-
1
-
-
84937438279
-
Power Analysis, What Is Now Possible
-
T. Okamoto, editor, Advances in Cryptology - Asiacrypt'00, Springer
-
M.-L. Akkar, R. Bevan, P. Dischamp, and D. Moyart. Power Analysis, What Is Now Possible ... In T. Okamoto, editor, Advances in Cryptology - Asiacrypt'00, volume 1976 of Lectures Notes in Computer Science, pages 489-502. Springer, 2000.
-
(2000)
Lectures Notes in Computer Science
, vol.1976
, pp. 489-502
-
-
Akkar, M.-L.1
Bevan, R.2
Dischamp, P.3
Moyart, D.4
-
2
-
-
35048866271
-
Two Power Analysis Attacks against One-Mask Methods
-
B. Roy and W. Meier, editors, Pre-proceedings Version
-
M.-L. Akkar, R. Bevan, and L. Goubin. Two Power Analysis Attacks against One-Mask Methods. In B. Roy and W. Meier, editors, Fast Software Encryption - 2004, pages 308-325, 2004. Pre-proceedings Version.
-
(2004)
Fast Software Encryption - 2004
, pp. 308-325
-
-
Akkar, M.-L.1
Bevan, R.2
Goubin, L.3
-
3
-
-
84943615552
-
An Implementation of DES and AES Secure against Some Attacks
-
Ç. Koç, D. Naccache, and C. Paar, editors, Cryptographic Hardware and Embedded Systems (CHES), Springer
-
M.-L. Akkar and C. Giraud. An Implementation of DES and AES Secure against Some Attacks. In Ç. Koç, D. Naccache, and C. Paar, editors, Cryptographic Hardware and Embedded Systems (CHES), volume 2162 of Lectures Notes in Computer Science, pages 309-318. Springer, 2001.
-
(2001)
Lectures Notes in Computer Science
, vol.2162
, pp. 309-318
-
-
Akkar, M.-L.1
Giraud, C.2
-
4
-
-
0242571734
-
A Generic Protection against High-Order Differential Power Analysis
-
T. Johansson, editor, Fast Software Encryption - 2003, Springer
-
M.-L. Akkar and L. Goubin. A Generic Protection against High-Order Differential Power Analysis. In T. Johansson, editor, Fast Software Encryption - 2003, volume 2887 of Lectures Notes in Computer Science, pages 192-205. Springer, 2003.
-
(2003)
Lectures Notes in Computer Science
, vol.2887
, pp. 192-205
-
-
Akkar, M.-L.1
Goubin, L.2
-
5
-
-
0343542925
-
An Improvement of Davies' Attack on DES
-
A. De Santis, editor, Advances in Cryptology - Eurocrypt'95, Springer
-
E. Biham and A. Biryukov. An Improvement of Davies' Attack on DES. In A. De Santis, editor, Advances in Cryptology - Eurocrypt'95, volume 950 of Lectures Notes in Computer Science, pages 461-467. Springer, 1995.
-
(1995)
Lectures Notes in Computer Science
, vol.950
, pp. 461-467
-
-
Biham, E.1
Biryukov, A.2
-
6
-
-
84903595110
-
Differential Cryptanalysis of DES-like Cryptosystems
-
A. Menezes and S. Vanstone, editors, Advances in Cryptology - Crypto'90, Springer
-
E. Biham and A. Shamir. Differential Cryptanalysis of DES-like Cryptosystems. In A. Menezes and S. Vanstone, editors, Advances in Cryptology - Crypto'90, volume 537 of Lectures Notes in Computer Science, pages 2-21. Springer, 1990.
-
(1990)
Lectures Notes in Computer Science
, vol.537
, pp. 2-21
-
-
Biham, E.1
Shamir, A.2
-
8
-
-
0003130498
-
On the Importance of Checking Cryptographic Protocols for Faults
-
Extended Abstract. W. Fumy, editor, Advances in Cryptology - Eurocrypt'97, Springer
-
D. Boneh, R. DeMillo, and R. Lipton. On the Importance of Checking Cryptographic Protocols for Faults (Extended Abstract). In W. Fumy, editor, Advances in Cryptology - Eurocrypt'97, volume 1233 of Lectures Notes in Computer Science, pages 37-51. Springer, 1997.
