-
1
-
-
84937438279
-
Power analysis, what is now possible
-
Heidelberg, Germany: Springer-Verlag, Lecture Notes in Computer Science
-
M. L. Akkar, R. Bevan, P. Dischamp, and D. Moyart, "Power analysis, what is now possible," in Advances in Cryptology - ASI-ACRYPT 2000. Heidelberg, Germany: Springer-Verlag, 2000, vol. 1976, Lecture Notes in Computer Science, pp. 489-502.
-
(2000)
Advances in Cryptology - ASI-ACRYPT 2000
, vol.1976
, pp. 489-502
-
-
Akkar, M.L.1
Bevan, R.2
Dischamp, P.3
Moyart, D.4
-
2
-
-
84943615552
-
An implementation of des and AES secure againts some attacks
-
Heidelberg, Germany: Springer-Verlag, Lecture Notes in Computer Science
-
M. L. Akkar and C. Giraud, "An implementation of DES and AES secure againts some attacks," in Cryptographic Hardware and Embedded Systems - CHES 2001. Heidelberg, Germany: Springer-Verlag, 2001, vol. 2162, Lecture Notes in Computer Science, pp. 309-318.
-
(2001)
Cryptographic Hardware and Embedded Systems - CHES 2001
, vol.2162
, pp. 309-318
-
-
Akkar, M.L.1
Giraud, C.2
-
4
-
-
27244456338
-
Ways to enhance differential power analysis
-
Heidelberg, Germany: Springer-Verlag, Lecture Notes in Computer Science
-
R. Bevan and E. Knudsen, "Ways to enhance differential power analysis," in Information Security and Technology - ICISC 2002. Heidelberg, Germany: Springer-Verlag, 2002, vol. 2587, Lecture Notes in Computer Science, pp. 327-342.
-
(2002)
Information Security and Technology - ICISC 2002
, vol.2587
, pp. 327-342
-
-
Bevan, R.1
Knudsen, E.2
-
6
-
-
35048818034
-
Correlation power analysis with a leakage model
-
Heidelberg, Germany: Springer-Verlag, Lecture Notes in Computer Science
-
E. Brier, C. Clavier, and F. Olivier, "Correlation power analysis with a leakage model," in Cryptographic Hardware and Embedded Systems - CHES 2004. Heidelberg, Germany: Springer-Verlag, 2004, vol. 3156, Lecture Notes in Computer Science, pp. 16-29.
-
(2004)
Cryptographic Hardware and Embedded Systems - CHES 2004
, vol.3156
, pp. 16-29
-
-
Brier, E.1
Clavier, C.2
Olivier, F.3
-
7
-
-
31344464000
-
On the maximum correlation coefficient
-
Dept. Statistics, Aug.
-
W. Bryc, A. Dembo, and A. Kagan, "On the maximum correlation coefficient," Dept. Statistics, Stanford Univ., Tech. Rep. 2002-25, Aug. 2002.
-
(2002)
Stanford Univ., Tech. Rep.
, vol.2002
, Issue.25
-
-
Bryc, W.1
Dembo, A.2
Kagan, A.3
-
8
-
-
33947318808
-
Electromagnetic analysis attack on an FPGA implementation of an elliptic curve cryptosystem
-
Belgrade, Serbia and Montenegro
-
P. Buysschaert, E. De Mulder, S. B. Ors, P. Delmotte, B. Preneel, G. Vandenbosch, and I. Verbauwhede, "Electromagnetic analysis attack on an FPGA implementation of an elliptic curve cryptosystem," presented at the EUROCON 2005 - Int. Conf. Computer as a Tool, Belgrade, Serbia and Montenegro.
-
EUROCON 2005 - Int. Conf. Computer As A Tool
-
-
Buysschaert, P.1
De Mulder, E.2
Ors, S.B.3
Delmotte, P.4
Preneel, B.5
Vandenbosch, G.6
Verbauwhede, I.7
-
9
-
-
31344473835
-
-
IACR E-print Archive 2004/145 [Online]
-
V. Carlier, H. Chabanne, E. Dottax, and H. Pelletier, "Electromagnetic side channels of an FPGA implementation of AES" IACR E-print Archive 2004/145, 2004 [Online], Available: http://eprint.iacr.org
-
(2004)
Electromagnetic Side Channels of An FPGA Implementation of AES
-
-
Carlier, V.1
Chabanne, H.2
Dottax, E.3
Pelletier, H.4
-
10
-
-
84957079591
-
Toward sound approaches to counteract power-analysis attacks
-
Heidelberg, Germany: Springer-Verlag, Lecture Notes in Computer Science
-
S. Chari, C. Jutla, J. Rao, and P. Rohatgi, "Toward sound approaches to counteract power-analysis attacks," in Advances in Cryptology - CRYPTO 1999. Heidelberg, Germany: Springer-Verlag, 1999, vol. 1666, Lecture Notes in Computer Science, pp. 398-412.
