-
1
-
-
84958641478
-
Differential fault analysis of secret key cryptosystems
-
B. Kaliski, editor, Advances in Cryptology - Crypto'97. Springer
-
E. Biham and A. Shamir. Differential Fault Analysis of Secret Key Cryptosystems. In B. Kaliski, editor, Advances in Cryptology - Crypto'97, volume 1294 of Lectures Notes in Computer Science, pages 513-525. Springer, 1997.
-
(1997)
Lectures Notes in Computer Science
, vol.1294
, pp. 513-525
-
-
Biham, E.1
Shamir, A.2
-
2
-
-
84957355967
-
On the importance of checking cryptographic protocols for faults
-
W. Fumy, editor, Advances in Cryptology - Eurocrypt'97. Springer
-
D. Boneh, R. DeMillo, and R. Lipton. On the Importance of Checking Cryptographic Protocols for Faults (Extended Abstract). In W. Fumy, editor, Advances in Cryptology - Eurocrypt'97, volume 1233 of Lectures Notes in Computer Science, pages 37-51. Springer, 1997.
-
(1997)
Lectures Notes in Computer Science
, vol.1233
, pp. 37-51
-
-
Boneh, D.1
DeMillo, R.2
Lipton, R.3
-
3
-
-
31344473835
-
Electromagnetic side channels of an FPGA implementation of AES
-
V. Carlier, H. Chabanne, E. Dottax, and H. Pelletier. Electromagnetic Side Channels of an FPGA Implementation of AES. Cryptology ePrint Archive, Report 2004/145, 2004. http://eprint.iacr.org/.
-
(2004)
Cryptology ePrint Archive, Report
, vol.2004
, Issue.145
-
-
Carlier, V.1
Chabanne, H.2
Dottax, E.3
Pelletier, H.4
-
4
-
-
33845395407
-
Side Channel Analysis for Reverse Engineering (SCARE) - An improved attack against a secret A3/A8 GSM algorithm
-
Christophe Clavier. Side Channel Analysis for Reverse Engineering (SCARE) - An Improved Attack Against a Secret A3/A8 GSM Algorithm. Cryptology ePrint Archive, Report 2004/049, 2004. http://eprint.iacr.org/.
-
(2004)
Cryptology ePrint Archive, Report
, vol.2004
, Issue.49
-
-
Clavier, C.1
-
5
-
-
35248862449
-
Electromagnetic analysis: Concret results
-
Ç. Koç, D. Naccache, and C. Paar, editors, Cryptographic Hardware and Embedded Systems (CUES) - 2001. Springer
-
K. Gandolfi, C. Mourtel, and F. Olivier. Electromagnetic Analysis: Concret Results. In Ç. Koç, D. Naccache, and C. Paar, editors, Cryptographic Hardware and Embedded Systems (CUES) - 2001, volume 2162 of Lectures Notes in Computer Science, pages 251-261. Springer, 2001.
-
(2001)
Lectures Notes in Computer Science
, vol.2162
, pp. 251-261
-
-
Gandolfi, K.1
Mourtel, C.2
Olivier, F.3
-
6
-
-
84943632039
-
Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and others systems
-
N. Koblitz, editor, Advances in Cryptology - Crypto'96. Springer
-
P. Kocher. Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Others Systems. In N. Koblitz, editor, Advances in Cryptology - Crypto'96, volume 1109 of Lectures Notes in Computer Science, pages 104-113. Springer, 1996.
-
(1996)
Lectures Notes in Computer Science
, vol.1109
, pp. 104-113
-
-
Kocher, P.1
-
7
-
-
84939573910
-
Differential power analysis
-
M. Wiener, editor, Advances in Cryptology - Crypto '99, Springer
-
P. Kocher, J. Jaffe, and B. Jun. Differential Power Analysis. In M. Wiener, editor, Advances in Cryptology - Crypto '99, volume 1666 of Lectures Notes in Computer Science, pages 388-397. Springer, 1999.
-
(1999)
Lectures Notes in Computer Science
, vol.1666
, pp. 388-397
-
-
Kocher, P.1
Jaffe, J.2
Jun, B.3
-
8
-
-
26444527390
-
The Davies-Murphy power attack
-
P.-J. Lee, editor, Advances in Cryptology - Asiacrypt'04. Springer
-
S. Kunz-Jacques, F. Muller, and F. Valette. The Davies-Murphy Power Attack. In P.-J. Lee, editor, Advances in Cryptology - Asiacrypt'04, volume 3329 of Lectures Notes in Computer Science, pages 451-467. Springer, 2004.
-
(2004)
Lectures Notes in Computer Science
, vol.3329
, pp. 451-467
-
-
Kunz-Jacques, S.1
Muller, F.2
Valette, F.3
-
9
-
-
0242372122
-
Side-channel attacks on substitution blocks
-
J. Zhou, M. Yung, and Y. Han, editors, Applied Cryptography and Network Security (ACNS) 2003. Springer
-
R. Novak. Side-Channel Attacks on Substitution Blocks. In J. Zhou, M. Yung, and Y. Han, editors, Applied Cryptography and Network Security (ACNS) 2003, volume 2846 of Lectures Notes in Computer Science, pages 307-318. Springer, 2003.
-
(2003)
Lectures Notes in Computer Science
, vol.2846
, pp. 307-318
-
-
Novak, R.1
-
10
-
-
26444581675
-
-
October
-
National Institute of Standards and Technology (NIST). Data Encryption Standard (DES) FIPS Publication 46-3, October 1999. Available at http://csrc.nist.gov/publications/fips/fips46-3/fips46-3.pdf.
-
(1999)
Data Encryption Standard (DES) FIPS Publication
, vol.46
, Issue.3
-
-
|