DIKUL - logo

Search results

Basic search    Expert search   

Currently you are NOT authorised to access e-resources UL. For full access, REGISTER.

1 2 3 4 5
hits: 154
1.
  • Power Analysis Attacks Power Analysis Attacks
    Mangard, Stefan; Oswald, Elisabeth; Popp, Thomas 2007
    eBook

    Power analysis attacks allow the extraction of secret information from smart cards. Smart cards are used in many applications including banking, mobile communications, pay TV, and electronic ...
Full text
Available for: UL
2.
  • Share-slicing: Friend or Foe?
    Si Gao; Ben Marshall; Dan Page ... IACR transactions on cryptographic hardware and embedded systems, 2020, Volume: 2020, Issue: 1
    Journal Article
    Peer reviewed
    Open access

    Masking is a well loved and widely deployed countermeasure against side channel attacks, in particular in software. Under certain assumptions (w.r.t. independence and noise level), masking provably ...
Full text
Available for: UL
3.
  • Successfully Attacking Mask... Successfully Attacking Masked AES Hardware Implementations
    Mangard, Stefan; Pramstaller, Norbert; Oswald, Elisabeth Cryptographic Hardware and Embedded Systems – CHES 2005, 2005
    Book Chapter, Conference Proceeding
    Peer reviewed
    Open access

    During the last years, several masking schemes for AES have been proposed to secure hardware implementations against DPA attacks. In order to investigate the effectiveness of these countermeasures in ...
Full text
Available for: UL

PDF
4.
Full text

PDF
5.
Full text

PDF
6.
  • Exploring Parallelism to Im... Exploring Parallelism to Improve the Performance of FrodoKEM in Hardware
    Howe, James; Martinoli, Marco; Oswald, Elisabeth ... Journal of cryptographic engineering, 11/2021, Volume: 11, Issue: 4
    Journal Article
    Peer reviewed
    Open access

    FrodoKEM is a lattice-based key encapsulation mechanism, currently a semi-finalist in NIST’s post-quantum standardisation effort. A condition for these candidates is to use NIST standards for sources ...
Full text
Available for: UL

PDF
7.
  • A fair evaluation framework... A fair evaluation framework for comparing side-channel distinguishers
    Whitnall, Carolyn; Oswald, Elisabeth Journal of cryptographic engineering, 08/2011, Volume: 1, Issue: 2
    Journal Article
    Peer reviewed
    Open access

    The ability to make meaningful comparisons between side-channel distinguishers is important both to attackers seeking an optimal strategy and to designers wishing to secure a device against the ...
Full text
Available for: UL

PDF
8.
  • An AES Smart Card Implement... An AES Smart Card Implementation Resistant to Power Analysis Attacks
    Herbst, Christoph; Oswald, Elisabeth; Mangard, Stefan Applied Cryptography and Network Security, 2006
    Book Chapter, Conference Proceeding
    Peer reviewed
    Open access

    In this article we describe an efficient AES software implementation that is well suited for 8-bit smart cards and resistant against power analysis attacks. Our implementation masks the intermediate ...
Full text
Available for: UL

PDF
9.
  • Fault Attack Countermeasure... Fault Attack Countermeasures for Error Samplers in Lattice-Based Cryptography
    Howe, James; Khalid, Ayesha; Martinoli, Marco ... 2019 IEEE International Symposium on Circuits and Systems (ISCAS)
    Conference Proceeding
    Open access

    Lattice-based cryptography is one of the leading candidates for NIST's post-quantum standardisation effort, providing efficient key encapsulation and signature schemes. Most of these schemes base ...
Full text
Available for: UL

PDF
10.
  • Practical Second-Order DPA ... Practical Second-Order DPA Attacks for Masked Smart Card Implementations of Block Ciphers
    Oswald, Elisabeth; Mangard, Stefan; Herbst, Christoph ... Lecture notes in computer science, 2006
    Book Chapter, Conference Proceeding
    Peer reviewed

    In this article we describe an improved concept for second-order differential-power analysis (DPA) attacks on masked smart card implementations of block ciphers. Our concept allows to mount ...
Full text
Available for: UL
1 2 3 4 5
hits: 154

Load filters