-
(1999)
Advances in Cryptology - CRYPTO 1999
, vol.1666
, pp. 398-412
-
-
Chari, S.1
Jutla, C.2
Rao, J.3
Rohatgi, P.4
-
11
-
-
35248899532
-
Template attacks
-
Heidelberg, Germany: Springer-Verlag, Lecture Notes in Computer Science
-
S. Chari, J. Rao, and P. Rohatgi, "Template attacks," in Cryptographic Hardware and Embedded Systems - CHES 2002. Heidelberg, Germany: Springer-Verlag, 2002, vol. 2523, Lecture Notes in Computer Science, pp. 13-28.
-
(2002)
Cryptographic Hardware and Embedded Systems - CHES 2002
, vol.2523
, pp. 13-28
-
-
Chari, S.1
Rao, J.2
Rohatgi, P.3
-
12
-
-
68549099548
-
Differential power analysis in the presence of hardware countermeasures
-
Heidelberg, Germany: Springer-Verlag, Lecture Notes in Computer Science
-
C. Clavier, J. S. Coron, and N. Dabbous, "Differential power analysis in the presence of hardware countermeasures," in Cryptographic Hardware and Embedded Systems - CHES 2000. Heidelberg, Germany: Springer-Verlag, 2000, vol. 1965, Lecture Notes in Computer Science, pp. 252-263.
-
(2000)
Cryptographic Hardware and Embedded Systems - CHES 2000
, vol.1965
, pp. 252-263
-
-
Clavier, C.1
Coron, J.S.2
Dabbous, N.3
-
13
-
-
23044528645
-
Statistics and secret leakage
-
Heidelberg, Germany: Springer-Verlag, Lecture Notes in Computer Science
-
J. S. Coron, P. Kocher, and D. Naccache, "Statistics and secret leakage," in Engineering Societies in the Agents World. Heidelberg, Germany: Springer-Verlag, 2000, vol. 1972, Lecture Notes in Computer Science, pp. 157-173.
-
(2000)
Engineering Societies in the Agents World
, vol.1972
, pp. 157-173
-
-
Coron, J.S.1
Kocher, P.2
Naccache, D.3
-
15
-
-
84949520149
-
DES and differential power analysis
-
Heidelberg, Germany: Springer-Verlag, Lecture Notes in Computer Science
-
L. Goubin and J. Patarin, "DES and differential power analysis," in Cryptographic Hardware and Embedded Systems - CHES 1999. Heidelberg, Germany: Springer-Verlag, 1999, vol. 1717, Lecture Notes in Computer Science, pp. 158-172.
-
(1999)
Cryptographic Hardware and Embedded Systems - CHES 1999
, vol.1717
, pp. 158-172
-
-
Goubin, L.1
Patarin, J.2
-
17
-
-
35248877672
-
Randomized signed-scalar multiplication of ECC to resist power attacks
-
Heidelberg, Germany: Springer-Verlag, Lecture Notes in Computer Science
-
J.-C. Ha and S.-J. Moon, "Randomized signed-scalar multiplication of ECC to resist power attacks," in Cryptographic Hardware and Embedded Systems - CHES 2002. Heidelberg, Germany: Springer-Verlag, 2002, vol. 2523, Lecture Notes in Computer Science, pp. 551-563.
-
(2002)
Cryptographic Hardware and Embedded Systems - CHES 2002
, vol.2523
, pp. 551-563
-
-
Ha, J.-C.1
Moon, S.-J.2
-
19
-
-
35248868313
-
Hidden Markov model cryptanalysis
-
Heidelberg, Germany: Springer-Verlag, Lecture Notes in Computer Science
-
C. Karlof and D. Wagner, "Hidden Markov model cryptanalysis," in Cryptographic Hardware and Embedded Systems - CHES 2003. Heidelberg, Germany: Springer-Verlag, 2003, vol. 2779, Lecture Notes in Computer Science, pp. 17-30.
