Zobrazeno 1 - 10
of 73
pro vyhledávání: '"Michael Tunstall"'
Autor:
Marc Joye, Michael Tunstall
Publikováno v:
Encyclopedia of Cryptography, Security and Privacy ISBN: 9783642277399
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::8b84f8e1496bd95ec5b8286b9dbb2963
https://doi.org/10.1007/978-3-642-27739-9_1707-1
https://doi.org/10.1007/978-3-642-27739-9_1707-1
Publikováno v:
Constructive Side-Channel Analysis and Secure Design ISBN: 9783030687724
COSADE
COSADE
Side-channel leakage detection methods based on statistical tests, such as t-test or \(\chi ^2\)-test, provide a high confidence in the presence of leakage with a large number of traces. However, practical limitations on testing time and equipment ma
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::6bd95079c9025332138be0a9483d9ad9
https://doi.org/10.1007/978-3-030-68773-1_6
https://doi.org/10.1007/978-3-030-68773-1_6
Publikováno v:
SECRYPT
Publikováno v:
Topics in Cryptology – CT-RSA 2021 ISBN: 9783030755386
CT-RSA
CT-RSA
RSA key generation requires devices to generate large prime numbers. The naive approach is to generate candidates at random, and then test each one for (probable) primality. However, it is faster to use a sieve method, where the candidates are chosen
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::b81e2dcf75df99dcdee1f66c540bc61c
https://doi.org/10.1007/978-3-030-75539-3_26
https://doi.org/10.1007/978-3-030-75539-3_26
Publikováno v:
Journal of Cryptographic Engineering, 9, 1, pp. 21-36
Journal of Cryptographic Engineering, 9, 21-36
Journal of Cryptographic Engineering, 9, 21-36
Template attacks are a special kind of side-channel attacks that work in two stages. In a first stage, the attacker builds up a database of template traces collected from a device which is identical to the attacked device, but under the attacker’s
Autor:
Michael Hutter, Michael Tunstall
Publikováno v:
Journal of Cryptographic Engineering. 9:173-184
Converting a Boolean mask to an arithmetic mask, and vice versa, is often required in implementing side-channel-resistant instances of cryptographic algorithms that mix Boolean and arithmetic operations. In this paper, we describe a method for conver
Autor:
Kerstin Lemke-Rust, Michael Tunstall
This book constitutes the thoroughly refereed post-conference proceedings of the 15th International Conference on Smart Card Research and Advanced Applications, CARDIS 2016, held in Cannes, France, in November 2016. The 15 revised full papers present
Autor:
Marc Joye, Michael Tunstall
Publikováno v:
Cryptography and Communications. 7:71-90
A difference-of-means test applied to acquisitions of the instantaneous power consumption has been shown to be a suitable means of distinguishing a multiplication from a squaring operation over the integers. This has been attributed to the difference
Publikováno v:
International Journal of Information Security. 13:291-304
Side-channel attacks on hardware implementations of cryptographic algorithms have recently been the focus of much attention in the research community. Differential power analysis (DPA) has been shown to be particularly effective at retrieving secret
Autor:
Christian Patrick Veillette, Garrett L. Frazier, Benjamin Wellhoefer, K. Michael Tunstall, Neil A. Stegent
Publikováno v:
SPE Drilling & Completion. 28:237-242
Summary Horizontal shale completions require multistage high-pressure hydraulic-fracturing stimulation treatments to deliver commercially viable production in low-permeability reservoirs. Unconventional shale plays, such as the Eagle Ford shale and H