Hardware Trojans for Inducing or Amplifying Side-Channel Leakage of Cryptographic Software

Jean-Francois Gallais, Johann Großschädl, Neil Hanley, Markus Kasper, Marcel Medwed, Francesco Regazzoni, Jörn-Marc Schmidt, Stefan Tillich, Marcin Wojcik

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Original languageEnglish
Title of host publicationTrusted Systems. Second International Conference, INTRUST 2010, Beijing, China, December 13th-15th, 2010. Proceedings
Publisher.
Pages253-270
Publication statusPublished - 2010

Fields of Expertise

  • Information, Communication & Computing

Treatment code (Nähere Zuordnung)

  • Application
  • Theoretical

Projects

EU - ECRYPT II - European network of excellence in cryptology - Phase II

Schmidt, J., Nad, T., Kirschbaum, M., Feldhofer, M., Schläffer, M., Aigner, M. J., Rechberger, C., Lamberger, M., Tillich, S., Medwed, M., Hutter, M., Rijmen, V., Mendel, F. & Posch, R.

1/08/0831/07/12

Project: Research project

Cite this

Gallais, J-F., Großschädl, J., Hanley, N., Kasper, M., Medwed, M., Regazzoni, F., ... Wojcik, M. (2010). Hardware Trojans for Inducing or Amplifying Side-Channel Leakage of Cryptographic Software. In Trusted Systems. Second International Conference, INTRUST 2010, Beijing, China, December 13th-15th, 2010. Proceedings (pp. 253-270). ..