-
1
-
-
84937438279
-
Power analysis, what is now possible
-
Lecture Notes in Computer Science
-
Akkar, M., Bevan, R., Dischamp, P., Moyart, D., 2000. Power analysis, what is now possible In ASIACRYPT2000. Lecture Notes in Computer Science, vol. 1976, 489-502.
-
(2000)
ASIACRYPT2000.
, vol.1976
, pp. 489-502
-
-
Akkar, M.1
Bevan, R.2
Dischamp, P.3
Moyart, D.4
-
3
-
-
0012022904
-
A cautionary note regarding the evaluation of AES candidates on smart cards
-
Chari, S., Jutla, C., Rao, J., Rohtagi, P., 1999. A cautionary note regarding the evaluation of AES candidates on smart cards. In 2nd AES Candidate Conference, 133-147.
-
(1999)
2nd AES Candidate Conference
, pp. 133-147
-
-
Chari, S.1
Jutla, C.2
Rao, J.3
Rohtagi, P.4
-
4
-
-
0000267548
-
Sequences of numbers generated by addition in formal groups and new primality and factorization tests
-
Chudnovsky, D. V., Chudnovsky, G. V., 1986. Sequences of numbers generated by addition in formal groups and new primality and factorization tests. Applied Mathematics 7, 385-434.
-
(1986)
Applied Mathematics
, vol.7
, pp. 385-434
-
-
Chudnovsky, D.V.1
Chudnovsky, G.V.2
-
5
-
-
68549099548
-
Differential power analysis in the presence of hardware countermeasures
-
Lecture Notes in Computer Science
-
Clavier, C., Coron, J., Dabbous, N., 2000. Differential power analysis in the presence of hardware countermeasures. In Proceedings of CHES'00. Lecture Notes in Computer Science, vol. 1965, 252-263.
-
(2000)
Proceedings of CHES'00.
, vol.1965
, pp. 252-263
-
-
Clavier, C.1
Coron, J.2
Dabbous, N.3
-
6
-
-
84880293917
-
Resistance against differential power analysis for elliptic curve cryptosystems
-
Lecture Notes in Computer Science
-
Coron, J., 1999. Resistance against differential power analysis for elliptic curve cryptosystems. In CHES'99. Lecture Notes in Computer Science, vol. 1717, 292-302.
-
(1999)
CHES'99.
, vol.1717
, pp. 292-302
-
-
Coron, J.1
-
7
-
-
0036705048
-
A network flow approach to memory bandwidth utilization in embedded DSP core processors
-
Gebotys, C. H., 2002. A network flow approach to memory bandwidth utilization in embedded DSP core processors. IEEE Transactions on VLSI Systems 10, 4, 390-398.
-
(2002)
IEEE Transactions on VLSI Systems
, vol.10
, Issue.4
, pp. 390-398
-
-
Gebotys, C.H.1
-
8
-
-
85056953651
-
Designing VLSI cores with secure applications
-
Lecture Notes in Computer Science Springer-Verlag, Berlin
-
Gebotys, C., Gebotys, R., 2002. Designing VLSI cores with secure applications. In Proceedings of Cryptographic Hardware and Embedded Systems, Redwood City, CA. Lecture Notes in Computer Science, vol. 2523, Springer-Verlag, Berlin, 114-128.
-
(2002)
Proceedings of Cryptographic Hardware and Embedded Systems, Redwood City, CA.
, vol.2523
, pp. 114-128
-
-
Gebotys, C.1
Gebotys, R.2
-
9
-
-
34547256773
-
A framework for security on NoC technologies
-
Fl., USA
-
Gebotys, C., Gebotys, R., 2003. A framework for security on NoC technologies. In Proceedings of IEEE International Symposiuim on VLSI, Fl., USA, 113-117.
-
(2003)
Proceedings of IEEE International Symposiuim on VLSI
, pp. 113-117
-
-
Gebotys, C.1
Gebotys, R.2
-
10
-
-
0012525001
-
Software implementation of elliptic curve cryptography over prime fields
-
White Paper
-
Hankerson, D., Hernandez, J., Menezes, A., 2000. Software implementation of elliptic curve cryptography over prime fields. White Paper.
-
(2000)
-
-
Hankerson, D.1
Hernandez, J.2
Menezes, A.3
-
11
-
-
0012525001
-
Software implementation of elliptic curve cryptography over binary fields
-
White Paper
-
Hankerson, D., Hernandez, J., Menezes, A., 2000. Software implementation of elliptic curve cryptography over binary fields. White Paper.
-
(2000)
-
-
Hankerson, D.1
Hernandez, J.2
Menezes, A.3
-
12
-
-
84949515158
-
Fast implementation of public-key cryptography on a DSP TMS320C6201
-
Itoh, K., Takenaka, M., Torii, N., Tmma, S., Kurihara, Y., 1999. Fast implementation of public-key cryptography on a DSP TMS320C6201. In Lecture Notes in Computer Science, vol. 1717, 61-72.
-
(1999)
Lecture Notes in Computer Science
, vol.1717
, pp. 61-72
-
-
Itoh, K.1
Takenaka, M.2
Torii, N.3
Tmma, S.4
Kurihara, Y.5
-
13
-
-
35248835491
-
DPA countermeasures by improving the window method
-
Itoh, K., Yajima, J., Takenaka, M., Torii, N., 2000. DPA countermeasures by improving the window method. In CHES 00, 304-319.
