-
1
-
-
84937438279
-
Power analysis, What is now possible
-
T. Okamoto, editor, ASIACRYPT 2000. Springer
-
M.-L. Akkar, R. Bévan, P. Dischamp, and D. Moyart. Power Analysis, What is Now Possible. In T. Okamoto, editor, ASIACRYPT 2000, volume 1976 of LNCS, pages 489-502. Springer, 2000.
-
(2000)
LNCS
, vol.1976
, pp. 489-502
-
-
Akkar, M.-L.1
Bévan, R.2
Dischamp, P.3
Moyart, D.4
-
2
-
-
0026397734
-
Differential cryptanalysis of DES-like cryptosystems
-
E. Biham and A. Shamir. Differential cryptanalysis of DES-like cryptosystems. Journal of Cryptology, 4(1):3-72, 1991.
-
(1991)
Journal of Cryptology
, vol.4
, Issue.1
, pp. 3-72
-
-
Biham, E.1
Shamir, A.2
-
3
-
-
35048818034
-
Correlation power analysis with a leakage model
-
M. Joye and J.-J. Quisquater, editors, CHES 2004. Springer
-
E. Brier, C. Clavier, and F. Olivier. Correlation Power Analysis with a Leakage Model. In M. Joye and J.-J. Quisquater, editors, CHES 2004, volume 3156 of LNCS, pages 16-29. Springer, 2004.
-
(2004)
LNCS
, vol.3156
, pp. 16-29
-
-
Brier, E.1
Clavier, C.2
Olivier, F.3
-
4
-
-
84957079591
-
Towards sound approaches to counteract power-analysis attacks
-
M. Wiener, editor, CRYPTO '99. Springer
-
S. Chari, C. Jutla, J. Rao, and P. Rohatgi. Towards Sound Approaches to Counteract Power-Analysis Attacks. In M. Wiener, editor, CRYPTO '99, volume 1666 of LNCS, pages 398-412. Springer, 1999.
-
(1999)
LNCS
, vol.1666
, pp. 398-412
-
-
Chari, S.1
Jutla, C.2
Rao, J.3
Rohatgi, P.4
-
5
-
-
68549099548
-
Differential power analysis in the presence of hardware countermeasures
-
Ç. Koç and C. Paar, editors, CHES 2000. Springer
-
C. Clavier, J.-S. Coron, and N. Dabbous. Differential power analysis in the presence of hardware countermeasures. In Ç. Koç and C. Paar, editors, CHES 2000, volume 1965 of LNCS, pages 252-263. Springer, 2000.
-
(2000)
LNCS
, vol.1965
, pp. 252-263
-
-
Clavier, C.1
Coron, J.-S.2
Dabbous, N.3
-
6
-
-
84944319704
-
Statistics and secret leakage
-
Y. Frankel, editor, Financial Cryptography - FC 2000. Springer
-
J.-S. Coron, P. Kocher, and D. Naccache. Statistics and secret leakage. In Y. Frankel, editor, Financial Cryptography - FC 2000, volume 1962 of LNCS. Springer, 2000.
-
(2000)
LNCS
, vol.1962
-
-
Coron, J.-S.1
Kocher, P.2
Naccache, D.3
-
7
-
-
84977806870
-
Linear structures in blockciphers
-
D. Chaum and W. Price, editors, EUROCRYPT '87. Springer
-
J. Evertse. Linear structures in blockciphers. In D. Chaum and W. Price, editors, EUROCRYPT '87, volume 304 of LNCS, pages 249-266. Springer, 1987.
-
(1987)
LNCS
, vol.304
, pp. 249-266
-
-
Evertse, J.1
-
8
-
-
84949520149
-
DES and differential power analysis - The duplication method
-
Ç. Koç and C. Paar, editors, CHES '99. Springer
-
L. Goubin and J. Patarin. DES and Differential Power Analysis - The Duplication Method. In Ç. Koç and C. Paar, editors, CHES '99, volume 1717 of LNCS, pages 158-172. Springer, 1999.
