-
1
-
-
35048848006
-
Two power analysis attacks against one-mask methods
-
Fast Software Encryption, 11th International Workshop, FSE 2004, Delhi, India, February 5-7, 2004, Revised Papers. Springer
-
Mehdi-Laurent Akkar, Régis Bevan, and Louis Goubin. Two Power Analysis Attacks against One-Mask Methods. In Fast Software Encryption, 11th International Workshop, FSE 2004, Delhi, India, February 5-7, 2004, Revised Papers, volume 3017 of Lecture Notes in Computer Science, pages 332-347. Springer, 2004.
-
(2004)
Lecture Notes in Computer Science
, vol.3017
, pp. 332-347
-
-
Akkar, M.-L.1
Bevan, R.2
Goubin, L.3
-
2
-
-
84943615552
-
An implementation of DES and AES, secure against some attacks
-
Cryptographic Hardware and Embedded Systems - CHES 2001, Third International Workshop, Paris, France, May 14-16, 2001, Proceedings. Springer
-
Mehdi-Laurent Akkar and Christophe Giraud. An Implementation of DES and AES, Secure against Some Attacks. In Cryptographic Hardware and Embedded Systems - CHES 2001, Third International Workshop, Paris, France, May 14-16, 2001, Proceedings, volume 2162 of Lecture Notes in Computer Science, pages 309-318. Springer, 2001.
-
(2001)
Lecture Notes in Computer Science
, vol.2162
, pp. 309-318
-
-
Akkar, M.-L.1
Giraud, C.2
-
3
-
-
35048848490
-
Provably secure masking of AES
-
Selected Areas in Cryptography, 11th International Workshop, SAC 2004, Waterloo, Canada, August 9-10, 2004, Revised Selected Papers. Springer
-
Johannes Blömer, Jorge Guajardo, and Volker Krummel. Provably Secure Masking of AES. In Selected Areas in Cryptography, 11th International Workshop, SAC 2004, Waterloo, Canada, August 9-10, 2004, Revised Selected Papers, volume 3357 of Lecture Notes in Computer Science, pages 69-83. Springer, 2005.
-
(2005)
Lecture Notes in Computer Science
, vol.3357
, pp. 69-83
-
-
Blömer, J.1
Guajardo, J.2
Krummel, V.3
-
4
-
-
35248899532
-
Template attacks
-
Cryptographic Hardware and Embedded Systems - CHES 2002, 4th International Workshop, Redwood Shores, CA, USA, August 13-15, 2002, Revised Papers. Springer
-
Suresh Chari, Josyula R. Rao, and Pankaj Rohatgi. Template Attacks. In Cryptographic Hardware and Embedded Systems - CHES 2002, 4th International Workshop, Redwood Shores, CA, USA, August 13-15, 2002, Revised Papers, volume 2535 of Lecture Notes in Computer Science, pages 13-28. Springer, 2003.
-
(2003)
Lecture Notes in Computer Science
, vol.2535
, pp. 13-28
-
-
Chari, S.1
Rao, J.R.2
Rohatgi, P.3
-
5
-
-
27244437240
-
Secure masking in the presence of glitches
-
Lecture Notes in Computer Science. Springer
-
Wieland Fischer and Berndt M. Gammel. Secure Masking in the Presence of Glitches. In Cryptographic Hardware and Embedded Systems - CHES 2005, 7th International Workshop, Edinburgh, Scotland, August 29 - September 1, 2005, Proceedings, Lecture Notes in Computer Science. Springer, 2005.
