Abstract. Public-key cryptosystem (PKC) is one of inevitable key technologies in order to accomplish fruitful security applications in ubiquitous computing sys-tems. The ubiquitous computer only has scarce computational resources (like Smart cards, RFID, Sensor Network), however, so that the light weight PKC is necessary for those miniaturized low-power devices. Recently, XTR is considered as one of good candidates for more energy efficient cryptosystems. Among XTR exponentiation algorithms, the most efficient one is the Improved XTR Single Ex-ponentiation (XTR-ISE) proposed by Stam-Lenstra. Thus among the family of XTR algorithms, XTR-ISE is the most efficient one suitable for ubiquitous com-puter. Even though the security of such devices ...
Knudsen and Preneel (Asiacrypt'96 and Crypto'97) introduced a hash function design in which a linear...
In this paper, we propose a novel key recovery attack against secure ECDSA signature generation empl...
Side-channel attack is any attack based on information gained from the physical implementation of a ...
Public-key cryptosystem (PKC) is one of inevitable key technologies in order to accomplish fruitful ...
The First International Workshop on Security in Ubiquitous Computing Systems SecUbiq-05
Abstract. Public key cryptographic algorithms are typically based on group exponentiation algorithms...
Abstract. Side-channel collision attacks are one of the most investi-gated techniques allowing the c...
Abstract. This paper describes several speedups and simpli¯cations for XTR. The most important resul...
Abstract. As an unsolved issue for embedded crypto solutions, side channel attacks are challenging t...
Side-channel collision attacks are one of the most investigated techniques allowing the combination ...
Side-channel collision attacks are one of the most investigated techniques allowing the combination ...
International audienceCollision side-channel attacks are effective attacks against cryptographic imp...
Abstract. The recent results presented by Moradi et al. on AES at CHES 2010 and Witteman et al. on s...
In this paper we present a method of attacking public-key cryptosystems (PKCs) on tamper resistant d...
Simple power analysis (SPA) attacks are widely used against several cryptosystems, principally again...
Knudsen and Preneel (Asiacrypt'96 and Crypto'97) introduced a hash function design in which a linear...
In this paper, we propose a novel key recovery attack against secure ECDSA signature generation empl...
Side-channel attack is any attack based on information gained from the physical implementation of a ...
Public-key cryptosystem (PKC) is one of inevitable key technologies in order to accomplish fruitful ...
The First International Workshop on Security in Ubiquitous Computing Systems SecUbiq-05
Abstract. Public key cryptographic algorithms are typically based on group exponentiation algorithms...
Abstract. Side-channel collision attacks are one of the most investi-gated techniques allowing the c...
Abstract. This paper describes several speedups and simpli¯cations for XTR. The most important resul...
Abstract. As an unsolved issue for embedded crypto solutions, side channel attacks are challenging t...
Side-channel collision attacks are one of the most investigated techniques allowing the combination ...
Side-channel collision attacks are one of the most investigated techniques allowing the combination ...
International audienceCollision side-channel attacks are effective attacks against cryptographic imp...
Abstract. The recent results presented by Moradi et al. on AES at CHES 2010 and Witteman et al. on s...
In this paper we present a method of attacking public-key cryptosystems (PKCs) on tamper resistant d...
Simple power analysis (SPA) attacks are widely used against several cryptosystems, principally again...
Knudsen and Preneel (Asiacrypt'96 and Crypto'97) introduced a hash function design in which a linear...
In this paper, we propose a novel key recovery attack against secure ECDSA signature generation empl...
Side-channel attack is any attack based on information gained from the physical implementation of a ...