-
1
-
-
84943615552
-
An implementation of des and AES secure againts some attacks
-
proceedings of CHES 2001, Paris, France, May, Springer-Verlag
-
M.L. Akkar, C. Giraud, An Implementation of DES and AES Secure againts Some Attacks, in the proceedings of CHES 2001, Lecture Notes in Computer Sciences, vol 2162, pp 309-318, Paris, France, May 2001, Springer-Verlag.
-
(2001)
Lecture Notes in Computer Sciences
, vol.2162
, pp. 309-318
-
-
Akkar, M.L.1
Giraud, C.2
-
2
-
-
35248896294
-
Multi-channel attacks
-
proceedings of CHES 2003, Cologne, Germany, September, Springer-Verlag
-
D. Agrawal, J.R. Rao, P. Rohatgi Multi-channel Attacks, in the proceedings of CHES 2003, Lecture Notes in Computer Sciences, vol 2779, pp 2-16, Cologne, Germany, September 2003, Springer-Verlag.
-
(2003)
Lecture Notes in Computer Sciences
, vol.2779
, pp. 2-16
-
-
Agrawal, D.1
Rao, J.R.2
Rohatgi, P.3
-
3
-
-
78449302757
-
Serpent: A flexible block cipher with maximum assurance
-
Ventura, California, USA, August
-
R. Anderson, E. Biham, L. Knudsen, Serpent: A Flexible Block Cipher With Maximum Assurance, in the proceedings of The First Advanced Encryption Standard Candidate Conference, Ventura, California, USA, August 1998.
-
(1998)
Proceedings of the First Advanced Encryption Standard Candidate Conference
-
-
Anderson, R.1
Biham, E.2
Knudsen, L.3
-
5
-
-
35048818034
-
Correlation power analysis with a leakage model
-
the proceedings of CHES 2004, Boston, USA, August
-
E. Brier, C. Clavier, F. Olivier, Correlation Power Analysis with a Leakage Model, in the proceedings of CHES 2004, Lecture Notes in Computer Science, vol 3156, pp 16-29, Boston, USA, August 2004.
-
(2004)
Lecture Notes in Computer Science
, vol.3156
, pp. 16-29
-
-
Brier, E.1
Clavier, C.2
Olivier, F.3
-
6
-
-
84957079591
-
Towards sound approaches to counteract power-analysis attacks
-
the proceedings of Crypto 1999, Santa Barbara, California, USA, August, Springer-Verlag
-
S. Chari C. Jutla, J. Rao, P. Rohatgi, Towards Sound Approaches to Counteract Power-Analysis Attacks, in the proceedings of Crypto 1999, Lecture Notes in Computer Science, vol 1666, pp 398-412, Santa Barbara, California, USA, August 1999, Springer-Verlag.
-
(1999)
Lecture Notes in Computer Science
, vol.1666
, pp. 398-412
-
-
Chari, S.1
Jutla, C.2
Rao, J.3
Rohatgi, P.4
-
7
-
-
84949520149
-
DES and differential power analysis
-
the proceedings of CHES 1999, Worcester, Massachussets, USA, August, Springer-Verlag
-
L. Goubin, J. Patarin, DES and Differential Power Analysis, in the proceedings of CHES 1999, Lecture Notes in Computer Science, vol 1717, pp 158-172, Worcester, Massachussets, USA, August 1999, Springer-Verlag.
-
(1999)
Lecture Notes in Computer Science
, vol.1717
, pp. 158-172
-
-
Goubin, L.1
Patarin, J.2
-
8
-
-
35248868313
-
Hidden markov model cryptanalysis
-
the proceedings of CHES 2003, Cologne, Germany, September, Springer-Verlag
-
C. Karlof, D. Wagner, Hidden Markov Model Cryptanalysis, in the proceedings of CHES 2003, Lecture Notes in Computer Sciences, vol 2779, pp 17-30, Cologne, Germany, September 2003, Springer-Verlag.
-
(2003)
Lecture Notes in Computer Sciences
, vol.2779
, pp. 17-30
-
-
Karlof, C.1
Wagner, D.2
-
9
-
-
84939573910
-
Differential power analysis
-
the proceedings of CRYPTO 99, Santa Barbara, USA, August, Springer-Verlag
-
P. Kocher, J. Jaffe, B. Jun, Differential Power Analysis, in the proceedings of CRYPTO 99, Lecture Notes in Computer Science, vol 1666, pp 398-412, Santa Barbara, USA, August 1999, Springer-Verlag.
-
(1999)
Lecture Notes in Computer Science
, vol.1666
, pp. 398-412
-
-
Kocher, P.1
Jaffe, J.2
Jun, B.3
-
10
-
-
24144459808
-
Side-channel leakage of masked CMOS gates
-
the proceedings of CT-RSA 05, San Fransisco, CA, USA, February
-
S.Mangard, Side-Channel Leakage of Masked CMOS Gates, in the proceedings of CT-RSA 05, Lecture Notes in Computer Science, vol 3376, pp 351-365, San Fransisco, CA, USA, February 2005.