-
(2005)
Cryptographic Hardware and Embedded Systems - CHES 2005, 7th International Workshop, Edinburgh, Scotland, August 29 - September 1, 2005, Proceedings
-
-
Fischer, W.1
Gammel, B.M.2
-
6
-
-
35248830819
-
Multiplicative masking and power analysis of AES
-
Cryptographic Hardware and Embedded Systems - CHES 2002, 4th International Workshop, Redwood Shores, CA, USA, August 13-15, 2002, Revised Papers. Springer
-
Jovan D. Golić and Christophe Tymen. Multiplicative Masking and Power Analysis of AES. In Cryptographic Hardware and Embedded Systems - CHES 2002, 4th International Workshop, Redwood Shores, CA, USA, August 13-15, 2002, Revised Papers, volume 2535 of Lecture Notes in Computer Science, pages 198-212. Springer, 2003.
-
(2003)
Lecture Notes in Computer Science
, vol.2535
, pp. 198-212
-
-
Golić, J.D.1
Tymen, C.2
-
7
-
-
84939573910
-
Differential power analysis
-
Advances in Cryptology - CRYPTO '99, 19th Annual International Cryptology Conference, Santa Barbara, California, USA, August 15-19, 1999, Proceedings. Springer
-
Paul C. Kocher, Joshua Jaffe, and Benjamin Jun. Differential Power Analysis. In Advances in Cryptology - CRYPTO '99, 19th Annual International Cryptology Conference, Santa Barbara, California, USA, August 15-19, 1999, Proceedings, volume 1666 of Lecture Notes in Computer Science, pages 388-397. Springer, 1999.
-
(1999)
Lecture Notes in Computer Science
, vol.1666
, pp. 388-397
-
-
Kocher, P.C.1
Jaffe, J.2
Jun, B.3
-
8
-
-
24144459808
-
Side-channel leakage of masked CMOS gates
-
Topics in Cryptology - CT-RSA 2005, The Cryptographers' Track at the RSA Conference 2005, San Francisco, CA, USA, February 14-18, 2005, Proceedings. Springer
-
Stefan Mangard, Thomas Popp, and Berndt M. Gammel. Side-Channel Leakage of Masked CMOS Gates. In Topics in Cryptology - CT-RSA 2005, The Cryptographers' Track at the RSA Conference 2005, San Francisco, CA, USA, February 14-18, 2005, Proceedings, volume 3376 of Lecture Notes in Computer Science, pages 351-365. Springer, 2005.
-
(2005)
Lecture Notes in Computer Science
, vol.3376
, pp. 351-365
-
-
Mangard, S.1
Popp, T.2
Gammel, B.M.3
-
9
-
-
68549099555
-
Using second-order power analysis to attack DPA resistant software
-
Cryptographic Hardware and Embedded Systems - CHES 2000, Second International Workshop, Worcester, MA, USA, August 17-18, 2000, Proceedings. Springer
-
Thomas S. Messerges. Using Second-Order Power Analysis to Attack DPA Resistant Software. In Cryptographic Hardware and Embedded Systems - CHES 2000, Second International Workshop, Worcester, MA, USA, August 17-18, 2000, Proceedings, volume 1965 of Lecture Notes in Computer Science, pages 238-251. Springer, 2000.
-
(2000)
Lecture Notes in Computer Science
, vol.1965
, pp. 238-251
-
-
Messerges, T.S.1
-
10
-
-
3042644992
-
-
November
-
National Institute of Standards and Technology (NIST). FIPS-197: Advanced Encryption Standard, November 2001. Available online at http://www.itl.nist. gov/fipspubs/.
-
(2001)
FIPS-197: Advanced Encryption Standard
-
-
-
11
-
-
3042545023
-
Power-analysis attack on an ASIC AES implementation
-
Siddika Berna Örs, Frank K. Gürkaynak, Elisabeth Oswald, and Bart Preneel. Power-Analysis Attack on an ASIC AES Implementation. In Proceedings International Conference on Information Technology - ITCC 2004, Las Vegas, USA, Proceedings, 2004.
