Hardware Implementations

  • Wednesday, February 26, 2014 | 8:00 AM – 9:00 AM | West | Room: 2024

View all Sessions

Topic 1: Attacking PUF-Based Pattern Matching Key Generators via Helper Data Manipulation
Authors: Jeroen Delvaux and Ingrid Verbauwhede

Topic 2: On Increasing the Throughput of Stream Ciphers
Authors: Frederik Armknecht and Vasily Mikhalev

Topic 3: On Double Exponentiation for Securing RSA against Fault Analysis
Authors: Matthieu Rivain, Duc-Phong Le and Chik How Tan


This document was retrieved from on Thu, 26 Nov 2015 20:01:05 -0500.
© 2015 EMC Corporation. All rights reserved.