Found 3450 Results

Self-Protecting Digital Content – RSA 2004

https://www.rambus.com/self-protecting-digital-content-rsa-2004/

Paul Kocher’s presentation at the Wireless & Embedded track of the 2004 RSA Conference. Download “Self-Protecting Digital Content – RSA 2004”

Northwest Logic delivers its Multi-Port PCI-X Bridge Core

https://www.rambus.com/northwest-logic-delivers-its-multi-port-pci-x-bridge-core/

Beaverton, OR, January 9, 2004-Northwest Logic has developed, fully validated, and delivered its Multi-Port PCI-X Bridge Core to it’s first customer. The Multi-Port PCI-X Bridge Core is a customizable PCI-X Bridge IP Core for use in a wide variety of applications.  The configuration delivered to the first customer has three PCI-X ports along with a […]

VIA Technologies Random Number Generator

https://www.rambus.com/via-technologies-random-number-generator/

Randomness is required for a variety of computational, statistical, and security-related applications. In particular, random numbers and the processes used to generate them are a critical component of secure protocols and cryptographic key generation. Security processes that lack adequate sources of randomness will have poor security. Cryptography Research has evaluated the C3 Nehemiah random number […]

Securing Unusually High Threat Systems – RSA 2003

https://www.rambus.com/securing-unusually-high-threat-systems-rsa-2003/

  Paul Kocher’s presentation at the General Session of the 2003 RSA Conference. Download “Securing Unusually High Threat Systems – RSA 2003”

Self-protecting digital content

https://www.rambus.com/self-protecting-digital-content/

  Despite the high public profile of piracy as a threat to intellectual property owners, surprisingly little useful research has been done to understand the range of technical solutions that are feasible. This paper presents results from a study sponsored by Cryptography Research, Inc. to determine how cryptographic systems can provide the most effective long-term […]

Hacking Cryptosystems – RSA 2002

https://www.rambus.com/hacking-cryptosystems-rsa-2002/

  Paul Kocher’s presentation at the Hackers and Threats track of the 2002 RSA Conference. Download “Hacking Cryptosystems – RSA 2002”

Intel Random Number Generator

https://www.rambus.com/intel-random-number-generator/

  Good cryptography requires good random numbers. This paper evaluates the hardware-based Intel Random Number Generator (RNG) for use in cryptographic applications. Almost all cryptographic protocols require the generation and use of secret values that must be unknown to attackers. For example, random number generators are required to generate public/private keypairs for asymmetric (public key) […]

Differential Power Analysis

https://www.rambus.com/differential-power-analysis/

  Abstract: Cryptosystem designers frequently assume that secrets will be manipulated in closed, reliable computing environments. Unfortunately, actual computers and microchips leak information about the operations they process. This paper examines specfi c methods for analyzing power consumption measurements to and secret keys from tamper resistant devices. We also discuss approaches for building cryptosystems that can […]

Introduction to Differential Power Analysis and Related Attacks

https://www.rambus.com/introduction-to-differential-power-analysis-and-related-attacks/

  As part of Cryptography Research’s ongoing cryptosystem research activities, we have been analyzing how to improve security of portable cryptographic tokens, including smart cards. Over the past year and a half, we have been working with the smart card vendor community to address attacks we have developed including Simple Power Analysis, Differential Power Analysis, […]

Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems

https://www.rambus.com/timing-attacks-on-implementations-of-diffie-hellman-rsa-dss-and-other-systems/

  An academic paper introducing timing attack cryptanalysis. Many elements of timing attacks are relevant to DPA. Abstract: By carefully measuring the amount of time required to perform private key operations, attackers may be able to find fixed Diffe-Hellman exponents, factor RSA keys, and break other cryptosystems. Against a vulnerable system, the attack is computationally […]

Rambus logo