Hardware Implementations

  • Wednesday, February 26, 2014 | 8:00 AM – 9:00 AM | West | Room: 2024

View all Sessions

Topic 1: Attacking PUF-Based Pattern Matching Key Generators via Helper Data Manipulation
Authors: Jeroen Delvaux and Ingrid Verbauwhede

Topic 2: On Increasing the Throughput of Stream Ciphers
Authors: Frederik Armknecht and Vasily Mikhalev

Topic 3: On Double Exponentiation for Securing RSA against Fault Analysis
Authors: Matthieu Rivain, Duc-Phong Le and Chik How Tan


This document was retrieved from on Mon, 22 Jul 2019 05:53:20 -0400.