-
1
-
-
84943615552
-
An implementation of DES and AES, secure against some attacks
-
Ç. K. Koç, D. Naccache, and C. Paar, editors, number 2162 in Lecture Notes in Computer Science, Paris, France, May 13-16. Springer-Verlag
-
M.-L. Akkar and C. Giraud. An implementation of DES and AES, secure against some attacks. In Ç. K. Koç, D. Naccache, and C. Paar, editors, Proceedings of 3rd International Workshop on Cryptographic Hardware and Embedded Systems (CHES), number 2162 in Lecture Notes in Computer Science, pages 309-318, Paris, France, May 13-16 2001. Springer-Verlag.
-
(2001)
Proceedings of 3rd International Workshop on Cryptographic Hardware and Embedded Systems (CHES)
, pp. 309-318
-
-
Akkar, M.-L.1
Giraud, C.2
-
2
-
-
0002380073
-
Tamper resistance - A cautionary note
-
D. Tygar, editor, Oakland, CA, USA, November 18-21
-
R. Anderson and M. Kuhn. Tamper resistance - a cautionary note. In D. Tygar, editor, Proceedings of the 2nd USENIX Workshop on Electronic Commerce, pages 1-11, Oakland, CA, USA, November 18-21 1996.
-
(1996)
Proceedings of the 2nd USENIX Workshop on Electronic Commerce
, pp. 1-11
-
-
Anderson, R.1
Kuhn, M.2
-
4
-
-
84957079591
-
Towards sound approaches to counteract power-analysis attacks
-
M. Wiener, editor, number 1666 in Lecture Notes in Computer Science, Santa Barbara, CA, USA, August 15-19. Springer-Verlag
-
S. Chari, C. S. Jutla, J. R. Rao, and P. Rohatgi. Towards sound approaches to counteract power-analysis attacks. In M. Wiener, editor, Advances in Cryptology: Proceedings of CRYPTO'99, number 1666 in Lecture Notes in Computer Science, pages 398-412, Santa Barbara, CA, USA, August 15-19 1999. Springer-Verlag.
-
(1999)
Advances in Cryptology: Proceedings of CRYPTO'99
, pp. 398-412
-
-
Chari, S.1
Jutla, C.S.2
Rao, J.R.3
Rohatgi, P.4
-
6
-
-
35248830819
-
Multiplicative masking and power anaylsis of AES
-
B. S. Kaliski Jr., Ç. K. Koç, and C. Paar, editors, number 2535 in Lecture Notes in Computer Science, Redwood Shores, CA, USA, August 13-15. Springer-Verlag
-
J. D. Golic̀ and C. Tymen. Multiplicative masking and power anaylsis of AES. In B. S. Kaliski Jr., Ç. K. Koç, and C. Paar, editors, Proceedings of 4th International Workshop on Cryptographic Hardware and Embedded Systems (CHES), number 2535 in Lecture Notes in Computer Science, pages 198-212, Redwood Shores, CA, USA, August 13-15 2002. Springer-Verlag.
-
(2002)
Proceedings of 4th International Workshop on Cryptographic Hardware and Embedded Systems (CHES)
, pp. 198-212
-
-
Golic̀, J.D.1
Tymen, C.2
-
8
-
-
84943632039
-
Timing attacks on implementations of Diffie-Hellman, RSA, DSS and other systems
-
N. Koblitz, editor, number 1109 in Lecture Notes in Computer Science, Santa Barbara, CA, USA, August 18-22. Springer-Verlag
-
P. Kocher. Timing attacks on implementations of Diffie-Hellman, RSA, DSS and other systems. In N. Koblitz, editor, Advances in Cryptology: Proceedings of CRYPTO'96, number 1109 in Lecture Notes in Computer Science, pages 104-113, Santa Barbara, CA, USA, August 18-22 1996. Springer-Verlag.
-
(1996)
Advances in Cryptology: Proceedings of CRYPTO'96
, pp. 104-113
-
-
Kocher, P.1
-
9
-
-
84939573910
-
Differential power analysis
-
M. Wiener, editor, number 1666 in Lecture Notes in Computer Science, Santa Barbara, CA, USA, August 15-19. Springer-Verlag
-
P. Kocher, J. Jaffe, and B. Jun. Differential power analysis. In M. Wiener, editor, Advances in Cryptology: Proceedings of CRYPTO'99, number 1666 in Lecture Notes in Computer Science, pages 388-397, Santa Barbara, CA, USA, August 15-19 1999. Springer-Verlag.
-
(1999)
Advances in Cryptology: Proceedings of CRYPTO'99
, pp. 388-397
-
-
Kocher, P.1
Jaffe, J.2
Jun, B.3
-
10
-
-
35248892041
-
A simple power-analysis attack (SPA) attack on implementations of the AES key expansion
-
P. J. Lee and C. H. Lim, editors, number 2587 in Lecture Notes in Computer Science, Seoul, Korea, November. Springer-Verlag
-
S. Mangard. A simple power-analysis attack (SPA) attack on implementations of the AES key expansion. In P. J. Lee and C. H. Lim, editors, Proceedings of 5th International Conference on Information Security and Crytography (ICISC), number 2587 in Lecture Notes in Computer Science, pages 343-358, Seoul, Korea, November 2002. Springer-Verlag.
-
(2002)
Proceedings of 5th International Conference on Information Security and Crytography (ICISC)
, pp. 343-358
-
-
Mangard, S.1
-
12
-
-
3042634267
-
-
October reaffirmed
-
National Institute of Standards and Technology. FIPS 46-3: Data Encryption Standard, October reaffirmed 1999.
-
(1999)
FIPS 46-3: Data Encryption Standard
-
-
-
13
-
-
35248890508
-
Simplified adaptive multiplicative masking for AES
-
B. S. Kaliski Jr., Ç. K. Koç, and C. Paar, editors, number 2535 in Lecture Notes in Computer Science, Redwood Shores, CA, USA, August 13-15. Springer-Verlag
-
E. Trichina, D. De Seta, and L. Germani. Simplified adaptive multiplicative masking for AES. In B. S. Kaliski Jr., Ç. K. Koç, and C. Paar, editors, Proceedings of 4th International Workshop on Cryptographic Hardware and Embedded Systems (CHES), number 2535 in Lecture Notes in Computer Science, pages 187-197, Redwood Shores, CA, USA, August 13-15 2002. Springer-Verlag.
-
(2002)
Proceedings of 4th International Workshop on Cryptographic Hardware and Embedded Systems (CHES)
, pp. 187-197
-
-
Trichina, E.1
De Seta, D.2
Germani, L.3
|