-
1
-
-
3042651468
-
High security smart-cards
-
Feb.
-
M. Renaudin, F. Bouesse, P. Proust, J. Tuai, L. Sourgen, and F. Germain, "High security smart-cards," in Proc. Design Automation and Test in Europe Conf. (DATE), Feb. 2004, pp. 228-233.
-
(2004)
Proc. Design Automation and Test in Europe Conf. (DATE)
, pp. 228-233
-
-
Renaudin, M.1
Bouesse, F.2
Proust, P.3
Tuai, J.4
Sourgen, L.5
Germain, F.6
-
2
-
-
4444331720
-
Security as a new dimension in embedded system design
-
Jun.
-
P. Kocher, R. Lee, G. McGraw, A. Raghunathan, and S. Ravi, "Security as a new dimension in embedded system design," in Proc. Design Automation Conf. (DAC), Jun. 2004, pp. 753-760.
-
(2004)
Proc. Design Automation Conf. (DAC)
, pp. 753-760
-
-
Kocher, P.1
Lee, R.2
McGraw, G.3
Raghunathan, A.4
Ravi, S.5
-
3
-
-
84939573910
-
Differential power analysis
-
Aug., LNCS 1666
-
P. Kocher, J. Jaffe, and B. Jun, "Differential power analysis," in Proc. Advances in Cryptology (CRYPTO), Aug. 1999, LNCS 1666, pp. 388-397.
-
(1999)
Proc. Advances in Cryptology (CRYPTO)
, pp. 388-397
-
-
Kocher, P.1
Jaffe, J.2
Jun, B.3
-
4
-
-
84957812088
-
Selecting cryptographic key sizes
-
LNCS 1751
-
A. Lenstra and E. Verheul, "Selecting cryptographic key sizes," in Int. Workshop on Practice, and Theory in PublicKey Cryptogmphy (PKC), 2000, LNCS 1751, pp. 446-465.
-
(2000)
Int. Workshop on Practice, and Theory in PublicKey Cryptogmphy (PKC)
, pp. 446-465
-
-
Lenstra, A.1
Verheul, E.2
-
5
-
-
33645692468
-
AES-based cryptographic and biometric security coprocessor IC in 0.18-μm CMOS resistant to side-channel power analysis attacks
-
Jun.
-
K. Tiri, D. Hwang, A. Hodjat, B. Lai, S. Yang, P. Schaumont, and I. Verbauwhede, "AES-based cryptographic and biometric security coprocessor IC in 0.18-μm CMOS resistant to side-channel power analysis attacks," in Symp. VLSI Circuits Dig., Jun. 2005, pp. 216-219.
-
(2005)
Symp. VLSI Circuits Dig.
, pp. 216-219
-
-
Tiri, K.1
Hwang, D.2
Hodjat, A.3
Lai, B.4
Yang, S.5
Schaumont, P.6
Verbauwhede, I.7
-
6
-
-
0003508558
-
-
[Online]
-
National Institute of Standards and Technology, Advanced Encryption Standard. [Online], Available: http://csrc.nist.gov/publica-tions/fips/fip 197/fips-197.pdf 2001
-
(2001)
Advanced Encryption Standard
-
-
-
8
-
-
3042604811
-
A logic level design methodology for a secure DPA resistant ASIC or FPGA implementation
-
Feb.
-
K. Tiri and I. Verbauwhede, "A logic level design methodology for a secure DPA resistant ASIC or FPGA implementation," in Proc. Design Automation and Test in Europe Conf. (DATE), Feb. 2004, pp. 246-251.
-
(2004)
Proc. Design Automation and Test in Europe Conf. (DATE)
, pp. 246-251
-
-
Tiri, K.1
Verbauwhede, I.2
-
9
-
-
33645696140
-
-
[Online]
-
International Technology Roadmap for Semiconductors (ITRS), Interconnect. [Online], Available: http://public.itrs.net/Files/2003ITRS/Interconnect2003.pdf 2003
-
(2003)
Interconnect
-
-
-
11
-
-
3142699811
-
A 10-Gbps full-AES design with a twisted BDD S-box architecture
-
Jul.
-
S. Morioka and A. Satoh, "A 10-Gbps full-AES design with a twisted BDD S-box architecture," IEEE Trans. Veiy Large Scale Integr. (VLSI) Syst., vol. 12, no. 7, pp. 686-691, Jul. 2004.
-
(2004)
IEEE Trans. Veiy Large Scale Integr. (VLSI) Syst.
, vol.12
, Issue.7
, pp. 686-691
-
-
Morioka, S.1
Satoh, A.2
-
12
-
-
35248826454
-
Security evaluation of asynchronous circuits
-
Sep., LNCS 2779
-
J. Fournier, S. Moore, H. Li, R. Mullins, and G. Taylor, "Security evaluation of asynchronous circuits," in Proc. Workshop on Cryptographic Hardware and Embedded Systems (CHES), Sep. 2003, LNCS 2779, pp. 137-151.
-
(2003)
Proc. Workshop on Cryptographic Hardware and Embedded Systems (CHES)
, pp. 137-151
-
-
Fournier, J.1
Moore, S.2
Li, H.3
Mullins, R.4
Taylor, G.5
-
13
-
-
24144459808
-
Side-channel leakage of masked CMOS gates
-
Feb., LNCS 3376
-
S. Mangard, T. Popp, and B. Gammel, "Side-channel leakage of masked CMOS gates," in Proc. RSA Conf. 2005 Cryptographers' Track (CT-RSA), Feb. 2005, LNCS 3376, pp. 351-365.
-
(2005)
Proc. RSA Conf. 2005 Cryptographers' Track (CT-RSA)
, pp. 351-365
-
-
Mangard, S.1
Popp, T.2
Gammel, B.3
-
14
-
-
27244451021
-
Successfully attacking masked AES hardware implementations
-
Aug., LNCS 3659
-
S. Mangard, N. Pramstaller, and E. Oswald, "Successfully attacking masked AES hardware implementations," in Proc. Workshop on Cryptographic Hardware and Embedded Systems (CHES), Aug. 2005, LNCS 3659, pp. 157-171.
-
(2005)
Proc. Workshop on Cryptographic Hardware and Embedded Systems (CHES)
, pp. 157-171
-
-
Mangard, S.1
Pramstaller, N.2
Oswald, E.3
|