S
S.B. Ors
Researcher at Katholieke Universiteit Leuven
Publications - 19
Citations - 1303
S.B. Ors is an academic researcher from Katholieke Universiteit Leuven. The author has contributed to research in topics: Cryptography & Modular arithmetic. The author has an hindex of 14, co-authored 19 publications receiving 1269 citations.
Papers
More filters
Proceedings ArticleDOI
Power-analysis attack on an ASIC AES implementation
TL;DR: This work presents the first results on the feasibility of power analysis attack against an AES hardware implementation and shows how to build a reliable measurement setup and how to improve the correlation coefficients, i.e., the signal to noise ratio for the authors' measurements.
Book ChapterDOI
Power-Analysis Attacks on an FPGA--First Experimental Results
TL;DR: This paper is the first to describe a setup to conduct power-analysis attacks on FPGAs, and provides strong evidence that implementations of elliptic curve cryptosystems without specific countermeasures are indeed vulnerable to simple power- analysis attacks.
Journal ArticleDOI
Hardware architectures for public key cryptography
TL;DR: This paper presents an overview of hardware implementations for the two commonly used types of public key cryptography, i.e. RSA and elliptic curve cryptography, both based on modular arithmetic.
Proceedings ArticleDOI
Hardware implementation of an elliptic curve processor over GF(p)
TL;DR: A hardware implementation of an arithmetic processor which is efficient for bit-lengths suitable for both commonly used types of public key cryptography (PKC) and RSA cryptosystems is described.
Proceedings ArticleDOI
Electromagnetic Analysis Attack on an FPGA Implementation of an Elliptic Curve Cryptosystem
E. De Mulder,P. Buysschaert,S.B. Ors,Peter Delmotte,Bart Preneel,Guy A. E. Vandenbosch,Ingrid Verbauwhede +6 more
TL;DR: This paper presents simple (SEMA) and differential (DEMA) electromagnetic analysis attacks on an FPGA implementation of an elliptic curve processor and demonstrates that a correlation analysis requires 1000 measurements to find the key bits.