-
1
-
-
84943615552
-
An implementation of des and AES secure against some attacks
-
Ç. K. Koç, D. Naccache, and C. Paar, editors, Cryptogaphic Hardware and Embedded Systems - CHES 2001, Springer-Verlag
-
M.-L. Akkar and C. Giraud. An implementation of DES and AES secure against some attacks. In Ç. K. Koç, D. Naccache, and C. Paar, editors, Cryptogaphic Hardware and Embedded Systems - CHES 2001, volume 2162 of Lecture Notes in Computer Science, pages 309-318. Springer-Verlag, 2001.
-
(2001)
Lecture Notes in Computer Science
, vol.2162
, pp. 309-318
-
-
Akkar, M.-L.1
Giraud, C.2
-
3
-
-
24744459871
-
AES power attack based on induced cache miss and countermeasures
-
IEEE Computer Society
-
G. Bertoni, V. Zaccaria, L. Breveglieri, M. Monchiero, and G. Palermo. AES power attack based on induced cache miss and countermeasures. In International Symposium on Information Technology: Coding and Computing - ITCC 2005, pages 586-591. IEEE Computer Society, 2005.
-
(2005)
International Symposium on Information Technology: Coding and Computing - ITCC 2005
, pp. 586-591
-
-
Bertoni, G.1
Zaccaria, V.2
Breveglieri, L.3
Monchiero, M.4
Palermo, G.5
-
4
-
-
68549099548
-
Differential power analysis in the presence of hardware countermeasures
-
Ç. K. Koç and C. Paar, editors, Cryptographic Hardware and Embedded Systems - CHES 2000, Springer-Verlag
-
C. Clavier, J.-S. Coron, and N. Dabbous. Differential power analysis in the presence of hardware countermeasures. In Ç. K. Koç and C. Paar, editors, Cryptographic Hardware and Embedded Systems - CHES 2000, volume 1965 of Lecture Notes in Computer Science, pages 252-263. Springer-Verlag, 2000.
-
(2000)
Lecture Notes in Computer Science
, vol.1965
, pp. 252-263
-
-
Clavier, C.1
Coron, J.-S.2
Dabbous, N.3
-
6
-
-
84939573910
-
Differential power analysis
-
M. J. Wiener, editor, Advances in Cryptology - CRYPTO '99, Springer-Verlag
-
P. Kocher, J. Jaffe, and B. Jun. Differential power analysis. In M. J. Wiener, editor, Advances in Cryptology - CRYPTO '99, volume 1666 of Lecture Notes in Computer Science, pages 388-397. Springer-Verlag, 1999.
-
(1999)
Lecture Notes in Computer Science
, vol.1666
, pp. 388-397
-
-
Kocher, P.1
Jaffe, J.2
Jun, B.3
-
8
-
-
84941154719
-
-
MIPS-Technologies. SmartMIPS ASE. http://www.mips.com/content/Products/.
-
SmartMIPS ASE
-
-
-
9
-
-
0042357566
-
-
MIPS™architecture for programmers volume I: Introduction to the MIPS32™architecture. Revision 0.95, March
-
MIPS-Technologies. MIPS™architecture for programmers volume I: Introduction to the MIPS32™architecture. Technical Report MD00082, Revision 0.95, March 2001.
-
(2001)
Technical Report
, vol.MD00082
-
-
-
11
-
-
33745640963
-
Cache attacks and countermeasures: The case of AES
-
D. Pointcheval, editor, Topics in Cryptology - CT-RSA 2006, Springer-Verlag
-
D. A. Osvik, A. Shamir, and E. Tromer. Cache attacks and countermeasures: the case of AES. In D. Pointcheval, editor, Topics in Cryptology - CT-RSA 2006, volume 3860 of Lecture Notes in Computer Science, pages 1-20. Springer-Verlag, 2006.
-
(2006)
Lecture Notes in Computer Science
, vol.3860
, pp. 1-20
-
-
Osvik, D.A.1
Shamir, A.2
Tromer, E.3
-
12
-
-
1942457187
-
Theoretical use of cache memory as a cryptanalytic side-channel
-
D. Page. Theoretical use of cache memory as a cryptanalytic side-channel. Cryptology ePrint Archive, Report 2002/169, 2002. http://eprint.iacr.org/.
-
(2002)
Cryptology EPrint Archive, Report
, vol.2002
, Issue.169
-
-
Page, D.1
-
13
-
-
1942441379
-
Defending against cache based side-channel attacks
-
April
-
D. Page. Defending against cache based side-channel attacks. Information Security Technical Report, 8(1):30-44, April 2003.
-
(2003)
Information Security Technical Report
, vol.8
, Issue.1
, pp. 30-44
-
-
Page, D.1
-
14
-
-
0036086193
-
Partitioning attacks: Or how to rapidly clone some gsm cards
-
J. R. Rao, P. Rohatgi, H. Scherzer, and S. Tinguely. Partitioning attacks: or how to rapidly clone some gsm cards. In Proceedings of the IEEE Symposium on Security and Privacy, pages 31-41, 2002.
-
(2002)
Proceedings of the IEEE Symposium on Security and Privacy
, pp. 31-41
-
-
Rao, J.R.1
Rohatgi, P.2
Scherzer, H.3
Tinguely, S.4
-
15
-
-
33746372361
-
-
preliminary short product information 04.03
-
Infineon Technologies AG Secure and Mobile Solutions Security Group. Security & chip cards ICs SLE88Cx4000P, preliminary short product information 04.03, 2003.
-
(2003)
Security & Chip Cards ICs SLE88Cx4000P
-
-
-
16
-
-
35248855964
-
Cryptanalysis of des implemented on computers with cache
-
C. D. Walter, Ç. K. Koç, and C. Paar, editors, Cryptographic Hardware and Embedded Systems - CHES 2003, Springer-Verlag
-
Y. Tsunoo, T. Saito, T. Suzaki, M. Shigeri, and H. Miyauchi. Cryptanalysis of DES implemented on computers with cache. In C. D. Walter, Ç. K. Koç, and C. Paar, editors, Cryptographic Hardware and Embedded Systems - CHES 2003, volume 2779 of Lecture Notes in Computer Science, pages 62-76. Springer-Verlag, 2003.
-
(2003)
Lecture Notes in Computer Science
, vol.2779
, pp. 62-76
-
-
Tsunoo, Y.1
Saito, T.2
Suzaki, T.3
Shigeri, M.4
Miyauchi, H.5
|