-
-
84939573910
-
Differential power analysis
-
Wiener, M, ed, CRYPTO 1999, Springer, Heidelberg
-
Kocher, C., Jaffe, J., Jun, B.: Differential power analysis. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 388-397. Springer, Heidelberg (1999)
-
(1999)
LNCS
, vol.1666
, pp. 388-397
-
-
Kocher, C.1
Jaffe, J.2
Jun, B.3
-
4
-
-
34548319046
-
Design Methods for Security and Trust
-
Verbauwhede, I., Schaumont, P.: Design Methods for Security and Trust. In: Proceedings of the conference on Design, automation and test in Europe - DATE 2007, pp. 1-6 (2007)
-
(2007)
Proceedings of the conference on Design, automation and test in Europe
, vol.DATE 2007
, pp. 1-6
-
-
Verbauwhede, I.1
Schaumont, P.2
-
5
-
-
84949979593
-
A Countermeasure against One Physical Cryptanalysis May Benefit Another Attack
-
Kim, K.-c, ed, ICISC 2001, Springer, Heidelberg
-
Yen, S.-M., Kim, S., Lim, S., Moon, S.-J.: A Countermeasure against One Physical Cryptanalysis May Benefit Another Attack. In: Kim, K.-c. (ed.) ICISC 2001. LNCS, vol. 2288, pp. 414-427. Springer, Heidelberg (2002)
-
(2002)
LNCS
, vol.2288
, pp. 414-427
-
-
Yen, S.-M.1
Kim, S.2
Lim, S.3
Moon, S.-J.4
-
6
-
-
37149051633
-
-
Baek, Y.-J., Vasyltsov, I.: How to prevent DPA and fault attack in a unified way for ECC scalar multiplication - ring extension method. In: Dawson, E., Wong, D.S. (eds.) ISPEC 2007. LNCS, 4464, pp. 225-237. Springer, Heidelberg (2007)
-
Baek, Y.-J., Vasyltsov, I.: How to prevent DPA and fault attack in a unified way for ECC scalar multiplication - ring extension method. In: Dawson, E., Wong, D.S. (eds.) ISPEC 2007. LNCS, vol. 4464, pp. 225-237. Springer, Heidelberg (2007)
-
-
-
-
7
-
-
33750111732
-
Multilevel Design Validation in a Secure Embedded System
-
Schaumont, P., Hwang, D., Yang, S., Verbauwhede, I.: Multilevel Design Validation in a Secure Embedded System. IEEE Transactions on Computers 55(11), 1380-1390 (2006)
-
(2006)
IEEE Transactions on Computers
, vol.55
, Issue.11
, pp. 1380-1390
-
-
Schaumont, P.1
Hwang, D.2
Yang, S.3
Verbauwhede, I.4
-
8
-
-
11244267013
-
-
Springer, Heidelberg
-
Hankerson, D., Menezes, A., Vanstone, S.: Guide to Elliptic Curve Cryptography. Springer, Heidelberg (2004)
-
(2004)
Guide to Elliptic Curve Cryptography
-
-
Hankerson, D.1
Menezes, A.2
Vanstone, S.3
-
9
-
-
84947913604
-
-
m). In: Koç, Ç.K., Paar, C. (eds.) CHES 1999. LNCS, 1717, pp. 316-327. Springer, Heidelberg (1999)
-
m). In: Koç, Ç.K., Paar, C. (eds.) CHES 1999. LNCS, vol. 1717, pp. 316-327. Springer, Heidelberg (1999)
-
-
-
-
10
-
-
33750822634
-
-
m). In: ISCAS 2001, IV, pp. 37-40. IEEE, Los Alamitos (2001)
-
m). In: ISCAS 2001, vol. IV, pp. 37-40. IEEE, Los Alamitos (2001)
-
-
-
-
11
-
-
33748500029
-
-
m) Multipliers for Curve-Based Cryptography. IEEE Transactions on Computers 55(10), 1306-1311 (2006)
-
