Online Template Attacks


Authors: Lejla Batina, Radboud University Nijmegen, Nijmegen, The Netherlands Łukasz Chmielewski, Riscure, Delft, The Netherlands Louiza Papachristodoulou, Radboud University Nijmegen, Nijmegen, The Netherlands Peter Schwabe, Radboud University Nijmegen, Nijmegen, The Netherlands Michael Tunstall, Rambus Cryptography Research Division, San Francisco, USA. Template attacks are a special... » read more

Week in Review: IoT, Security, Auto


Internet of Things Yingzi Technology of Guangzhou, China, has developed a “future pig farm” to demonstrate what technology can do to make keeping pigs more profitable in a country that is trying to reduce the number of small farms raising pigs and consolidate them into larger operations. China is also contending with an outbreak of African swine fever that has spread out of the country thr... » read more

Week in Review: IoT, Security, Auto


Internet of Things At Arm TechCon, Arm unveiled its Neoverse brand identity, providing an infrastructure foundation for 5G, the Internet of Things, edge computing, and other applications. The Arm Neoverse IP will proliferate next year from Arm and its technology partners. With Arm’s “Ares” platform, to be introduced in 2019, the company promises to deliver 30% per-generation performance ... » read more

Week In Review: Design, Low Power


Arm announced its new roadmap promising 30% annual system performance gains on leading edge nodes through 2021. These gains are to come from a combination of microarchitecture design to hardware, software and tools. They are branding this new roadmap 'Neoverse.' The first delivery will be Ares – expected in early 2019 – for a 7nm IP platform targeting 5G networks and next-generation cloud t... » read more

Scare Of The Month: Whitebox Cryptography


A debate has been raging for some time about whether hardware is more secure than software. This story should provide plenty of fuel for debate. A few years ago, something called White Box Cryptography (WBC) was developed. This is a rather novel approach that attempts to implement cryptography algorithms in software, rather than hardware. The idea is to keep the cryptographic assets secure a... » read more

Newer posts →