-
1
-
-
84939573910
-
Differential power analysis
-
Crypto'99, Springer-Verlag
-
P. Kocher, J. Jaffe and B. Jun, "Differential Power Analysis," Crypto'99, LNCS 1666, pp. 388-397, Springer-Verlag, 1999.
-
(1999)
LNCS
, vol.1666
, pp. 388-397
-
-
Kocher, P.1
Jaffe, J.2
Jun, B.3
-
2
-
-
84880293917
-
Resistance against differential power analysis for elliptic curve cryptosystems
-
CHES'99, Springer-Verlag
-
J.-S. Coron, "Resistance against Differential Power Analysis for Elliptic Curve Cryptosystems," CHES'99, LNCS 1717, Springer-Verlag, pp. 292-302, 1999.
-
(1999)
LNCS
, vol.1717
, pp. 292-302
-
-
Coron, J.-S.1
-
3
-
-
84943615552
-
An implementation of des and AES, secure against some attacks
-
CHES 2001, Springer-Verlag
-
M. Akkar and C. Giraud, "An Implementation of DES and AES, Secure against Some Attacks," CHES 2001, LNCS 2162, pp. 309-318, Springer-Verlag, 2001.
-
(2001)
LNCS
, vol.2162
, pp. 309-318
-
-
Akkar, M.1
Giraud, C.2
-
4
-
-
84893732023
-
A dynamic and differential CMOS logic with signal independent power consumption to withstand differential power analysis on smartcards
-
K. Tiri, M. Akmal and I. Verbauwhede, "A Dynamic and Differential CMOS Logic with Signal Independent Power Consumption to Withstand Differential Power Analysis on SmartCards," Proc. of 28th European Solid-State Circuits Conference, pp.403-406, 2002.
-
(2002)
Proc. of 28th European Solid-state Circuits Conference
, pp. 403-406
-
-
Tiri, K.1
Akmal, M.2
Verbauwhede, I.3
-
5
-
-
35248825993
-
Securing encryption algorithms against DPA at the logic level: Next generation smart card technology
-
CHES 2003, Springer-Verlag
-
K. Tiri and I. Verbauwhede, "Securing Encryption Algorithms against DPA at the Logic Level: Next Generation Smart Card Technology," CHES 2003, LNCS 2779, p.125-136, Springer-Verlag, 2003.
-
(2003)
LNCS
, vol.2779
, pp. 125-136
-
-
Tiri, K.1
Verbauwhede, I.2
-
8
-
-
84957079591
-
Towards sound approaches to counteract power analysis attacks
-
Crypto'99, Springer-Verlag
-
S. Chari, C.S. Jutla, J.R. Rao and P. Rohatgi, "Towards Sound Approaches to Counteract Power Analysis Attacks," Crypto'99, LNCS 1666, pp. 398-412, Springer-Verlag, 1999.
-
(1999)
LNCS
, vol.1666
, pp. 398-412
-
-
Chari, S.1
Jutla, C.S.2
Rao, J.R.3
Rohatgi, P.4
-
9
-
-
68549099548
-
Differential power analysis in the presence of hardware countermeasures
-
CHES 2000, Springer-Verlag
-
C. Clavier, J.-S. Coron and N. Dabbous, "Differential Power Analysis in the Presence of Hardware Countermeasures," CHES 2000, LNCS 1965, pp. 252-263, Springer-Verlag, 2000.
-
(2000)
LNCS
, vol.1965
, pp. 252-263
-
-
Clavier, C.1
Coron, J.-S.2
Dabbous, N.3
-
10
-
-
27244456338
-
Ways to enhance differential power analysis
-
ICISC 2002, Springer-Verlag
-
R. Bevan and E. Knudsen, "Ways to Enhance Differential Power Analysis," ICISC 2002, LNCS 2587, pp. 327-342, Springer-Verlag, 2003.
-
(2003)
LNCS
, vol.2587
, pp. 327-342
-
-
Bevan, R.1
Knudsen, E.2
-
11
-
-
27244431906
-
Random switching logic: A countermeasure against DPA based on transition probability
-
D. Suzuki, M.Saeki and T.Ichikawa, "Random Switching Logic: A Countermeasure against DPA based on Transition Probability," Cryptology ePrint Archive, Report 2004/346, 2004.
