PC Kocher, JM Jaffe, BC Jun - US Patent 7,668,310, 2010 - Google Patents
Methods and apparatuses are disclosed for improving DES and other cryptographic protocols against external monitor ing attacks by reducing the amount (and signal-to-noise …
PC Kocher, JM Jaffe, BC Jun - US Patent 7,587,044, 2009 - Google Patents
OTHER PUBLICATIONS (65) Prior Publication Data Back, Adam,“Non-Interactive Forward Secrecy” Sep. 6, 1996. US 20O2/O124178 A1 Sep. 5, 2002(Continued) Related US …
PC Kocher, JM Jaffe, BC Jun - US Patent 7,787,620, 2010 - Google Patents
Methods and apparatuses are disclosed for improving DES and other cryptographic protocols against external monitoring attacks by reducing the amount (and signal-to-noise …
PC Kocher, JM Jaffe - US Patent 7,506,165, 2009 - Google Patents
6,049,613 A 4/2000 Jakobsson.................... 380/47 WO WO97/13342 4f1997 6,064,724. A 5/2000 Kelly......... 370.92. 04 WO WO97, 14085 4f1997 6,064,740 A 5/2000 Curiger et …
PC Kocher - US Patent 7,941,666, 2011 - Google Patents
3. A 53. Elam et al. 5,552,776 A 9/1996 Wade et al. 4214, 126 A T. 1980 WE 5,557,346 A 9/1996 Lipner et al. 4,225.962 A 9, 1980 ME 1 5,559.887 A 9, 1996 Davis et al. 4,243,890 A …
PC Kocher, JM Jaffe, BC Jun - US Patent 7,634,083, 2009 - Google Patents
Abstract Information leaked from smart cards and other tamper resistant cryptographic devices can be statistically analyzed to determine keys or other secret data. A data collection …
PC Kocher, JM Jaffe, BC Jun - US Patent 8,879,724, 2014 - Google Patents
(74) Attorney, Agent, or Firm—Finnegan, Henderson, Farabow, Garrett & Dunner, LLP (57) ABSTRACT Information leaked from Smart cards and other tamper resis tant cryptographic …
A Lux, A Starostin - Journal of Cryptographic Engineering, 2011 - Springer
A timing attack exploits the variance in the running time of a crypto-algorithm's implementation in order to infer confidential information. Such a dependence between …
Traditionally, the main task of cryptographic hardware is the acceleration of operations frequently used in cryptosystems or the acceleration of a complete cryptographic algorithm …