-
(2003)
Cryptographic Hardware and Embedded Systems - CHES 2003
, vol.2779
, pp. 17-30
-
-
Karlof, C.1
Wagner, D.2
-
20
-
-
0000474763
-
Differential power analysis
-
Heidelberg, Germany: Springer-Verlag, Lecture Notes in Computer Science
-
P. Kocher, J. Jaffe, and B. Jun, "Differential power analysis," in Advances in Cryptology - CRYPTO 99. Heidelberg, Germany: Springer-Verlag, 1999, vol. 1666, Lecture Notes in Computer Science, pp. 398-412.
-
(1999)
Advances in Cryptology - CRYPTO 99
, vol.1666
, pp. 398-412
-
-
Kocher, P.1
Jaffe, J.2
Jun, B.3
-
21
-
-
27944474458
-
A dynamic current mode logic to counteract power analysis attacks
-
Bordeaux, France
-
F. Mace, F.-X. Standaert, I. Hassoune, J.-D. Legat, and J.-J. Quisquater, "A dynamic current mode logic to counteract power analysis attacks," presented at the DCIS 2004, Bordeaux, France.
-
DCIS 2004
-
-
Mace, F.1
Standaert, F.-X.2
Hassoune, I.3
Legat, J.-D.4
Quisquater, J.-J.5
-
22
-
-
24144470308
-
Hardware countermeasures against DPA - A statistical analysis of their effectiveness
-
Heidelberg, Germany: Springer-Verlag, Lecture Notes in Computer Science
-
S. Mangard, "Hardware countermeasures against DPA - a statistical analysis of their effectiveness," in Topics in Cryptology - CT-RSA 2005. Heidelberg, Germany: Springer-Verlag, 2005, vol. 3376, Lecture Notes in Computer Science, pp. 222-235.
-
(2005)
Topics in Cryptology - CT-RSA 2005
, vol.3376
, pp. 222-235
-
-
Mangard, S.1
-
23
-
-
31344450795
-
Side-channel leakage of masked CMOS gates
-
Heidelberg, Germany: Springer-Verlag, Lecture Notes in Computer Science
-
_, "Side-channel leakage of masked CMOS gates," in Topics in Cryptology - CT-RSA 2004. Heidelberg, Germany: Springer-Verlag, 2004, vol. 2964, Lecture Notes in Computer Science, pp. 351-365.
-
(2004)
Topics in Cryptology - CT-RSA 2004
, vol.2964
, pp. 351-365
-
-
-
24
-
-
85025704284
-
Linear cryptanalysis method for des cipher
-
Heidelberg, Germany: Springer-Verlag, Lecture Notes in Computer Science
-
M. Matsui, "Linear cryptanalysis method for DES cipher," in Advances in Cryptology - EUROCRYPT 1993. Heidelberg, Germany: Springer-Verlag, 1993, vol. 765, Lecture Notes in Computer Science, pp. 386-397.
-
(1993)
Advances in Cryptology - EUROCRYPT 1993
, vol.765
, pp. 386-397
-
-
Matsui, M.1
-
25
-
-
84944906595
-
Randomized register renaming to foil DPA
-
Heidelberg, Germany: Springer-Verlag, Lecture Notes in Computer Science
-
D. May, H. Muller, and N. Smart, "Randomized register renaming to foil DPA," in Cryptographic Hardware and Embedded Systems - CHES 2001. Heidelberg, Germany: Springer-Verlag, 2001. vol. 2162, Lecture Notes in Computer Science, pp. 28-38.
-
(2001)
Cryptographic Hardware and Embedded Systems - CHES 2001
, vol.2162
, pp. 28-38
-
-
May, D.1
Muller, H.2
Smart, N.3
-
26
-
-
2642560170
-
Using second-order power analysis to attack DPA resistant software
-
Heidelberg, Germany: Springer-Verlag, Lecture Notes in Computer Science
-
T. S. Messerges, "Using second-order power analysis to attack DPA resistant software," in Cryptographic Hardware and Embedded Systems - CHES 2000. Heidelberg, Germany: Springer-Verlag, 2000, vol. 1965, Lecture Notes in Computer Science, pp. 71-77.
-
(2000)
Cryptographic Hardware and Embedded Systems - CHES 2000
, vol.1965
, pp. 71-77
-
-
Messerges, T.S.1
-
27
-
-
0036566408
-
Examining smart-card security under the threat of power analysis attacks
-
May
-
T. S. Messerges, E. A. Dabbish, and R. H. Sloan, "Examining smart-card security under the threat of power analysis attacks," IEEE Trans. Comput., vol. 51, no. 5, pp. 541-552, May 2002.