m) Multipliers for Curve-Based Cryptography. IEEE Transactions on Computers 55(10), 1306-1311 (2006)
-
-
-
-
12
-
-
38049017286
-
-
Springer, Heidelberg
-
Rodríguez-Henríquez, F., Saqib, N.A., Díaz- Pérez, A., Koç, Ç.K.: Cryptographic Algorithms on Reconfigurable Hardware. Springer, Heidelberg (2006)
-
(2006)
Cryptographic Algorithms on Reconfigurable Hardware
-
-
Rodríguez-Henríquez, F.1
Saqib, N.A.2
Díaz- Pérez, A.3
Koç, C.K.4
-
13
-
-
33750829460
-
-
Koschuch, M., Lechner, J., Weitzer, A., Großschädl, J., Szekely, A., Tillich, S., Wolkerstorfer, J.: Hardware/Software co-design of elliptic curve cryptography on an 8051 microcontroller. In: Goubin, L., Matsui, M. (eds.) CHES 2006. LNCS, 4249, pp. 430-444. Springer, Heidelberg (2006)
-
Koschuch, M., Lechner, J., Weitzer, A., Großschädl, J., Szekely, A., Tillich, S., Wolkerstorfer, J.: Hardware/Software co-design of elliptic curve cryptography on an 8051 microcontroller. In: Goubin, L., Matsui, M. (eds.) CHES 2006. LNCS, vol. 4249, pp. 430-444. Springer, Heidelberg (2006)
-
-
-
-
14
-
-
33750695616
-
-
Sakiyama, K., Batina, L., Preneel, B., Verbauwhede, I.: Superscalar Coprocessor for High-Speed Curve-Based Cryptography. In: Goubin, L., Matsui, M. (eds.) CHES 2006. LNCS, 4249, pp. 415-429. Springer, Heidelberg (2006)
-
Sakiyama, K., Batina, L., Preneel, B., Verbauwhede, I.: Superscalar Coprocessor for High-Speed Curve-Based Cryptography. In: Goubin, L., Matsui, M. (eds.) CHES 2006. LNCS, vol. 4249, pp. 415-429. Springer, Heidelberg (2006)
-
-
-
-
15
-
-
47949090625
-
Passive and Active Combined Attacks: Combining Fault Attacks and Side Channel Analysis. In: FDTC
-
Los Alamitos
-
Amiel, F., Villegas, K., Feix, B., Marcel, L.: Passive and Active Combined Attacks: Combining Fault Attacks and Side Channel Analysis. In: FDTC 2007, pp. 92-102. IEEE, Los Alamitos (2007)
-
(2007)
92-102. IEEE
, pp. 2007
-
-
Amiel, F.1
Villegas, K.2
Feix, B.3
Marcel, L.4
-
16
-
-
84880293917
-
-
Coron, J.-S.: Resistance against differential power analysis for elliptic curve. In: Koç, Ç.K., Paar, C. (eds.) CHES 1999. LNCS, 1717, pp. 292-302. Springer, Heidelberg (1999)
-
Coron, J.-S.: Resistance against differential power analysis for elliptic curve. In: Koç, Ç.K., Paar, C. (eds.) CHES 1999. LNCS, vol. 1717, pp. 292-302. Springer, Heidelberg (1999)
-
-
-
-
17
-
-
35248817849
-
-
Agrawal, D., Archambeault, B., Rao, J.R., Rohatgi, P.: The EM side-channel(s). In: Kaliski Jr., B.S., Koç, Ç.K., Paar, C. (eds.) CHES 2002. LNCS, 2523, pp. 29-45. Springer, Heidelberg (2003)
-
Agrawal, D., Archambeault, B., Rao, J.R., Rohatgi, P.: The EM side-channel(s). In: Kaliski Jr., B.S., Koç, Ç.K., Paar, C. (eds.) CHES 2002. LNCS, vol. 2523, pp. 29-45. Springer, Heidelberg (2003)
-
-
-
-
18
-
-
84894447348
-
Parallel FPGA implementation of RSA with residue number systems - can side-channel threats be avoided?