-
(1997)
Lectures Notes in Computer Science
, vol.1233
, pp. 37-51
-
-
Boneh, D.1
DeMillo, R.2
Lipton, R.3
-
10
-
-
68549099548
-
Differential Power Analysis in the Presence of Hardware Countermeasures
-
Ç. Koç and C. Paar, editors, Cryptographic Hardware and Embedded Systems (CHES), Springer
-
C. Clavier, J.-S. Coron, and N. Dabbous. Differential Power Analysis in the Presence of Hardware Countermeasures. In Ç. Koç and C. Paar, editors, Cryptographic Hardware and Embedded Systems (CHES), volume 1965 of Lectures Notes in Computer Science, pages 252-263. Springer, 2000.
-
(2000)
Lectures Notes in Computer Science
, vol.1965
, pp. 252-263
-
-
Clavier, C.1
Coron, J.-S.2
Dabbous, N.3
-
11
-
-
0029632042
-
Pairs and Triplets of DES S-Boxes
-
D. Davies and S. Murphy. Pairs and Triplets of DES S-Boxes. Journal of Cryptology, 8(1):1-25, 1995.
-
(1995)
Journal of Cryptology
, vol.8
, Issue.1
, pp. 1-25
-
-
Davies, D.1
Murphy, S.2
-
12
-
-
84949520149
-
DES and Differential Power Analysis, The "Duplication" Method
-
Ç. Koç and C. Paar, editors, Cryptographic Hardware and Embedded Systems (CHES), Springer
-
L. Goubin and J. Patarin. DES and Differential Power Analysis, The "Duplication" Method. In Ç. Koç and C. Paar, editors, Cryptographic Hardware and Embedded Systems (CHES), volume 1717 of Lectures Notes in Computer Science, pages 158-172. Springer, 1999.
-
(1999)
Lectures Notes in Computer Science
, vol.1717
, pp. 158-172
-
-
Goubin, L.1
Patarin, J.2
-
13
-
-
84943632039
-
Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Others Systems
-
N. Koblitz, editor, Advances in Cryptology - Crypto'96, Springer
-
P. Kocher. Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Others Systems. In N. Koblitz, editor, Advances in Cryptology - Crypto'96, volume 1109 of Lectures Notes in Computer Science, pages 104-113. Springer, 1996.
-
(1996)
Lectures Notes in Computer Science
, vol.1109
, pp. 104-113
-
-
Kocher, P.1
-
14
-
-
84939573910
-
Differential Power Analysis
-
M. Wiener, editor, Advances in Cryptology - Crypto'99, Springer
-
P. Kocher, J. Jaffe, and B. Jun. Differential Power Analysis. In M. Wiener, editor, Advances in Cryptology - Crypto'99, volume 1666 of Lectures Notes in Computer Science, pages 388-397. Springer, 1999.
-
(1999)
Lectures Notes in Computer Science
, vol.1666
, pp. 388-397
-
-
Kocher, P.1
Jaffe, J.2
Jun, B.3
-
16
-
-
85025704284
-
Linear Cryptanalysis Method for DES Cipher
-
T. Helleseth, editor, Advances in Cryptology - Eurocrypt'93, Springer
-
M. Matsui. Linear Cryptanalysis Method for DES Cipher. In T. Helleseth, editor, Advances in Cryptology - Eurocrypt'93, volume 765 of Lectures Notes in Computer Science, pages 386-397. Springer, 1993.
-
(1993)
Lectures Notes in Computer Science
, vol.765
, pp. 386-397
-
-
Matsui, M.1
-
17
-
-
68549099555
-
Using Second-Order Power Analysis to Attack DPA Resistant software
-
Ç. Koç and C. Paar, editors, Cryptographic Hardware and Embedded Systems (CHES), Springer
-
T. Messerges. Using Second-Order Power Analysis to Attack DPA Resistant software. In Ç. Koç and C. Paar, editors, Cryptographic Hardware and Embedded Systems (CHES), volume 1965 of Lectures Notes in Computer Science, pages 238-251. Springer, 2000.
-
(2000)
Lectures Notes in Computer Science
, vol.1965
, pp. 238-251
-
-
Messerges, T.1
-
20
-
-
0242571732
-
A New Class of Collision Attacks and its Application to DES
-
T. Johansson, editor, Fast Software Encryption - 2003, Springer
-
K. Schramm, T. Wollinger, and C. Paar. A New Class of Collision Attacks and its Application to DES. In T. Johansson, editor, Fast Software Encryption - 2003, volume 2887 of Lectures Notes in Computer Science. Springer, 2003.
-
(2003)
Lectures Notes in Computer Science
, vol.2887
-
-
Schramm, K.1
Wollinger, T.2
Paar, C.3
|