-
(2002)
IEEE Trans. Comput.
, vol.51
, Issue.5
, pp. 541-552
-
-
Messerges, T.S.1
Dabbish, E.A.2
Sloan, R.H.3
-
28
-
-
0003508568
-
-
FIPS 46, National Institute of Standards and Technology, Jan.
-
Data Encryption Standard, FIPS 46, National Institute of Standards and Technology, Jan. 1977.
-
(1977)
Data Encryption Standard
-
-
-
29
-
-
0003508558
-
-
FIPS 197, National Institute of Standards and Technology, Nov.
-
Advanced Encryption Standard, FIPS 197, National Institute of Standards and Technology, Nov. 2001.
-
(2001)
Advanced Encryption Standard
-
-
-
30
-
-
8744295498
-
Power-analysis attacks on an FPGA - First experimental results
-
Heidelberg, Germany: Springer-Verlag, Lecture Notes in Computer Science
-
S. B. Ors, E. Oswald, and B. Preneel, "Power-analysis attacks on an FPGA - First experimental results," in Cryptographic Hardware and Embedded Systems - CHES 2003. Heidelberg, Germany: Springer-Verlag, 2003, vol. 2279, Lecture Notes in Computer Science, pp. 35-50.
-
(2003)
Cryptographic Hardware and Embedded Systems - CHES 2003
, vol.2279
, pp. 35-50
-
-
Ors, S.B.1
Oswald, E.2
Preneel, B.3
-
31
-
-
3042545023
-
Power-analysis attack on an ASIC AES implementation
-
Las Vegas, NV
-
S. B. Ors, F. Gurkaynak, E. Oswald, and B. Preneel, "Power-analysis attack on an ASIC AES implementation," presented at the ITCC 2004, Las Vegas, NV.
-
ITCC 2004
-
-
Ors, S.B.1
Gurkaynak, F.2
Oswald, E.3
Preneel, B.4
-
32
-
-
84944889933
-
Randomized addition-substraction chains as a countermeasure against power attacks
-
Heidelberg, Germany: Springer-Verlag, Lecture Notes in Computer Science
-
E. Oswald and M. Aigner, "Randomized addition-substraction chains as a countermeasure against power attacks," in Cryptographic Hardware and Embedded Systems - CHES 2001. Heidelberg, Germany: Springer-Verlag, 2001, vol. 2162, Lecture Notes in Computer Science, pp. 39-50.
-
(2001)
Cryptographic Hardware and Embedded Systems - CHES 2001
, vol.2162
, pp. 39-50
-
-
Oswald, E.1
Aigner, M.2
-
33
-
-
35248821853
-
Enhancing simple power-analysis attacks on elliptic curve cryptosystems
-
Heidelberg, Germany: Springer-Verlag, Lecture Notes in Computer Science
-
E. Oswald, "Enhancing simple power-analysis attacks on elliptic curve cryptosystems," in Cryptographic Hardware and Embedded Systems - CHES 2002. Heidelberg, Germany: Springer-Verlag, 2002. vol. 2523, Lecture Notes in Computer Science, pp. 82-97.
-
(2002)
Cryptographic Hardware and Embedded Systems - CHES 2002
, vol.2523
, pp. 82-97
-
-
Oswald, E.1
-
34
-
-
33745823184
-
A side-channel analysis description of the AES S-box
-
Paris, France
-
E. Oswald, S. Mangard, N. Pramstaller, and V. Rijmen, "A side-channel analysis description of the AES S-box," presented at the FSE 2005, Paris, France.
-
FSE 2005
-
-
Oswald, E.1
Mangard, S.2
Pramstaller, N.3
Rijmen, V.4
-
35
-
-
27244438087
-
Improved higher-order side-channel attacks with FPGA experiments
-
Heidelberg, Germany: Springer-Verlag, Lecture Notes in Computer Science
-
E. Peeters, F.-X. Standaert, N. Donckers, and J.-J. Quisquater, "Improved higher-order side-channel attacks with FPGA experiments," in Cryptographic Hardware and Embedded Systems - CHES 2005. Heidelberg, Germany: Springer-Verlag, 2005, vol. 3659, Lecture Notes in Computer Science, pp. 309-323.
-
(2005)
Cryptographic Hardware and Embedded Systems - CHES 2005
, vol.3659
, pp. 309-323
-
-
Peeters, E.1
Standaert, F.-X.2
Donckers, N.3
Quisquater, J.-J.4
-
37
-
-
24744465637
-
Power analysis of an FPGA implementation of Rijndael: Is pipelining a DPA countermeasure?
