This paper presents a new proposal for hiding the cryptographic key, when the so-called side-channel attacks (SCAs) are applied to break the security of AES-128. The algorithm was executed on MicroBlaze, but the proposed method is generic and can be extended to any other microprocessor. SCAs are based on examining the correlation produced between the data and operations performed by the microprocessor and its actual power consumption. Traditionally, such weakness is counteracted by introducing countermeasures addressed to reduce as much as possible this correlation, making data and power consumption independent. On the contrary, the proposal presented in this paper introduces some modifications in the AES algorithm. These changes aim at con...
Abstract. Power analysis attacks are a serious treat for implementations of mod-ern cryptographic al...
Abstract — Side channel attack based upon the analysis of power traces is an effective way of obtain...
Side-channel analyses constitute a major threat for embedded devices, because they allow an attacker...
This paper presents a new proposal for hiding the cryptographic key, when the so-called side-channel...
This paper aims at presenting a new countermeasure against Side-Channel Analysis (SCA) attacks, whos...
This paper presents a new hardware architecture designed for protecting the key of cryptographic alg...
This paper presents a new hardware architecture designed for protecting the key of cryptographic alg...
This paper presents a new hardware architecture designed for protecting the key of cryptographic alg...
This paper aims at presenting a new countermeasure against Side-Channel Analysis (SCA) attacks, whos...
Encryption is essential for data security in the information age today. The Advanced Encryption Sta...
We propose an arithmetic hiding technique on Advanced Encryption Standard (AES) algorithm implementa...
Encryption is essential for data security in the information age today. The Advanced Encryption Sta...
We propose an arithmetic hiding technique on Advanced Encryption Standard (AES) algorithm implementa...
Power analysis attacks are a serious treat for implementations of modern cryptographic algorithms. M...
Abstract. Power analysis attacks are a serious treat for implementations of mod-ern cryptographic al...
Abstract. Power analysis attacks are a serious treat for implementations of mod-ern cryptographic al...
Abstract — Side channel attack based upon the analysis of power traces is an effective way of obtain...
Side-channel analyses constitute a major threat for embedded devices, because they allow an attacker...
This paper presents a new proposal for hiding the cryptographic key, when the so-called side-channel...
This paper aims at presenting a new countermeasure against Side-Channel Analysis (SCA) attacks, whos...
This paper presents a new hardware architecture designed for protecting the key of cryptographic alg...
This paper presents a new hardware architecture designed for protecting the key of cryptographic alg...
This paper presents a new hardware architecture designed for protecting the key of cryptographic alg...
This paper aims at presenting a new countermeasure against Side-Channel Analysis (SCA) attacks, whos...
Encryption is essential for data security in the information age today. The Advanced Encryption Sta...
We propose an arithmetic hiding technique on Advanced Encryption Standard (AES) algorithm implementa...
Encryption is essential for data security in the information age today. The Advanced Encryption Sta...
We propose an arithmetic hiding technique on Advanced Encryption Standard (AES) algorithm implementa...
Power analysis attacks are a serious treat for implementations of modern cryptographic algorithms. M...
Abstract. Power analysis attacks are a serious treat for implementations of mod-ern cryptographic al...
Abstract. Power analysis attacks are a serious treat for implementations of mod-ern cryptographic al...
Abstract — Side channel attack based upon the analysis of power traces is an effective way of obtain...
Side-channel analyses constitute a major threat for embedded devices, because they allow an attacker...