-
1
-
-
84943632039
-
Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems
-
P.Kocher "Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems", LNCS 1109, 1996.
-
(1996)
LNCS
, vol.1109
-
-
Kocher, P.1
-
2
-
-
0036957308
-
Securing wireless data: System architecture challenges
-
S.Ravi, etal. "Securing Wireless Data: System architecture challenges", ISSS, 2002, pp. 195-200.
-
(2002)
ISSS
, pp. 195-200
-
-
Ravi, S.1
-
3
-
-
84974679353
-
Securing the Rijndael finalists against power analysis attacks
-
T.Messerges, "Securing the Rijndael finalists against power analysis attacks" LNCS 1978, 2001, pp. 150-164.
-
(2001)
LNCS
, vol.1978
, pp. 150-164
-
-
Messerges, T.1
-
4
-
-
84939573910
-
Differential power analysis
-
Crypto'99
-
P.Kocher, J.Jaffe, B.Jun "Differential Power Analysis" Crypto'99, LNCS 1666, 1999
-
(1999)
LNCS
, vol.1666
-
-
Kocher, P.1
Jaffe, J.2
Jun, B.3
-
5
-
-
24744469698
-
A new tool for non-intrusive analysis of smartcards based on em emissions
-
Rump Session
-
J-J. Quisquater, etal. "a new tool for non-intrusive analysis of smartcards based on EM emissions", Rump Session, Eurocrypt 2000.
-
Eurocrypt 2000
-
-
Quisquater, J.-J.1
-
6
-
-
0038557148
-
-
fp.gladman.plus.com/ cryptography_technology/rijndael/aes.spec.311.pdf
-
Dr.Brian Gladman, "A Specification for Rijndael, the AES Algorithm", at fp.gladman.plus.com/ cryptography_technology/rijndael/aes. spec.311.pdf,2003.
-
(2003)
A Specification for Rijndael, The AES Algorithm
-
-
Gladman, B.1
-
7
-
-
35248817849
-
The em side-channel(s)
-
D.Agrawal et al. "The EM side-channel(s)" CHES 2002, 2002, pp.29-45.
-
(2002)
CHES 2002
, pp. 29-45
-
-
Agrawal, D.1
-
8
-
-
35248862449
-
Electromagnetic analysis: Concrete results
-
CHES 2001
-
K.Gandolfi etal. "Electromagnetic Analysis: concrete results" CHES 2001, LNCS 2162, pp.251-261.
-
LNCS
, vol.2162
, pp. 251-261
-
-
Gandolfi, K.1
-
9
-
-
84957079591
-
Towards sound approaches to counteract power-analysis attacks
-
S.Chari, etal. "Towards sound approaches to counteract power-analysis attacks", LNCS 1666, 1999, pp.398-412.
-
(1999)
LNCS
, vol.1666
, pp. 398-412
-
-
Chari, S.1
-
11
-
-
0036911590
-
Leakage power modeling and reduction with data retention
-
W.Liao etal. "leakage power modeling and reduction with data retention", IEEE ICCAD, 2002, pp. 714-719.
-
(2002)
IEEE ICCAD
, pp. 714-719
-
-
Liao, W.1
-
12
-
-
84937438279
-
Power analysis, what is now possible
-
M.Akkar, etal. "Power analysis, what is now possible...", LNCS 1976, 2000, pp489-502.
-
(2000)
LNCS
, vol.1976
, pp. 489-502
-
-
Akkar, M.1
-
13
-
-
84949954262
-
DPA countermeasure based on the masking method
-
K.Itoh etal. "DPA countermeasure based on the masking method", LNCS 2288, 2002,pp.440-456.
-
(2002)
LNCS
, vol.2288
, pp. 440-456
-
-
Itoh, K.1
-
14
-
-
0003070315
-
DES and Differential power analysis- The duplication method
-
L.Goubin, J.Patarin "DES and Differential power analysis- the duplication method" CHES 2001.
-
CHES 2001
-
-
Goubin, L.1
Patarin, J.2
-
15
-
-
0041695788
-
Multiplicative masking and power analysis of Rijndael
-
J.Golic "Multiplicative Masking and power analysis of Rijndael", CHES 2002.
-
CHES 2002
-
-
Golic, J.1
-
16
-
-
68549099555
-
nd order power analysis to attack DPA resistant software
-
nd order power analysis to attack DPA resistant software", LNCS 1965, 2000, pp.238-251.
-
(2000)
LNCS
, vol.1965
, pp. 238-251
-
-
Messerges, T.1
-
17
-
-
35048870686
-
Towards efficient second-order power analysis
-
CHES 2004
-
J.Waddle, D.Wagner "Towards efficient second-order power analysis" CHES 2004, LNCS 3156, pp.1-15.
-
LNCS
, vol.3156
, pp. 1-15
-
-
Waddle, J.1
Wagner, D.2
|