Implementing virtual secure circuit using a custom-instruction approach

@inproceedings{Chen2010ImplementingVS,
  title={Implementing virtual secure circuit using a custom-instruction approach},
  author={Zhimin Chen and Ambuj Sinha and Patrick Schaumont},
  booktitle={CASES},
  year={2010}
}
Although cryptographic algorithms are designed to resist at least thousands of years of cryptoanalysis, implementing them with either software or hardware usually leaks additional information which may enable the attackers to break the cryptographic systems within days. A Side Channel Attack (SCA) is such a kind of attack that breaks a security system at a low cost within a short time. SCA uses side-channel leakage, such as the cryptographic implementations' execution time, power dissipation… CONTINUE READING
Highly Cited
This paper has 22 citations. REVIEW CITATIONS

Citations

Publications citing this paper.
Showing 1-10 of 14 extracted citations

References

Publications referenced by this paper.

Similar Papers

Loading similar papers…