-
(2005)
Lecture Notes in Computer Science
, vol.3376
, pp. 351-365
-
-
Mangard, S.1
-
12
-
-
0036566408
-
Examining smart-card security under the threat of power analysis attacks
-
May
-
T.S. Messerges, E.A. Dabbish, R.H. Sloan, Examining Smart-Card Security under the Threat of Power Analysis Attacks, IEEE Transactions on Computers, vol 51, num 5, pp 541-552, May 2002.
-
(2002)
IEEE Transactions on Computers
, vol.51
, Issue.5
, pp. 541-552
-
-
Messerges, T.S.1
Dabbish, E.A.2
Sloan, R.H.3
-
13
-
-
68549099555
-
Using second-order power analysis to attack DPA resistant software
-
the proceedings of CHES 2000, Worcester, Massachusetts, USA, August, Springer-Verlag
-
T.S. Messerges, Using Second-Order Power Analysis to Attack DPA Resistant Software, in the proceedings of CHES 2000, Lecture Notes in Computer Sciences, vol 1965, pp 71-77, Worcester, Massachusetts, USA, August 2000, Springer-Verlag.
-
(2000)
Lecture Notes in Computer Sciences
, vol.1965
, pp. 71-77
-
-
Messerges, T.S.1
-
14
-
-
34248682000
-
FIPS PUB 46, the data encryption standard
-
NIST, U.S. Dept. of Commerce, Jan
-
National Bureau of Standards, FIPS PUB 46, The Data Encryption Standard, Federal Information Processing Standard, NIST, U.S. Dept. of Commerce, Jan 1977.
-
(1977)
Federal Information Processing Standard
-
-
-
15
-
-
0003508558
-
FIPS 197, advanced encryption standard
-
NIST, U.S. Dept. of Commerce, November
-
National Bureau of Standards, FIPS 197, Advanced Encryption Standard, Federal Information Processing Standard, NIST, U.S. Dept. of Commerce, November 2001.
-
(2001)
Federal Information Processing Standard
-
-
-
16
-
-
3042545023
-
Power-analysis attack on an ASIC AES implementation
-
Las Vegas, April 5-7
-
S.B. Ors, F. Gurkaynak, E. Oswald, B. Preneel Power-Analysis Attack on an ASIC AES implementation, in the proceedings of ITCC 2004, Las Vegas, April 5-7 2004.
-
(2004)
Proceedings of ITCC 2004
-
-
Ors, S.B.1
Gurkaynak, F.2
Oswald, E.3
Preneel, B.4
-
20
-
-
24744465637
-
Power analysis of an FPGA implementation of Rijndael: Is pipelining a DPA countermeasure?
-
proceedings of CHES 2004, Boston, USA, August
-
F.-X. Standaert, S.B. Ors, B. Preneel, Power Analysis of an FPGA Implementation of Rijndael: is Pipelining a DPA Countermeasure?, in the proceedings of CHES 2004, Lecture Notes in Computer Science, vol 3156, pp 30-44, Boston, USA, August 2004.
-
(2004)
Lecture Notes in Computer Science
, vol.3156
, pp. 30-44
-
-
Standaert, F.-X.1
Ors, S.B.2
Preneel, B.3
-
21
-
-
24744434942
-
On the masking countermeasure and higher-order power analysis attacks
-
Las Vegas, USA, April
-
F.-X. Standart, E. Peeters, J.-J. Quisquater, On the Masking Countermeasure and Higher-Order Power Analysis Attacks, in the proceedings of ITCC 2005 (vol 1), pp 562-567, Las Vegas, USA, April 2005.
-
(2005)
Proceedings of ITCC 2005
, vol.1
, pp. 562-567
-
-
Standart, F.-X.1
Peeters, E.2
Quisquater, J.-J.3
-
22
-
-
27244451145
-
Power analysis attacks and countermeasures of field programmable gate arrays: A survey
-
to appear in the August
-
F.-X. Standart, E. Peeters, G. Rouvroy, J.-J. Quisquater, Power Analysis Attacks and Countermeasures of Field Programmable Gate Arrays: a Survey, to appear in the Proceedings of the IEEE, special issue on Cryptographic Hardware and Embedded Systems, August 2005.
-
(2005)
Proceedings of the IEEE, Special Issue on Cryptographic Hardware and Embedded Systems
-
-
Standart, F.-X.1
Peeters, E.2
Rouvroy, G.3
Quisquater, J.-J.4
-
23
-
-
0036990404
-
Variance estimation and ranking of Gaussian Mixture Distributions in target tracking applications
-
Las Vegas, NV, December
-
L. Trailovic, L.Y. Pao, Variance Estimation and Ranking of Gaussian Mixture Distributions in Target Tracking Applications, in the proceedings of the IEEE Conference on Decision and Control, pp 2195-2201, Las Vegas, NV, December 2002.
-
(2002)
Proceedings of the IEEE Conference on Decision and Control
, pp. 2195-2201
-
-
Trailovic, L.1
Pao, L.Y.2
-
24
-
-
35048870686
-
Towards efficient second-order power analysis
-
proceedings of CHES 2004, Boston, USA, August
-
J. Waddle, D. Wagner, Towards Efficient Second-Order Power Analysis, in the proceedings of CHES 2004, Lecture Notes in Computer Science, vol 3156, pp 1-15, Boston, USA, August 2004.
-
(2004)
Lecture Notes in Computer Science
, vol.3156
, pp. 1-15
-
-
Waddle, J.1
Wagner, D.2
|