-
(2004)
Proceedings International Conference on Information Technology - ITCC 2004, Las Vegas, USA, Proceedings
-
-
Örs, S.B.1
Gürkaynak, F.K.2
Oswald, E.3
Preneel, B.4
-
12
-
-
26444465110
-
A side-channel analysis resistant description of the AES S-box
-
Fast Software Encryption, 12th International Workshop, FSE 2005, Paris, France, February 21-23, 2005, Proceedings, Springer
-
Elisabeth Oswald, Stefan Mangard, Norbert Pramstaller, and Vincent Rijmen. A Side-Channel Analysis Resistant Description of the AES S-box. In Fast Software Encryption, 12th International Workshop, FSE 2005, Paris, France, February 21-23, 2005, Proceedings, volume 3557 of Lecture Notes in Computer Science, Springer, 2005.
-
(2005)
Lecture Notes in Computer Science
, vol.3557
-
-
Oswald, E.1
Mangard, S.2
Pramstaller, N.3
Rijmen, V.4
-
13
-
-
27244451515
-
Masked dual-rail pre-charge logic: DPA-resistance without routing constraints
-
Lecture Notes in Computer Science. Springer
-
Thomas Popp and Stefan Mangard. Masked Dual-Rail Pre-Charge Logic: DPA-Resistance without Routing Constraints. In Cryptographic Hardware and Embedded Systems - CHES 2005, 7th International Workshop, Edinburgh, Scotland, August 29-September 1, 2005, Proceedings, Lecture Notes in Computer Science. Springer, 2005.
-
(2005)
Cryptographic Hardware and Embedded Systems - CHES 2005, 7th International Workshop, Edinburgh, Scotland, August 29-September 1, 2005, Proceedings
-
-
Popp, T.1
Mangard, S.2
-
17
-
-
35248890508
-
Simplified adaptive multiplicative masking for AES
-
Cryptographic Hardware and Embedded Systems - CHES 2002, 4th International Workshop, Redwood Shores, CA, USA, August 13-15, 2002, Revised Papers. Springer
-
Elena Trichina, Domenico De Seta, and Lucia Germani. Simplified Adaptive Multiplicative Masking for AES. In Cryptographic Hardware and Embedded Systems - CHES 2002, 4th International Workshop, Redwood Shores, CA, USA, August 13-15, 2002, Revised Papers, volume 2535 of Lecture Notes in Computer Science, pages 187-197. Springer, 2003.
-
(2003)
Lecture Notes in Computer Science
, vol.2535
, pp. 187-197
-
-
Trichina, E.1
De Seta, D.2
Germani, L.3
-
18
-
-
35048870686
-
Towards efficient second-order power analysis
-
Cryptographic Hardware and Embedded Systems - CHES 2004, 6th International Workshop, Cambridge, MA, USA, August 11-13, 2004, Proceedings. Springer
-
Jason Waddle and David Wagner. Towards Efficient Second-Order Power Analysis. In Cryptographic Hardware and Embedded Systems - CHES 2004, 6th International Workshop, Cambridge, MA, USA, August 11-13, 2004, Proceedings, volume 3156 of Lecture Notes in Computer Science, pages 1-15. Springer, 2004.
-
(2004)
Lecture Notes in Computer Science
, vol.3156
, pp. 1-15
-
-
Waddle, J.1
Wagner, D.2
-
19
-
-
84944896938
-
An ASIC implementation of the AES SBoxes
-
Topics in Cryptology - CT-RSA 2002, The Cryptographer's Track at the RSA Conference 2002, San Jose, CA, USA, February 18-22, 2002. Springer
-
Johannes Wolkerstorfer, Elisabeth Oswald, and Mario Lamberger. An ASIC implementation of the AES SBoxes. In Topics in Cryptology - CT-RSA 2002, The Cryptographer's Track at the RSA Conference 2002, San Jose, CA, USA, February 18-22, 2002, volume 2271 of Lecture Notes in Computer Science, pages 67-78. Springer, 2002.
-
(2002)
Lecture Notes in Computer Science
, vol.2271
, pp. 67-78
-
-
Wolkerstorfer, J.1
Oswald, E.2
Lamberger, M.3
|