Skip to main content

and
  1. No Access

    Chapter and Conference Paper

    An In-Depth Security Evaluation of the Nintendo DSi Gaming Console

    The Nintendo DSi is a handheld gaming console released by Nintendo in 2008. In Nintendo’s line-up the DSi served as a successor to the DS and was later succeeded by the 3DS. The security systems of both the DS...

    pcy Sluys, Lennert Wouters in Smart Card Research and Advanced Applicati… (2024)

  2. No Access

    Chapter and Conference Paper

    Infective Computation and Dummy Rounds: Fault Protection for Block Ciphers without Check-before-Output

    Implementation attacks pose a serious threat for the security of cryptographic devices and there are a multitude of countermeasures that are used to prevent them. Two countermeasures used in implementations of...

    Benedikt Gierlichs, Jörn-Marc Schmidt in Progress in Cryptology – LATINCRYPT 2012 (2012)

  3. Chapter and Conference Paper

    Mutual Information Analysis

    We propose a generic information-theoretic distinguisher for differential side-channel analysis. Our model of side-channel leakage is a refinement of the one given by Standaert et al. An embedded device containin...

    Benedikt Gierlichs, Lejla Batina, Pim Tuyls in Cryptographic Hardware and Embedded System… (2008)

  4. Chapter and Conference Paper

    Power and Fault Analysis Resistance in Hardware through Dynamic Reconfiguration

    Dynamically reconfigurable systems are known to have many advantages such as area and power reduction. The drawbacks of these systems are the reconfiguration delay and the overhead needed to provide reconfigur...

    Nele Mentens, Benedikt Gierlichs in Cryptographic Hardware and Embedded System… (2008)