-
(1999)
LNCS
, vol.1717
, pp. 158-172
-
-
Goubin, L.1
Patarin, J.2
-
9
-
-
84902456114
-
Differential power analysis model and some results
-
J.-J. Quisquater, P. Paradinas, Y. Deswarte, and A. E. Kalam, editors. Kluwer Academic Publishers
-
S. Guilley, P. Hoogvorst, and R. Pascalet. Differential power analysis model and some results. In J.-J. Quisquater, P. Paradinas, Y. Deswarte, and A. E. Kalam, editors, Smart Card Research and Advanced Applications VI - CARDIS 2004, pages 127-142. Kluwer Academic Publishers, 2004.
-
(2004)
Smart Card Research and Advanced Applications VI - CARDIS 2004
, pp. 127-142
-
-
Guilley, S.1
Hoogvorst, P.2
Pascalet, R.3
-
10
-
-
0006531820
-
Cryptanalysis of iterated block ciphers
-
Hartung-Gorre Verlag
-
C. Harpes. Cryptanalysis of iterated block ciphers. In ETH Series in Information Processing, volume 7. Hartung-Gorre Verlag, 1996.
-
(1996)
ETH Series in Information Processing
, vol.7
-
-
Harpes, C.1
-
11
-
-
68549092452
-
Power analysis attacks and algorithmic approaches to their countermeasures for Koblitz cryptosystems
-
Ç. Koç and C. Paar, editors, CHES 2000. Springer
-
A. A. Hasan. Power analysis attacks and algorithmic approaches to their countermeasures for Koblitz cryptosystems. In Ç. Koç and C. Paar, editors, CHES 2000, volume 1965 of LNCS, pages 93-108. Springer, 2000.
-
(2000)
LNCS
, vol.1965
, pp. 93-108
-
-
Hasan, A.A.1
-
12
-
-
0000570172
-
Sequences with low correlation
-
North-Holland
-
T. Helleseth and P. V. Kumar. Sequences with low correlation. In Handbook of coding theory, Vol. II, pages 1765-1853. North-Holland, 1998.
-
(1998)
Handbook of Coding Theory
, vol.2
, pp. 1765-1853
-
-
Helleseth, T.1
Kumar, P.V.2
-
13
-
-
84948949623
-
Truncated and higher order differentials
-
B. Preneel, editor, Fast Software Encryption - FSE '94, Springer
-
L. Knudsen. Truncated and Higher Order Differentials. In B. Preneel, editor, Fast Software Encryption - FSE '94, volume 1008 of LNCS, pages 196-211. Springer, 1994.
-
(1994)
LNCS
, vol.1008
, pp. 196-211
-
-
Knudsen, L.1
-
14
-
-
84943632039
-
Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems
-
N. Koblitz, editor, CRYPTO '96. Springer
-
P. Kocher. Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems. In N. Koblitz, editor, CRYPTO '96, volume 1109 of LNCS, pages 104-113. Springer, 1996.
-
(1996)
LNCS
, vol.1109
, pp. 104-113
-
-
Kocher, P.1
-
15
-
-
84939573910
-
Differential power analysis
-
M. Wiener, editor, CRYPTO '99. Springer
-
P. Kocher, J. Jaffe, and B. Jun. Differential Power Analysis. In M. Wiener, editor, CRYPTO '99, volume 1666 of LNCS, pages 388-397. Springer, 1999.
-
(1999)
LNCS
, vol.1666
, pp. 388-397
-
-
Kocher, P.1
Jaffe, J.2
Jun, B.3
-
16
-
-
26444539754
-
On the validity of certain hypotheses used in linear cryptanalysis
-
Hartung-Gorre Verlag
-
Z. Kukorelly. On the validity of certain hypotheses used in linear cryptanalysis. In ETH Series in Information Processing, volume 13. Hartung-Gorre Verlag, 1999.