-
Heidelberg, Germany: Springer-Verlag, Lecture Notes in Computer Science
-
F.-X. Standaert, S. B. Ors, and B. Preneel, "Power analysis of an FPGA implementation of Rijndael: is pipelining a DPA countermeasure?," in Cryptographic Hardware and Embedded Systems - CHES 2004. Heidelberg, Germany: Springer-Verlag, 2004, vol. 3156, Lecture Notes in Computer Science, pp. 30-44.
-
(2004)
Cryptographic Hardware and Embedded Systems - CHES 2004
, vol.3156
, pp. 30-44
-
-
Standaert, F.-X.1
Ors, S.B.2
Preneel, B.3
-
38
-
-
31344451762
-
Power analysis attacks against FPGA implementations of the des
-
Heidelberg, Germany: Springer-Verlag, Lecture Notes in Computer Science
-
F.-X. Standaert, S. B. Ors, J.-J. Quisquater, and B. Preneel, "Power analysis attacks against FPGA implementations of the DES," in Field Programmable Logic and Application. Heidelberg, Germany: Springer-Verlag, 2004, vol. 3203, Lecture Notes in Computer Science, pp. 84-94.
-
(2004)
Field Programmable Logic and Application
, vol.3203
, pp. 84-94
-
-
Standaert, F.-X.1
Ors, S.B.2
Quisquater, J.-J.3
Preneel, B.4
-
39
-
-
24744434942
-
On the masking countermeasure and higher-order power analysis attacks
-
Embedded Crypto Track, Las Vegas, NV
-
F.-X. Standaert, E. Peeters, and J.-J. Quisquater, "On the masking countermeasure and higher-order power analysis attacks," presented at the ITCC 2005, Embedded Crypto Track, Las Vegas, NV.
-
ITCC 2005
-
-
Standaert, F.-X.1
Peeters, E.2
Quisquater, J.-J.3
-
40
-
-
31344472314
-
Updates on the security of FPGAs against power analysis attacks
-
F.-X. Standaert, F. Mace, E. Peeters, and J.-J. Quisquater, "Updates on the security of FPGAs against power analysis attacks," UCL Crypto Group, Tech. Rep. CG-2006/1.
-
UCL Crypto Group, Tech. Rep.
, vol.CG-2006-1
-
-
Standaert, F.-X.1
Mace, F.2
Peeters, E.3
Quisquater, J.-J.4
-
41
-
-
84893732023
-
A dynamic and differential CMOS logic with signal independent power consumption to withstand differential power analysis on smart cards
-
K. Tiri, M. Akmal, and I. Verbauwhede, "A dynamic and differential CMOS logic with signal independent power consumption to withstand differential power analysis on smart cards," in Proc. ESSCIRC 2002 pp. 403-406.
-
Proc. ESSCIRC 2002
, pp. 403-406
-
-
Tiri, K.1
Akmal, M.2
Verbauwhede, I.3
-
43
-
-
84902478964
-
Place and route for secure standard cell design
-
_, "Place and route for secure standard cell design," in Proc. CARDIS 2004 pp. 143-158.
-
Proc. CARDIS 2004
, pp. 143-158
-
-
-
45
-
-
35048870686
-
Toward efficient second-order power analysis
-
Heidelberg, Germany: Springer-Verlag, Lecture Notes in Computer Science
-
J. Waddle and D. Wagner, "Toward efficient second-order power analysis," in Cryptographic Hardware and Embedded Systems - CHES 2004. Heidelberg, Germany: Springer-Verlag, 2004, vol. 3156, Lecture Notes in Computer Science, pp. 1-15.
-
(2004)
Cryptographic Hardware and Embedded Systems - CHES 2004
, vol.3156
, pp. 1-15
-
-
Waddle, J.1
Wagner, D.2
-
46
-
-
84944889837
-
MIST: An efficient, randomized exponentiation algorithm for resisting power analysis
-
Heidelberg, Germany: Springer-Verlag, Lecture Notes in Computer Science
-
C. D. Walter, "MIST: An efficient, randomized exponentiation algorithm for resisting power analysis," in Topics in Cryptology - CT-RSA 2002. Heidelberg, Germany: Springer-Verlag, 2002, vol. 2271, Lecture Notes in Computer Science, pp. 53-66.
-
(2002)
Topics in Cryptology - CT-RSA 2002
, vol.2271
, pp. 53-66
-
-
Walter, C.D.1
|