-
(2004)
Cryptology EPrint Archive, Report
, vol.2004
, Issue.346
-
-
Suzuki, D.1
Saeki, M.2
Ichikawa, T.3
-
12
-
-
68549099555
-
Using second-order power analysis to attack DPA resistant software
-
CHES 2000, Springer-Verlag
-
T.S. Messerges, "Using Second-Order Power Analysis to Attack DPA Resistant Software," CHES 2000, LNCS 1965, pp. 238-251, Springer-Verlag, 2000.
-
(2000)
LNCS
, vol.1965
, pp. 238-251
-
-
Messerges, T.S.1
-
13
-
-
35048870686
-
Towards efficient second-order power analysis
-
CHES 2004, Springer-Verlag
-
J. Waddle and D. Wagner, "Towards Efficient Second-Order Power Analysis," CHES 2004, LNCS 3156, pp. 1-15, Springer-Verlag, 2004.
-
(2004)
LNCS
, vol.3156
, pp. 1-15
-
-
Waddle, J.1
Wagner, D.2
-
14
-
-
27244448121
-
-
ISEC2004-57, IEICE, July (in Japanese)
-
M. Saeki, D. Suzuki and T. Ichikawa, "Construction of DPA Leakage Model and Evaluation by Logic Simulation," ISEC2004-57, IEICE, July 2004 (in Japanese).
-
(2004)
Construction of DPA Leakage Model and Evaluation by Logic Simulation
-
-
Saeki, M.1
Suzuki, D.2
Ichikawa, T.3
-
15
-
-
84937438279
-
Power analysis, what is now posible
-
Asiacrypto 2000, Springer-Verlag
-
M. Akkar, R. Bevan, P. Dischamp and D. Moyart, "Power Analysis, What Is Now Posible...," Asiacrypto 2000, LNCS 1976, pp. 489-502, Springer-Verlag, 2000.
-
(2000)
LNCS
, vol.1976
, pp. 489-502
-
-
Akkar, M.1
Bevan, R.2
Dischamp, P.3
Moyart, D.4
-
16
-
-
0026853681
-
Low power digital CMOS design
-
A.P. Chandrakasan, S. Sheng and R.W. Brodersen, "Low Power Digital CMOS Design," IEEE Journal of Solid State Circuits, Vol.27, N0.4. pp. 473-484, 1992.
-
(1992)
IEEE Journal of Solid State Circuits
, vol.27
, Issue.4
, pp. 473-484
-
-
Chandrakasan, A.P.1
Sheng, S.2
Brodersen, R.W.3
-
17
-
-
84861263686
-
-
Philips Electronics NV, "DATA CARRIER WITH OBSCURED POWER CONSUMPTION," Patent, WO00/026746
-
Philips Electronics NV, "DATA CARRIER WITH OBSCURED POWER CONSUMPTION," Patent, WO00/026746.
-
-
-
-
19
-
-
30644473871
-
Provably secure masking of AES
-
J. Blömer, J.G. Merchan and V. Krummel, "Provably Secure Masking of AES," Cryptology ePrint Archive, Report 2004/101, 2004.
-
(2004)
Cryptology EPrint Archive, Report
, vol.2004
, Issue.101
-
-
Blömer, J.1
Merchan, J.G.2
Krummel, V.3
-
20
-
-
27244435382
-
-
ISEC2004-58, IEICE, July (in Japanese)
-
T. Ichikawa, D. Suzuki and M. Saeki, "An Attack on Cryptographic Hardware Design with Masking Method," ISEC2004-58, IEICE, July 2004 (in Japanese).
-
(2004)
An Attack on Cryptographic Hardware Design with Masking Method
-
-
Ichikawa, T.1
Suzuki, D.2
Saeki, M.3
-
21
-
-
24144459808
-
Side-channel leakage of masked CMOS gates
-
CT-RSA 2005, Springer-Verlag
-
S. Mangard, T. Popp, and B. M. Gammel," Side-Channel Leakage of Masked CMOS Gates", CT-RSA 2005, LNCS 3376, pp. 361-365, Springer-Verlag, 2005
-
(2005)
LNCS
, vol.3376
, pp. 361-365
-
-
Mangard, S.1
Popp, T.2
Gammel, B.M.3
|