-
1
-
-
84943615552
-
An implementation of des and AES secure against some attacks
-
Ç. K. Koç, D. Naccache, and C. Paar, editors. Springer-Verlag
-
M.-L. Akkar and C. Giraud. An Implementation of DES and AES Secure against Some Attacks. In Ç. K. Koç, D. Naccache, and C. Paar, editors, Cryptographic Hantware and Embedded Systems - CHES 2001, volume LNCS 2162, pages 309-318. Springer-Verlag, 2001.
-
(2001)
Cryptographic Hantware and Embedded Systems - CHES 2001
, vol.LNCS 2162
, pp. 309-318
-
-
Akkar, M.-L.1
Giraud, C.2
-
2
-
-
0242571734
-
A generic protection against high-order differential power analysis
-
T. Johansson, editor. Springer-Verlag
-
M.-L. Akkar and L. Goubin. A Generic Protection against High-Order Differential Power Analysis. In T. Johansson, editor, Fast Software Encryption - FSE 2003, volume 2887, pages 192-205. Springer-Verlag, 2003.
-
(2003)
Fast Software Encryption - FSE 2003
, vol.2887
, pp. 192-205
-
-
Akkar, M.-L.1
Goubin, L.2
-
3
-
-
84937438279
-
Power analysis, what is now possible
-
Tatsuaki Okamoto, editor. Springer
-
Mehdi-Laurent Akkar, Régis Bevan, Paul Dischamp, and Didier Moyart. Power Analysis, What Is Now Possible... In Tatsuaki Okamoto, editor, Advances in Cryptology - ASIACRYPT 2000, volume LNCS 1976, pages 489-502. Springer, 2000.
-
(2000)
Advances in Cryptology - ASIACRYPT 2000
, vol.LNCS 1976
, pp. 489-502
-
-
Akkar, M.-L.1
Bevan, R.2
Dischamp, P.3
Moyart, D.4
-
4
-
-
35048848490
-
Provably secure masking of AES
-
H. Handschuh and M. Anwar Hasan, editors. Springer-Verlag, August
-
J. Blömer, J. Guajardo, and V. Krummel. Provably Secure Masking of AES. In H. Handschuh and M. Anwar Hasan, editors, Selected Areas in Cryptography - SAC 2004, volume 3357, pages 69-83. Springer-Verlag, August 2004.
-
(2004)
Selected Areas in Cryptography - SAC 2004
, vol.3357
, pp. 69-83
-
-
Blömer, J.1
Guajardo, J.2
Krummel, V.3
-
5
-
-
35048818034
-
Correlation power analysis with a leakage model
-
M. Joye and J.-J. Quisquater, editors. Springer-Verlag
-
E. Brier, C. Clavier, and F. Olivier. Correlation Power Analysis with a Leakage Model. In M. Joye and J.-J. Quisquater, editors, Cryptographic Hardware and Embedded Systems - CHES 2004, volume 3156, pages 16-29. Springer-Verlag, 2004.
-
(2004)
Cryptographic Hardware and Embedded Systems - CHES 2004
, vol.3156
, pp. 16-29
-
-
Brier, E.1
Clavier, C.2
Olivier, F.3
-
6
-
-
0012022904
-
A cautionary note regarding the evaluation of AES candidates on smart cards
-
Rome, Italy, March
-
S. Chari, C. S. Jutla, J. R. Rao, and P. Rohatgi. A Cautionary Note Regarding the Evaluation of AES Candidates on Smart Cards. In Proceedings: Second AES Candidate Conference (AES2), Rome, Italy, March 1999.
-
(1999)
Proceedings: Second AES Candidate Conference (AES2)
-
-
Chari, S.1
Jutla, C.S.2
Rao, J.R.3
Rohatgi, P.4
-
7
-
-
84957079591
-
Towards sound approaches to counteract power-analysis attacks
-
. Springer-Verlag, August
-
S. Chari, C. S. Jutla, J. R. Rao, and P. Rohatgi. Towards Sound Approaches to Counteract Power-Analysis Attacks. In Advances in Cryptology - CRYPTO '99, volume LNCS 1666, pages 398-412. Springer-Verlag, August 1999.
-
(1999)
Advances in Cryptology - CRYPTO '99
, vol.LNCS 1666
, pp. 398-412
-
-
Chari, S.1
Jutla, C.S.2
Rao, J.R.3
Rohatgi, P.4
-
8
-
-
68549105908
-
On boolean and arithmetic masking against differential power analysis
-
C. K. Koç and C. Paar, editors. Springer-Verlag
-
C. Clavier and J.-S. Coron. On Boolean and Arithmetic Masking against Differential Power Analysis. In C. K. Koç and C. Paar, editors, Cryptographic Hardware and Embedded Systems - CHES 2000, volume LNCS 1965, pages 231-237. Springer-Verlag, 2000.
-
(2000)
Cryptographic Hardware and Embedded Systems - CHES 2000
, vol.LNCS 1965
, pp. 231-237
-
-
Clavier, C.1
Coron, J.-S.2
-
9
-
-
33745660202
-
An algebraic masking method to protect AES against power attacks
-
N. T. Courtois and L. Goubin. An Algebraic Masking Method to Protect AES Against Power Attacks, http://eprint.iacr.org/2005/204.pdf, 2005. Cryptology ePrint Archive: Report 2005/204.
