Hardware Implementations

  • Wednesday, February 26, 2014 | 8:00 AM – 9:00 AM | West | Room: 2024

View all Sessions

Topic 1: Attacking PUF-Based Pattern Matching Key Generators via Helper Data Manipulation
Authors: Jeroen Delvaux and Ingrid Verbauwhede

Topic 2: On Increasing the Throughput of Stream Ciphers
Authors: Frederik Armknecht and Vasily Mikhalev

Topic 3: On Double Exponentiation for Securing RSA against Fault Analysis
Authors: Matthieu Rivain, Duc-Phong Le and Chik How Tan


This document was retrieved from on Sun, 20 Aug 2017 11:35:20 -0400.
© 2017 EMC Corporation. All rights reserved.