-
IEEE Computer Society Press, Los Alamitos
-
Ciet, M., Neve, M., Peeters, E., Quisquater, J.: Parallel FPGA implementation of RSA with residue number systems - can side-channel threats be avoided? In: IEEE International Symposium on Micro-NanoMechatronics and Human Science, vol. 2, pp. 806-810. IEEE Computer Society Press, Los Alamitos (2003)
-
(2003)
IEEE International Symposium on Micro-NanoMechatronics and Human Science
, vol.2
, pp. 806-810
-
-
Ciet, M.1
Neve, M.2
Peeters, E.3
Quisquater, J.4
-
19
-
-
35248881073
-
-
Fouque, P.-A., Valette, F.: The Doubling Attack - Why Upwards Is Better than Downwards. In: Walter, C.D., Koç, Ç.K., Paar, C. (eds.) CHES 2003. LNCS, 2779, pp. 269-280. Springer, Heidelberg (2003)
-
Fouque, P.-A., Valette, F.: The Doubling Attack - Why Upwards Is Better than Downwards. In: Walter, C.D., Koç, Ç.K., Paar, C. (eds.) CHES 2003. LNCS, vol. 2779, pp. 269-280. Springer, Heidelberg (2003)
-
-
-
-
20
-
-
18744405402
-
Elliptic Curve Cryptosystems in the Presence of Permanent and Transient Faults
-
Ciet, M., Joye, M.: Elliptic Curve Cryptosystems in the Presence of Permanent and Transient Faults. Design, Codes and Cryptography 36, 33-43 (2005)
-
(2005)
Design, Codes and Cryptography
, vol.36
, pp. 33-43
-
-
Ciet, M.1
Joye, M.2
-
21
-
-
33845275817
-
-
Blömer, J., Otto, M., Seifert, J.-P.: Sign change fault attacks on elliptic curve cryptosystems. In: Breveglieri, L., Koren, I., Naccache, D., Seifert, J.-P. (eds.) FDTC 2006. LNCS, 4236, pp. 36-52. Springer, Heidelberg (2006)
-
Blömer, J., Otto, M., Seifert, J.-P.: Sign change fault attacks on elliptic curve cryptosystems. In: Breveglieri, L., Koren, I., Naccache, D., Seifert, J.-P. (eds.) FDTC 2006. LNCS, vol. 4236, pp. 36-52. Springer, Heidelberg (2006)
-
-
-
-
22
-
-
0034276289
-
Checking before output not be enough against fault-based cryptanalysis
-
Yen, S.-M., Joye, M.: Checking before output not be enough against fault-based cryptanalysis. IEEE Trans. on Computers 49(9), 967-970 (2000)
-
(2000)
IEEE Trans. on Computers
, vol.49
, Issue.9
, pp. 967-970
-
-
Yen, S.-M.1
Joye, M.2
-
23
-
-
84983134283
-
Differential Fault Attacks on Elliptic Curve Cryptosystems
-
Bellare, M, ed, CRYPTO 2000, Springer, Heidelberg
-
Biehl, I., Meyer, B., Müller, V.: Differential Fault Attacks on Elliptic Curve Cryptosystems. In: Bellare, M. (ed.) CRYPTO 2000. LNCS, vol. 1880, pp. 131-146. Springer, Heidelberg (2000)
-
(2000)
LNCS
, vol.1880
, pp. 131-146
-
-
Biehl, I.1
Meyer, B.2
Müller, V.3
-
24
-
-
52949099582
-
-
FDTC2008, pp, IEEE, Los Alamitos 2008
-
Fouque, P.-A., Lercier, R., Real, D., Valette, F.: Fault Attack on Elliptic Curve with Montgomery Ladder Implementation. In: FDTC2008, pp. 92-98. IEEE, Los Alamitos (2008)
-
Fault Attack on Elliptic Curve with Montgomery Ladder Implementation
, pp. 92-98
-
-
Fouque, P.-A.1
Lercier, R.2
Real, D.3