-
(2000)
CHES
, pp. 304-319
-
-
Itoh, K.1
Yajima, J.2
Takenaka, M.3
Torii, N.4
-
14
-
-
0141890488
-
Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems
-
Kocher, P., 1998. Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems. Lecture Notes in Computer Science, vol. 1998.
-
(1998)
Lecture Notes in Computer Science
-
-
Kocher, P.1
-
15
-
-
84939573910
-
Differential power analysis
-
Kocher, P., Jaffe, J., Jun, B., 1999. Differential power analysis. In CYPTOVO, 388-397.
-
(1999)
CYPTOVO
, pp. 388-397
-
-
Kocher, P.1
Jaffe, J.2
Jun, B.3
-
16
-
-
84944898712
-
Preventing SPA/DPA in ECC systems using the Jacobi form
-
Liardet, P., Smart, N., 2001. Preventing SPA/DPA in ECC systems using the Jacobi form. Lecture Notes in Computer Science, vol. 2162, 391-401.
-
(2001)
Lecture Notes in Computer Science
, vol.2162
, pp. 391-401
-
-
Liardet, P.1
Smart, N.2
-
17
-
-
84949965262
-
Requester-aware power reduction
-
Lu, Y. H., Benini, L., Demicheli, G., 2000. Requester-aware power reduction. In Proceedings of IEEE/ACM International Symposium on System Level Synthesis, 18-23.
-
(2000)
Proceedings of IEEE/ACM International Symposium on System Level Synthesis
, pp. 18-23
-
-
Lu, Y.H.1
Benini, L.2
Demicheli, G.3
-
18
-
-
84944906595
-
Random register renaming to foil DPA
-
May, D., Müller, H., Smart, N., 2001. Random register renaming to foil DPA. Lecture Notes in Computer Science, vol. 2162, 28-38.
-
(2001)
Lecture Notes in Computer Science
, vol.2162
, pp. 28-38
-
-
May, D.1
Müller, H.2
Smart, N.3
-
20
-
-
68549099555
-
Using second-order power analysis to attack DPA resistant software
-
Messerges, T., 2000. Using second-order power analysis to attack DPA resistant software. In Proceedings of CHES. Lecture Notes in Computer Science, vol. 1965, 238-251.
-
(2000)
Proceedings of CHES. Lecture Notes in Computer Science
, vol.1965
, pp. 238-251
-
-
Messerges, T.1
-
22
-
-
0036631151
-
Current dynamics based macro-model for power simulation in a complex VLIW DSP processor
-
Muresan, R., Gebotys, C. H., 2002. Current dynamics based macro-model for power simulation in a complex VLIW DSP processor. IEE Proceedings-Computers and Digital Techniques 14V, 4, 173-187.
-
(2002)
IEE Proceedings-Computers and Digital Techniques 14V
, vol.4
, pp. 173-187
-
-
Muresan, R.1
Gebotys, C.H.2
-
23
-
-
0034789308
-
Current consumption dynamics at instruction and program level for a VLIW DSP processor
-
IEEE, Montreal
-
Muresan, R., Gebotys, C., 2001. Current consumption dynamics at instruction and program level for a VLIW DSP processor. In Proceedings of ACM/IEEE 14th International Symposium on Systems Synthesis. IEEE, Montreal, 130-135.
-
(2001)
Proceedings of ACM/IEEE 14th International Symposium on Systems Synthesis.
, pp. 130-135
-
-
Muresan, R.1
Gebotys, C.2
-
24
-
-
0004093038
-
-
2nd edn., Wiley, New York
-
Rankl, W., Effing, W., 2000. Smart Card Handbook, 2nd edn., Wiley, New York.
-
(2000)
Smart Card Handbook
-
-
Rankl, W.1
Effing, W.2
-
26
-
-
84949935382
-
Source code optimization and profiling of energy consumption in embedded systems
-
Simunic, T., Benini, L., Demicheli, G., 2000. Source code optimization and profiling of energy consumption in embedded systems. In Proceedings of IEEE/ACM International Symposium on Systems Level Synthesis, 193-198.
-
(2000)
Proceedings of IEEE/ACM International Symposium on Systems Level Synthesis
, pp. 193-198
-
-
Simunic, T.1
Benini, L.2
Demicheli, G.3
-
27
-
-
0028711545
-
Power analysis of embedded software: A first step towards software power minimization
-
Tiwari, V., Malik, S., Wolfe, A., 1994. Power analysis of embedded software: A first step towards software power minimization. IEEE Trans. VLSI 2, 4.
-
(1994)
IEEE Trans. VLSI
, vol.2
, pp. 4
-
-
Tiwari, V.1
Malik, S.2
Wolfe, A.3
-
28
-
-
85024252375
-
Segment-wise timing and power measurement in software emulation
-
Wolf, F., Kruse, J., Ernst, R., 2000. Segment-wise timing and power measurement in software emulation. In Designers Forum DATE.
-
(2000)
Designers Forum DATE.
-
-
Wolf, F.1
Kruse, J.2
Ernst, R.3
|