Zobrazeno 1 - 10
of 45
pro vyhledávání: '"Axel Poschmann"'
Publikováno v:
IEEE Transactions on Information Forensics and Security. 8:1274-1279
The success of a side-channel attack depends mainly on three factors, namely, the cipher algorithm, the attack platform, and the measurement noise. In this paper, we consider a class of side-channel attacks known as differential cache attacks on Feis
Autor:
Axel Poschmann, Benedikt Gierlichs
Publikováno v:
Journal of Cryptographic Engineering. 7:97-98
Autor:
Axel Poschmann
Publikováno v:
Datenschutz und Datensicherheit - DuD. 34:747-752
Der Trend zum Ubiquitous Computing macht auch vor sicherheitskritischen Einsatzgebieten nicht halt. Daher und zum Schutz vor Bedrohungen der Burgerrechte durch unbefugtes Ausspahen von personlichen Daten ist der Einsatz von Verschlusselungsverfahren
Publikováno v:
Journal of Cryptology. 24:322-345
A provably secure countermeasure against first order side-channel attacks was proposed by Nikova et al. (P. Ning, S. Qing, N. Li (eds.) International conference in information and communications security. Lecture notes in computer science, vol. 4307,
Publikováno v:
The KSII Transactions on Internet and Information Systems. :105-128
The field of lightweight cryptography has developed significantly over recent years and many impressive implementation results have been published. However these results are often concerned with a core computation and when it comes to a real implemen
Autor:
Benedikt Gierlichs, Axel Poschmann
Publikováno v:
Lecture Notes in Computer Science ISBN: 9783662531396
Cryptographic Hardware and Embedded Systems – CHES 2016
Cryptographic Hardware and Embedded Systems – CHES 2016
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::40d25d21f6518008a2a4973c9cec7667
https://doi.org/10.1007/978-3-662-53140-2
https://doi.org/10.1007/978-3-662-53140-2
Publikováno v:
IEEE Design & Test of Computers. 24:522-533
The tight cost and implementation constraints of high-volume products, including secure RFID tags and smart cards, require specialized cryptographic implementations. The authors review recent developments in this area for symmetric and asymmetric cip
Autor:
Stefan Mangard, Axel Poschmann
Publikováno v:
Lecture Notes in Computer Science ISBN: 9783319214757
Constructive Side-Channel Analysis and Secure Design
Constructive Side-Channel Analysis and Secure Design
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::6a645d1fdbf63a304d4dfdc328914edb
https://doi.org/10.1007/978-3-319-21476-4
https://doi.org/10.1007/978-3-319-21476-4
Autor:
Marc Stöttinger, Kshitij Divekar, Aderinola Gbade-Alabi, Vincent J. Mooney, David Keezer, Axel Poschmann
Publikováno v:
WESS
Trust in the integrated circuit (IC) fabrication industry is an ongoing concern given the trend towards "fabless" design and associated use of third-parties for fabrication. A Hardware Trojan (HT) introduced during fabrication can corrupt an IC's out
Autor:
Axel Poschmann, Sebastian Kutzner
Publikováno v:
Constructive Side-Channel Analysis and Secure Design ISBN: 9783319101743
COSADE
COSADE
Lightweight cryptography and efficient implementations, including efficient countermeasures against side-channel analysis, are of great importance for embedded devices, and, consequently, a lot of progress has been done in this area in recent years.
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::7ffb3b5296b01b591f43979a3e88b275
https://doi.org/10.1007/978-3-319-10175-0_20
https://doi.org/10.1007/978-3-319-10175-0_20