Valette, F.4
-
25
-
-
47949128115
-
How can we overcome both side channel analysis and fault attacks on RSA-CRT? In: FDTC
-
Los Alamitos
-
Kim, C.H., Quisquater, J.-J.: How can we overcome both side channel analysis and fault attacks on RSA-CRT? In: FDTC 2007, pp. 21-29. IEEE, Los Alamitos (2007)
-
(2007)
21-29. IEEE
, pp. 2007
-
-
Kim, C.H.1
Quisquater, J.-J.2
-
26
-
-
52949134889
-
-
Joye, M.: On the Security of a Unified Countermeasure. In: FDTC 2008, pp. 87-91. IEEE, Los Alamitos (2008)
-
Joye, M.: On the Security of a Unified Countermeasure. In: FDTC 2008, pp. 87-91. IEEE, Los Alamitos (2008)
-
-
-
-
27
-
-
0142156711
-
-
Joye, M., Ciet, M. (Virtually) Free Randomization Techniques for Elliptic Curve Cryptography. In: Qing, S., Gollmann, D., Zhou, J. (eds.) ICICS 2003. LNCS, 2836, pp. 348-359. Springer, Heidelberg (2003)
-
Joye, M., Ciet, M. (Virtually) Free Randomization Techniques for Elliptic Curve Cryptography. In: Qing, S., Gollmann, D., Zhou, J. (eds.) ICICS 2003. LNCS, vol. 2836, pp. 348-359. Springer, Heidelberg (2003)
-
-
-
-
28
-
-
33947318808
-
Electromagnetic Analysis Attack on an FPGA Implementation of an Elliptic Curve Cryptosystem
-
IEEE, Los Alamitos
-
De Mulder, E., Ors, S.B., Preneel, B., Verbauwhede, I.: Electromagnetic Analysis Attack on an FPGA Implementation of an Elliptic Curve Cryptosystem. In: EUROCON 2005, vol. 2, pp. 1879-1882. IEEE, Los Alamitos (2005)
-
(2005)
EUROCON
, vol.2
, pp. 1879-1882
-
-
De Mulder, E.1
Ors, S.B.2
Preneel, B.3
Verbauwhede, I.4
-
29
-
-
70350059460
-
-
Guo, X., Schaumont, P.: Optimizing the HW/SW Boundary of an ECC SoC Design Using Control Hierarchy and Distributed Storage. In: DATE 2009, pp. 454-459. EDAA (2009)
-
Guo, X., Schaumont, P.: Optimizing the HW/SW Boundary of an ECC SoC Design Using Control Hierarchy and Distributed Storage. In: DATE 2009, pp. 454-459. EDAA (2009)
-
-
-
-
30
-
-
67149129961
-
-
Guo, X., Schaumont, P.: Optimizing the Control Hierarchy of an ECC Coprocessor Design on an FPGA based SoC Platform. In: Becker, J., Woods, R., Athanas, P., Morgan, F. (eds.) ARC 2009. LNCS, 5453, pp. 169-180. Springer, Heidelberg (2009)
-
Guo, X., Schaumont, P.: Optimizing the Control Hierarchy of an ECC Coprocessor Design on an FPGA based SoC Platform. In: Becker, J., Woods, R., Athanas, P., Morgan, F. (eds.) ARC 2009. LNCS, vol. 5453, pp. 169-180. Springer, Heidelberg (2009)
-
-
-
-
31
-
-
33845221322
-
-
Malkin, T.G., Standaert, F.-X., Yung, M.: A Comparative Cost/Security Analysis of Fault Attack Countermeasures. In: Breveglieri, L., Koren, I., Naccache, D., Seifert, J.-P. (eds.) FDTC 2006. LNCS, 4236, pp. 159-172. Springer, Heidelberg (2006)
-
Malkin, T.G., Standaert, F.-X., Yung, M.: A Comparative Cost/Security Analysis of Fault Attack Countermeasures. In: Breveglieri, L., Koren, I., Naccache, D., Seifert, J.-P. (eds.) FDTC 2006. LNCS, vol. 4236, pp. 159-172. Springer, Heidelberg (2006)
