-
1
-
-
35048848006
-
Two power analysis attacks against one-mask methods
-
Bimal K. Roy and Willi Meier, editors, Fast Software Encryption - FSE 2004. Springer
-
M.-L. Akkar, R. Bevan, and L. Goubin. Two Power Analysis Attacks against One-Mask Methods. In Bimal K. Roy and Willi Meier, editors, Fast Software Encryption - FSE 2004, volume 3017 of Lecture Notes in Computer Science, pages 332-347. Springer, 2004.
-
(2004)
Lecture Notes in Computer Science
, vol.3017
, pp. 332-347
-
-
Akkar, M.-L.1
Bevan, R.2
Goubin, L.3
-
2
-
-
84943615552
-
An implementation of des and AES, secure against some attacks
-
Çetin Kaya Koç, David Naccache, and Christof Paar, editors, Cryptographic Hardware and Embedded Systems - CHES 2001. Springer
-
Mehdi-Laurent Akkar and Christophe Giraud. An Implementation of DES and AES, Secure against Some Attacks. In Çetin Kaya Koç, David Naccache, and Christof Paar, editors, Cryptographic Hardware and Embedded Systems - CHES 2001, volume 2162 of Lecture Notes in Computer Science, pages 309-318. Springer, 2001.
-
(2001)
Lecture Notes in Computer Science
, vol.2162
, pp. 309-318
-
-
Akkar, M.-L.1
Giraud, C.2
-
4
-
-
84957079591
-
Towards sound approaches to counteract power-analysis attacks
-
Michael J. Wiener, editor, Advances in Cryptology - CRYPTO '99. Springer
-
Suresh Chari, Charanjit S. Jutla, Josyula R. Rao, and Pankaj Rohatgi. Towards Sound Approaches to Counteract Power-Analysis Attacks. In Michael J. Wiener, editor, Advances in Cryptology - CRYPTO '99, volume 1666 of Lecture Notes in Computer Science, pages 398-412. Springer, 1999.
-
(1999)
Lecture Notes in Computer Science
, vol.1666
, pp. 398-412
-
-
Chari, S.1
Jutla, C.S.2
Rao, J.R.3
Rohatgi, P.4
-
6
-
-
35248830819
-
Multiplicative masking and power analysis of AES
-
Burton S. Kaliski Jr., Çetin Kaya Koç, and Christof Paar, editors, Cryptographic Hardware and Embedded Systems - CHES 2002. Springer
-
Jovan D. Golić and Christophe Tymen. Multiplicative Masking and Power Analysis of AES. In Burton S. Kaliski Jr., Çetin Kaya Koç, and Christof Paar, editors, Cryptographic Hardware and Embedded Systems - CHES 2002, volume 2535 of Lecture Notes in Computer Science, pages 198-212. Springer, 2003.
-
(2003)
Lecture Notes in Computer Science
, vol.2535
, pp. 198-212
-
-
Golić, J.D.1
Tymen, C.2
-
8
-
-
84939573910
-
Differential power analysis
-
Michael Wiener, editor, Advances in Cryptology - CRYPTO '99. Springer
-
Paul C. Kocher, Joshua Jaffe, and Benjamin Jun. Differential Power Analysis. In Michael Wiener, editor, Advances in Cryptology - CRYPTO '99, volume 1666 of Lecture Notes in Computer Science, pages 388-397. Springer, 1999.
-
(1999)
Lecture Notes in Computer Science
, vol.1666
, pp. 388-397
-
-
Kocher, P.C.1
Jaffe, J.2
Jun, B.3
-
11
-
-
17644372417
-
Towards an AES crypto-chip resistant to differential power analysis
-
to appear
-
Norbert Pramstaller, Frank K. Gürkaynak, Simon Haene, Hubert Kaeslin, Norbert Felber, and Wolfgang Fichtner. Towards an AES Crypto-chip Resistant to Differential Power Analysis. In Proceedings 30th European Solid-State Circuits Conference - ESSCIRC 2004, Leuven, Belgium, Proceedings - to appear, 2004.
-
(2004)
Proceedings 30th European Solid-State Circuits Conference - ESSCIRC 2004, Leuven, Belgium, Proceedings
-
-
Pramstaller, N.1
Gürkaynak, F.K.2
Haene, S.3
Kaeslin, H.4
Felber, N.5
Fichtner, W.6
-
12
-
-
84946832086
-
A compact rijndael hardware architecture with S-box optimization
-
Colin Boyd, editor. Springer
-
Akashi Satoh, Sumio Morioka, Kohji Takano, and Seiji Munetoh. A Compact Rijndael Hardware Architecture with S-Box Optimization. In Colin Boyd, editor, Advances in Cryptology - ASIACRYPT 2001, pages 239-254. Springer, 2001.
-
(2001)
Advances in Cryptology - ASIACRYPT 2001
, pp. 239-254
-
-
Satoh, A.1
Morioka, S.2
Takano, K.3
Munetoh, S.4
-
13
-
-
35248890508
-
Simplified adaptive multiplicative masking for AES
-
Burton S. Kaliski Jr., Çetin Kaya Koç, and Christof Paar, editors. Springer
-
Elena Trichina, Domenico De Seta, and Lucia Germani. Simplified Adaptive Multiplicative Masking for AES. In Burton S. Kaliski Jr., Çetin Kaya Koç, and Christof Paar, editors, Cryptographic Hardware and Embedded Systems - CHES 2002, pages 187-197. Springer, 2003.
-
(2003)
Cryptographic Hardware and Embedded Systems - CHES 2002
, pp. 187-197
-
-
Trichina, E.1
De Seta, D.2
Germani, L.3
-
14
-
-
35248825993
-
Securing encryption algorithms against DPA at the logic level: Next generation smart card technology
-
Burton S. Kaliski Jr., Çetin Kaya Koç, and Christof Paar, editors, Springer
-
Kris Tiri and Ingrid Verbauwhede. Securing Encryption Algorithms against DPA at the Logic Level: Next Generation Smart Card Technology. In Burton S. Kaliski Jr., Çetin Kaya Koç, and Christof Paar, editors, Cryptographic Hardware and Embedded Systems - CHES 2002, pages 125-136. Springer, 2003.
-
(2003)
Cryptographic Hardware and Embedded Systems - CHES 2002
, pp. 125-136
-
-
Tiri, K.1
Verbauwhede, I.2
-
15
-
-
84944896938
-
An ASIC implementation of the AES SBoxes
-
Bart Preneel, editor, Topics in Cryptology - CT-RSA 2002. Springer
-
Johannes Wolkerstorfer, Elisabeth Oswald, and Mario Lamberger. An ASIC implementation of the AES SBoxes. In Bart Preneel, editor, Topics in Cryptology - CT-RSA 2002, volume 2271 of Lecture Notes in Computer Science, pages 67-78. Springer, 2002.
-
(2002)
Lecture Notes in Computer Science
, vol.2271
, pp. 67-78
-
-
Wolkerstorfer, J.1
Oswald, E.2
Lamberger, M.3
|