-
1
-
-
84939573910
-
-
Springer, Berlin pp. 388-397
-
Kocher P.C., Jaffe J., and Jun B. Differential power analysis, Proceedings of CRYPTO 1999 (1999), Springer, Berlin pp. 388-397
-
(1999)
Differential power analysis, Proceedings of CRYPTO 1999
-
-
Kocher, P.C.1
Jaffe, J.2
Jun, B.3
-
2
-
-
0036566408
-
Examining smart-card security under the threat of power analysis attacks
-
Messerges T.S., Dabbish E.A., and Sloan R.H. Examining smart-card security under the threat of power analysis attacks. IEEE Trans. Comput. 51 5 (2002) 541-552
-
(2002)
IEEE Trans. Comput.
, vol.51
, Issue.5
, pp. 541-552
-
-
Messerges, T.S.1
Dabbish, E.A.2
Sloan, R.H.3
-
4
-
-
84943632039
-
-
P.C. Kocher, Timing attacks on implementations of Diffie-Helleman, RSA, DSS and other systems, in: The Proceedings of CRYPTO'96, Springer, Berlin, 1996, pp. 104-113.
-
-
-
-
5
-
-
78650238574
-
-
J.J. Quisquater, D. Samyde, Electromagnetic analysis (EMA): measures and counter-measures for smart cards, in: The Proceedings of E-Smart 2001, Springer, Berlin, 2001, pp. 200-210.
-
-
-
-
6
-
-
84957079591
-
-
S. Chari, C.S. Julta, J.R. Rao, R. Rohatgi, Towards sound approaches to counteract power analysis attacks, in: Advances in Cryptology-CRYPTO'99, 19th Annual International Cryptology Conference, August 1999, Lecture Notes in Computer Science, vol. 1666, Springer, Berlin, 1999, pp. 398-412.
-
-
-
-
7
-
-
68549099548
-
-
C. Clavier, J.-S. Coron, N. Dabbous, Differential power analysis in the presence of hardware countermeasures, in: Cryptographic Hardware and Embedded Systems-CHES 2000, Lecture Notes in Computer Science, vol. 1965, Springer, Berlin, 2000, pp. 252-263.
-
-
-
-
8
-
-
35248868313
-
-
C. Karlof, D. Wagner, Hidden Markov Model Cryptanalysis, in Cryptographic Hardware and Embedded Systems-CHES 2003, Lecture Notes in Computer Science, vol. 2779, Springer, Berlin, 2003, pp. 17-34.
-
-
-
-
9
-
-
24144459808
-
-
S. Mangard, T. Popp, B.M. Gammel, Side-channel leakage of masked CMOS gates, in: Topics in Cryptology-CT RSA 2005, Lecture Notes in Computer Science, vol. 3376, Springer, Berlin, 2005, pp. 351-365.
-
-
-
-
11
-
-
17644364039
-
Design and analysis of dual-rail circuits for security applications
-
Sokolov D., Murphy J., Bystrov A., and Yakovlev A. Design and analysis of dual-rail circuits for security applications. IEEE Trans. Comput. 54 4 (2005) 449-459
-
(2005)
IEEE Trans. Comput.
, vol.54
, Issue.4
, pp. 449-459
-
-
Sokolov, D.1
Murphy, J.2
Bystrov, A.3
Yakovlev, A.4
-
12
-
-
77957948240
-
-
S. Moore, R. Anderson, P. Cunningham, R. Mullins, G. Taylor, Improving smart card security using self-timed circuits, Proceedings of the International Symposium on Asynchronous Circuits and Systems (ASYNC), 2002, pp. 211-218.
-
-
-
-
13
-
-
85172435252
-
-
Z. Yu, S. Furber, L. Plana, An investigation into the security of self-timed circuits, Proceedings of the International Symposium on Asynchronous Circuits and Systems (ASYNC), 2003, pp. 206-215.
-
-
-
-
14
-
-
85056962745
-
-
Piguet C. (Ed), CRC Press, Boca Raton, FL
-
In: Piguet C. (Ed). Low-power Electronics Design (2004), CRC Press, Boca Raton, FL
-
(2004)
Low-power Electronics Design
-
-
-
15
-
-
0028099030
-
-
J. Schutz, A 3.3 V 0.6 μm BiCMOS superscalar microprocessor, ISSCC Dig. Technical Papers, 1994, pp. 202-203.
-
-
-
-
16
-
-
0029710680
-
-
S. Rajgopal, Challenges in low-power microprocessor design, Proceedings of the Ninth International Conference on VLSI Design: VLSI in Mobile Communication, January 1996, pp. 329-330.
-
-
-
-
17
-
-
33745879421
-
-
J.D. Garside, A CMOS VLSI Implementation of an asynchronous Alu, in: Proceedings of the IFIP Conference on Asynchronous Design Methodologies, Manchester, England, March 1993, pp. 181-192.
-
-
-
-
18
-
-
0035275045
-
Dynamic current mode logic (DyCML): a new low-power high-performance logic style
-
Allam M.W., and Elmasry M.I. Dynamic current mode logic (DyCML): a new low-power high-performance logic style. IEEE J. Solid-State Circuits 36 3 (2001) 550-558
-
(2001)
IEEE J. Solid-State Circuits
, vol.36
, Issue.3
, pp. 550-558
-
-
Allam, M.W.1
Elmasry, M.I.2
-
19
-
-
33745894311
-
-
E. Brier, C. Clavier, Optimal statistical power analysis, IACR e-print archive 2003/152, 2003 〈http://eprint.iacr.org〉.
-
-
-
-
20
-
-
84893732023
-
-
K. Tiri, M. Akmal, I. Verbauwhede, A dynamic and differential CMOS logic with signal independent power consumption to withstand differential power analysis on smart cards, in: The Proceedings of ESSCIRC 2002, 2002, pp. 403-406.
-
-
-
-
21
-
-
33745913887
-
-
F. Mace, F.-X. Standaert, I. Hassoune, J.-D. Legat, J.-J. Quisquater, A dynamic current mode logic to counteract power analysis attacks, in: The Proceedings of DCIS 2004, 2004, pp. 186-191.
-
-
-
-
22
-
-
33745890561
-
-
P. Barreto, V. Rijmen, The Khazad legacy-level block cipher available from 〈http://paginas.terra.com.br/informatica/paulobarreto/KhazadPage.html〉.
-
-
-
-
23
-
-
84890522850
-
Communication theory of secrecy systems
-
Shannon C.E. Communication theory of secrecy systems. Bell Systems Technical J. 28 (1949) 657-715
-
(1949)
Bell Systems Technical J.
, vol.28
, pp. 657-715
-
-
Shannon, C.E.1
-
24
-
-
33646395372
-
-
F. Macé, F.-X. Standaert, J.-J. Quisquater, J.-D. Legat, A design methodology for secured ICs using dynamic current mode logic, 15th International Workshop on Power and Timing Modeling, Optimization and Simulation-PATMOS 2005, Lecture Notes in Computer Science, vol. 3728, Springer, Berlin, 2005, pp. 550-560.
-
-
-
|