Home > Search
Found 227 Results
SAN FRANCISCO, CALIFORNIA, UNITED STATES – 02/22/2013 Who: Cryptography Research, Inc. Where: RSA Conference 2013 Moscone Convention Center San Francisco, CA When: February 25–March 1, 2013 At the RSA Conference 2013, executives from Cryptography Research (CRI) will lead two sessions that address side-channel attacks. The first session includes a live demonstration on how keys can […]
Security research firm now certified to independently test SoCs and FPGAs to validate security of chips used in set-top boxes, game consoles, and mobile devices SAN FRANCISCO, CALIFORNIA, UNITED STATES and DELFT, NETHERLANDS – 12/19/2012 — Cryptography Research (CRI), a division of Rambus Inc. (NASDAQ:RMBS), today announced the accreditation of Riscure as an independent testing […]
This paper proposes an approach to validate that implementations of public‐key cryptography have moderate resistance to side‐channel analysis, using RSA‐CRT as an example. The design goal of the proposed approach is to develop tests that are technically sound and repeatable, while at the same time being efficient and cost‐effective for testing labs. The approach was validated on […]
SANTA CLARA, CALIFORNIA, UNITED STATES – 01/30/2012 Who: Rambus Inc. (NASDAQ: RMBS) Where: DesignCon 2012 Santa Clara Convention Center Santa Clara, California When: January 30 – February 2, 2012 At DesignCon 2012, Rambus engineers and scientists will present 10 technical papers on topics such as signal integrity, high-speed memory design and semiconductor security. Additionally, the […]
As the functionality of mobile devices has increased, so have the threats. These devices make attractive targets, given the sensitivity of user and corporate data they process and store, their emerging use for viewing protected content and conducting sensitive banking and payment transactions. Until recently, hardware and software based defenses for mobile platforms lagged behind […]
The goal of a side‐channel resistance validation program is to assess whether a cryptographic module utilizing side‐channel analysis countermeasures can provide resistance to these attacks commensurate with the desired security level. While, no standardized testing program can guarantee resistance against all attacks, an effective program should be able to validate that sufficient care was taken […]
Data encryption and decryption operations are basic building blocks for most security applications. For this purpose, most systems use block ciphers, such as the public AES standard. It is well known, however, that implementations of block ciphers such as AES, as well as other cryptographic algorithms, are subject to side-channel attacks [1]. These attacks allow […]