Architectural and Micro-architectural Countermeasures against Physical Attack

Project Details

StatusFinished
Effective start/end date1/10/091/04/14

Research Output

  • 5 Conference Contribution (Conference Proceeding)

On secure embedded token design: Quasi-looped Yao circuits and bounded leakage

Hoerder, S., Järvinen, K. & Page, D., 2013, Workshop in Information Security Theory and Practice - WISTP 2013. Springer Berlin Heidelberg, Vol. 7886. p. 112-128

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

  • Compiler assisted masking

    Moss, A. D., Oswald, E., Page, D. & Tunstall, M., 2012, Cryptographic Hardware and Embedded Systems - CHES. Springer Berlin Heidelberg, Vol. 7428. p. 58-75

    Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

  • 43 Citations (Scopus)

    Practical realisation and elimination of an ECC-related software bug attack

    Brumley, B., Barbosa, M. B. M., Page, D. & Vercauteren, F. R. G., 2012, Topics in Cryptology - CT-RSA 2012. Springer Berlin Heidelberg, Vol. 7178. p. 171-186

    Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

    20 Citations (Scopus)