Zobrazeno 1 - 6
of 6
pro vyhledávání: '"Danilo Šijačić"'
Publikováno v:
Selected Areas in Cryptography ISBN: 9783030992767
ispartof: pages:87-110 ispartof: SELECTED AREAS IN CRYPTOGRAPHY vol:13203 pages:87-110 ispartof: 28th International Conference on Selected Areas in Cryptography (SAC) location:ELECTR NETWORK, Univ Victoria date:29 Sep - 1 Oct 2021 status: published
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::117d3af0801e10d8318c8430c8adaf96
https://lirias.kuleuven.be/handle/20.500.12942/695661
https://lirias.kuleuven.be/handle/20.500.12942/695661
Publikováno v:
Lecture Notes in Computer Science ISBN: 9783030579890
SCN
SCN
In this paper we introduce the strictly zero-correlation attack. We extend the work of Ashur and Posteuca in BalkanCryptSec 2018 and build a 0-correlation key-dependent linear trail covering the full DES. We show how this approximation can be used fo
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::5e268660c282960aa8b8bc5361f8fe8e
https://lirias.kuleuven.be/handle/123456789/679274
https://lirias.kuleuven.be/handle/123456789/679274
Publikováno v:
PROOFS
Kalpa Publications in Computing volume 7
Kalpa Publications in Computing volume 7
Models and tools developed by the semiconductor community have matured over decades of use. As a result, hardware simulations can yield highly accurate and easily automated pre-silicon estimates for e.g. timing and area figures. In this work we desig
Publikováno v:
2018 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC)
FDTC
FDTC
Fault Sensitivity Analysis is an attack on cryptographic implementations that exploits dependencies between the sensitive data and the intensity of an injected fault. Masking, an established Side-Channel Analysis countermeasure, was originally believ
Autor:
Subhadeep Banik, Ingrid Verbauwhede, Bohan Yang, Begül Bilgin, Danilo Šijačić, Andrey Bogdanov, Andreas Brasen Kidmose
Publikováno v:
Lecture Notes in Computer Science ISBN: 9783319694528
SAC
SAC
This work provides the first hardware implementations of PRIMATEs family of authenticated encryption algorithms. PRIMATEs are designed to be lightweight in hardware, hence we focus on designs for constrained devices. We provide several serial impleme
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::88682a9789cc7714af44f4b7f0571cc3
https://zenodo.org/record/2594701
https://zenodo.org/record/2594701
Publikováno v:
2020 Design, Automation & Test in Europe Conference & Exhibition (DATE)
DATE
DATE
Masking schemes are the most popular counter-measure against side-channel analysis. They theoretically decorrelate information leaked through inherent physical channels from the key-dependent intermediate values that occur during computation. Their p
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::d00f9098f88ed5124fa9cce47cccb9c2