-
(2005)
Cryptology ePrint Archive: Report
, vol.2005
, Issue.204
-
-
Courtois, N.T.1
Goubin, L.2
-
11
-
-
35248830819
-
Multiplicative masking and power analysis of AES
-
B.S. Kaliski, Ç. K. Koç, and C. Paar, editors. Springer-Verlag
-
J. D. Colic and C. Tymen. Multiplicative Masking and Power Analysis of AES. In B.S. Kaliski, Ç. K. Koç, and C. Paar, editors, Cryptographic Hardware and Embedded Systems - CHES 2002, volume 2523, pages 198-212. Springer-Verlag, 2002.
-
(2002)
Cryptographic Hardware and Embedded Systems - CHES 2002
, vol.2523
, pp. 198-212
-
-
Colic, J.D.1
Tymen, C.2
-
13
-
-
84939573910
-
Differential power analysis: Leaking secrets
-
Springer-Verlag
-
P. Kocher, J. Jaffe, and B. Jun. Differential Power Analysis: Leaking Secrets. In Advances in Cryptology - CRYPTO '99, volume LNCS 1666, pages 388-397. Springer-Verlag, 1999.
-
(1999)
Advances in Cryptology - CRYPTO '99
, vol.LNCS 1666
, pp. 388-397
-
-
Kocher, P.1
Jaffe, J.2
Jun, B.3
-
14
-
-
35048852153
-
DPA on n-bit sized boolean and arithmetic operations and its application to IDEA, RC6 and the HMAC-construction
-
M. Joye and J.-J. Quisquater, editors. Springer-Verlag, August
-
K. Lemke, K. Schramm, and C. Paar. DPA on n-Bit Sized Boolean and Arithmetic Operations and Its Application to IDEA, RC6 and the HMAC-Construction. In M. Joye and J.-J. Quisquater, editors, Cryptographic Hardware and Embedded Systems - CHES 2004, volume 3156, pages 205-219. Springer-Verlag, August 2004.
-
(2004)
Cryptographic Hardware and Embedded Systems - CHES 2004
, vol.3156
, pp. 205-219
-
-
Lemke, K.1
Schramm, K.2
Paar, C.3
-
15
-
-
84974679353
-
Securing the AES finalists against power analysis attacks
-
B. Schneier, editor. Springer-Verlag
-
T. S. Messerges. Securing the AES Finalists Against Power Analysis Attacks. In B. Schneier, editor, Fast Software Encryption -FSE 2000, volume LNCS 1978, pages 150-164. Springer-Verlag, 2000.
-
(2000)
Fast Software Encryption -FSE 2000
, vol.LNCS 1978
, pp. 150-164
-
-
Messerges, T.S.1
-
16
-
-
68549099555
-
Using second-order power analysis to attack DPA resistant software
-
Ç. K. Koç and C. Paar, editors.. Springer-Verlag
-
T. S. Messerges. Using Second-Order Power Analysis to Attack DPA Resistant Software. In Ç. K. Koç and C. Paar, editors. Cryptographic Hardware and Embedded Systems - CHES 2000, volume LNCS 1965, pages 238 - 251. Springer-Verlag, 2000.
-
(2000)
Cryptographic Hardware and Embedded Systems - CHES 2000
, vol.LNCS 1965
, pp. 238-251
-
-
Messerges, T.S.1
-
19
-
-
47749116367
-
AES side channel attack protection using random isomorphisms
-
A. G. Rostovtsev and O.V Shemyakina. AES Side Channel Attack Protection Using Random Isomorphisms, http://eprint.iacr.org/2005/087.pdf, 2005. Cryptology ePrint Archive: Report 2005/087.
-
(2005)
Cryptology ePrint Archive: Report
, vol.2005
, Issue.87
-
-
Rostovtsev, A.G.1
Shemyakina, O.V.2
-
20
-
-
35248890508
-
Simplified adaptive multiplicative masking for AES
-
B.S. Kaliski, Ç. K. Koç, and C. Paar, editors. Springer-Verlag
-
E. Trichina, D.S. Seta, and L. Germani. Simplified Adaptive Multiplicative Masking for AES. In B.S. Kaliski, Ç. K. Koç, and C. Paar, editors, Cryptographic Hardware and Embedded Systems - CHES 2002, volume 2523, pages 187-197. Springer-Verlag, 2002.
-
(2002)
Cryptographic Hardware and Embedded Systems - CHES 2002
, vol.2523
, pp. 187-197
-
-
Trichina, E.1
Seta, D.S.2
Germani, L.3
-
21
-
-
35048870686
-
Towards efficient second-order power analysis
-
M. Joye and J.-J. Quisquater, editors. Springer-Verlag
-
J. Waddle and D. Wagner. Towards Efficient Second-Order Power Analysis. In M. Joye and J.-J. Quisquater, editors, Cryptographic Hardware and Embedded Systems - CHES 2004, volume 3156, pages 1-15. Springer-Verlag, 2004.
-
(2004)
Cryptographic Hardware and Embedded Systems - CHES 2004
, vol.3156
, pp. 1-15
-
-
Waddle, J.1
Wagner, D.2
|