Skip to main content

and
  1. No Access

    Chapter and Conference Paper

    Power Analysis of Atmel CryptoMemory – Recovering Keys from Secure EEPROMs

    Atmel CryptoMemory devices offer non-volatile memory with access control and authenticated encryption. They are used in commercial and military applications e.g. to prevent counterfeiting, to store secrets suc...

    Josep Balasch, Benedikt Gierlichs, Roel Verdult in Topics in Cryptology – CT-RSA 2012 (2012)

  2. No Access

    Chapter and Conference Paper

    Infective Computation and Dummy Rounds: Fault Protection for Block Ciphers without Check-before-Output

    Implementation attacks pose a serious threat for the security of cryptographic devices and there are a multitude of countermeasures that are used to prevent them. Two countermeasures used in implementations of...

    Benedikt Gierlichs, Jörn-Marc Schmidt in Progress in Cryptology – LATINCRYPT 2012 (2012)

  3. No Access

    Chapter and Conference Paper

    Revisiting Higher-Order DPA Attacks:

    Security devices are vulnerable to side-channel attacks that perform statistical analysis on data leaked from cryptographic computations. Higher-order (HO) attacks are a powerful approach to break protected im...

    Benedikt Gierlichs, Lejla Batina, Bart Preneel in Topics in Cryptology - CT-RSA 2010 (2010)

  4. No Access

    Chapter and Conference Paper

    Fault Analysis Study of IDEA

    We present a study of several fault attacks against the block cipher IDEA. Such a study is particularly interesting because of the target cipher’s specific property to employ operations on three different algebra...

    Christophe Clavier, Benedikt Gierlichs in Topics in Cryptology – CT-RSA 2008 (2008)