메뉴 건너뛰기




Volumn , Issue , 2003, Pages 36-41

Energy-aware design techniques for differential power analysis protection

Author keywords

Differential power analysis; Low power design

Indexed keywords

ALGORITHMS; CRYPTOGRAPHY; ENCODING (SYMBOLS); ENERGY UTILIZATION; LOGIC DESIGN; MASKS; MICROPROCESSOR CHIPS; POWER CONTROL;

EID: 0042591369     PISSN: 0738100X     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/775832.775845     Document Type: Conference Paper
Times cited : (69)

References (24)
  • 5
    • 0035505389 scopus 로고    scopus 로고
    • An energy-efficient reconfigurable public-key cryptography processor
    • Nov.
    • J. Goodman, A. Chandrakasan, "An Energy-Efficient Reconfigurable Public-Key Cryptography Processor," IEEE Journal of Solid-State Circuits, vol. 36, no. 11, pp. 1808-1820, Nov. 2001.
    • (2001) IEEE Journal of Solid-state Circuits , vol.36 , Issue.11 , pp. 1808-1820
    • Goodman, J.1    Chandrakasan, A.2
  • 11
    • 0036566408 scopus 로고    scopus 로고
    • Examining smart-card security under the thread of power analysis attacks
    • T. Messerges, E. Dabbish, R. Sloan, "Examining Smart-Card security under the thread of power analysis attacks," IEEE Transactions on Computers, Vol. 51, no. 5, pp. 541-552, 2002.
    • (2002) IEEE Transactions on Computers , vol.51 , Issue.5 , pp. 541-552
    • Messerges, T.1    Dabbish, E.2    Sloan, R.3
  • 14
    • 84943632039 scopus 로고    scopus 로고
    • Timing attacks on implementations of diffie-hellman, RSA, DSS and other systems
    • Springer-Verlag
    • P. Kocher, "Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS and Other Systems," CRYPTO-96: Advances in Cryptology, Springer-Verlag, pp. 104-113, 1996.
    • (1996) CRYPTO-96: Advances in Cryptology , pp. 104-113
    • Kocher, P.1
  • 15
    • 84957079591 scopus 로고    scopus 로고
    • Towards sound approaches to counteract power-analysis attacks
    • Springer-Verlag
    • S. Chari, C. Jutla, J. Rao, P. Rohatgi, "Towards Sound Approaches to Counteract Power-Analysis Attacks," CRYPTO-99: Advances in Cryptology, Springer-Verlag, pp. 398-412, 1999.
    • (1999) CRYPTO-99: Advances in Cryptology , pp. 398-412
    • Chari, S.1    Jutla, C.2    Rao, J.3    Rohatgi, P.4
  • 16
    • 0035481641 scopus 로고    scopus 로고
    • Power analysis attacks and algorithmic approaches to their countermeasures for Koblitz curve cryptosystems
    • Oct.
    • M. Hasan, "Power Analysis Attacks and Algorithmic Approaches to their Countermeasures for Koblitz Curve Cryptosystems," IEEE Transactions on Computers, Vol. 50, no. 10, pp. 1071-1083, Oct. 2001.
    • (2001) IEEE Transactions on Computers , vol.50 , Issue.10 , pp. 1071-1083
    • Hasan, M.1
  • 19
    • 0032183716 scopus 로고    scopus 로고
    • Guarded evaluation: Pushing power management to logic synthesis/design
    • Oct.
    • V. Tiwari, S. Malik, P. Ashar, "Guarded Evaluation: Pushing Power Management to Logic Synthesis/Design," IEEE Transactions on CAD, Vol. 17, no. 10, pp. 1051-1060, Oct. 1998.
    • (1998) IEEE Transactions on CAD , vol.17 , Issue.10 , pp. 1051-1060
    • Tiwari, V.1    Malik, S.2    Ashar, P.3
  • 20
    • 0035441677 scopus 로고    scopus 로고
    • Synthesis of power-managed sequential components based on computational Kernel extraction
    • Sep.
    • L. Benini, G. De Micheli, A. Lioy, E. Macii, G. Odasso, M. Poncino, "Synthesis of Power-Managed Sequential Components Based on Computational Kernel Extraction,", IEEE Transactions on CAD, Vol. 20, no. 9, pp. 1118-113, Sep. 2001.
    • (2001) IEEE Transactions on CAD , vol.20 , Issue.9 , pp. 1118-1113
    • Benini, L.1    De Micheli, G.2    Lioy, A.3    Macii, E.4    Odasso, G.5    Poncino, M.6


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.