-
-
-
-
32
-
-
33645675518
-
AES-Based Security Coprocessor IC in 0.18um CMOS with resistance to differential power analysis side-channel attacks
-
Hwang, D., Tiri, K., Hodjat, A., Lai, B.C., Yang, S., Schaumont, P., Verbauwhede, I.: AES-Based Security Coprocessor IC in 0.18um CMOS with resistance to differential power analysis side-channel attacks. IEEE Journal of Solid-State Circuits 41(4), 781-791 (2006)
-
(2006)
IEEE Journal of Solid-State Circuits
, vol.41
, Issue.4
, pp. 781-791
-
-
Hwang, D.1
Tiri, K.2
Hodjat, A.3
Lai, B.C.4
Yang, S.5
Schaumont, P.6
Verbauwhede, I.7
-
33
-
-
33750719570
-
-
Chen, Z., Zhou, Y.: Dual-Rail Random Switching Logic: A Countermeasure to Reduce Side-Channel Leakage. In: Goubin, L., Matsui, M. (eds.) CHES 2006. LNCS, 4249, pp. 242-254. Springer, Heidelberg (2006)
-
Chen, Z., Zhou, Y.: Dual-Rail Random Switching Logic: A Countermeasure to Reduce Side-Channel Leakage. In: Goubin, L., Matsui, M. (eds.) CHES 2006. LNCS, vol. 4249, pp. 242-254. Springer, Heidelberg (2006)
-
-
-
-
34
-
-
33747624721
-
-
Giraud, C.: An RSA Implementation Resistant to Fault Attacks and to Simple Power Analysis. IEEE Trans. on Computers 55(9), 1116-1120 (2006)
-
Giraud, C.: An RSA Implementation Resistant to Fault Attacks and to Simple Power Analysis. IEEE Trans. on Computers 55(9), 1116-1120 (2006)
-
-
-
-
35
-
-
58449112739
-
-
Koschuch, M., Großschädl, J., Payer, U., Hudler, M., Krüger, M.: Workload Characterization of a Lightweight SSL Implementation Resistant to Side-Channel Attacks. In: Franklin, M.K., Hui, L.C.K., Wong, D.S. (eds.) CANS 2008. LNCS, 5339, pp. 349-365. Springer, Heidelberg (2008)
-
Koschuch, M., Großschädl, J., Payer, U., Hudler, M., Krüger, M.: Workload Characterization of a Lightweight SSL Implementation Resistant to Side-Channel Attacks. In: Franklin, M.K., Hui, L.C.K., Wong, D.S. (eds.) CANS 2008. LNCS, vol. 5339, pp. 349-365. Springer, Heidelberg (2008)
-
-
-
-
36
-
-
70350585649
-
-
Sakiyama, K., Batina, L., Schaumont, P., Verbauwhede, I.: HW/SW Co-design for TA/SPA-resistant Public-Key Cryptosystems. In: ECRYPT Workshop on Cryptographic Advances in Secure Hardware (2005)
-
Sakiyama, K., Batina, L., Schaumont, P., Verbauwhede, I.: HW/SW Co-design for TA/SPA-resistant Public-Key Cryptosystems. In: ECRYPT Workshop on Cryptographic Advances in Secure Hardware (2005)
-
-
-
-
37
-
-
43049143724
-
Balanced point operations for side-channel protection of elliptic curve cryptography
-
Batina, L., Mentens, N., Preneel, B., Verbauwhede, I.: Balanced point operations for side-channel protection of elliptic curve cryptography. IEE Proceedings of Information Security 152(1), 57-65 (2005)
-
(2005)
IEE Proceedings of Information Security
, vol.152
, Issue.1
, pp. 57-65
-
-
Batina, L.1
Mentens, N.2
Preneel, B.3
Verbauwhede, I.4
|