-
(1999)
ETH Series in Information Processing
, vol.13
-
-
Kukorelly, Z.1
-
17
-
-
0041863249
-
Higher order derivatives and differential cryptanalysis
-
en l'honneur de J.L. Massey à l'occasion de son 60ème anniversaire
-
X. Lai. Higher order derivatives and differential cryptanalysis. In Symposium on Communication, Coding and Cryptography, 1994. en l'honneur de J.L. Massey à l'occasion de son 60ème anniversaire.
-
(1994)
Symposium on Communication, Coding and Cryptography
-
-
Lai, X.1
-
19
-
-
85025704284
-
Linear cryptanalysis method for des cipher
-
T. Helleseth, editor, EUROCRYPT '93. Springer
-
M. Matsui. Linear cryptanalysis method for DES cipher. In T. Helleseth, editor, EUROCRYPT '93, volume 765 of LNCS, pages 386-397. Springer, 1993.
-
(1993)
LNCS
, vol.765
, pp. 386-397
-
-
Matsui, M.1
-
20
-
-
68549126765
-
Smartly analyzing the simplicity and the power of simple power analysis on smartcards
-
Ç. Koç and C. Paar, editors, CHES 2000, Springer
-
R. Mayer Sommer. Smartly Analyzing the Simplicity and the Power of Simple Power Analysis on Smartcards. In Ç. Koç and C. Paar, editors, CHES 2000, volume 1965 of LNCS, pages 78-92. Springer, 2000.
-
(2000)
LNCS
, vol.1965
, pp. 78-92
-
-
Mayer Sommer, R.1
-
23
-
-
84949514743
-
Power analysis attacks of modular exponentiation in smartcard
-
Ç. Koç and C. Paar, editors, CHES '99. Springer
-
T. Messerges, E. Dabbish, and R. Sloan. Power Analysis Attacks of Modular Exponentiation in Smartcard. In Ç. Koç and C. Paar, editors, CHES '99, volume 1717 of LNCS, pages 144-157. Springer, 1999.
-
(1999)
LNCS
, vol.1717
, pp. 144-157
-
-
Messerges, T.1
Dabbish, E.2
Sloan, R.3
-
24
-
-
0036566408
-
Examining smart-card security under the threat of power analysis attacks
-
May
-
T. Messerges, E. Dabbish, and R. Sloan. Examining Smart-Card Security under the Threat of Power Analysis Attacks. IEEE Transactions on Computers, 51(5), May 2002.
-
(2002)
IEEE Transactions on Computers
, vol.51
, Issue.5
-
-
Messerges, T.1
Dabbish, E.2
Sloan, R.3
-
28
-
-
0000233904
-
Boolean functions satisfying higher order propagation criteria
-
F. Pichler, editor, EUROCRYPT '85. Springer
-
B. Preneel, R. Govaerts, and J. Vandewalle. Boolean functions satisfying higher order propagation criteria. In F. Pichler, editor, EUROCRYPT '85, volume 219 of LNCS, pages 141-152. Springer, 1985.
-
(1985)
LNCS
, vol.219
, pp. 141-152
-
-
Preneel, B.1
Govaerts, R.2
Vandewalle, J.3
-
29
-
-
47849098280
-
On bent functions
-
Academic Press
-
O. S. Rothaus. On bent functions. In Journal of Combinatorial Theory, volume 20a, pages 300-305. Academic Press, 1976.
-
(1976)
Journal of Combinatorial Theory
, vol.20 A
, pp. 300-305
-
-
Rothaus, O.S.1
-
30
-
-
85020573990
-
On the design of S-boxes
-
H. Wiliams, editor, CRYPTO '85. Springer
-
A. Webster and S. Tavares. On the design of S-boxes. In H. Wiliams, editor, CRYPTO '85, volume 218 of LNCS, pages 523-534. Springer, 1985.
-
(1985)
LNCS
, vol.218
, pp. 523-534
-
-
Webster, A.1
Tavares, S.2
|