-
1
-
-
35048848006
-
Two power analysis attacks against one-mask methods
-
Bimal K. Roy and Willi Meier, editors, Fast Software Encryption, 11th International Workshop, FSE 2004, Delhi, India, February 5-7, 2004, Revised Papers, Springer
-
Mehdi-Laurent Akkar, Régis Bevan, and Louis Goubin. Two Power Analysis Attacks against One-Mask Methods. In Bimal K. Roy and Willi Meier, editors, Fast Software Encryption, 11th International Workshop, FSE 2004, Delhi, India, February 5-7, 2004, Revised Papers, volume 3017 of Lecture Notes in Computer Science, pages 332-347. Springer, 2004.
-
(2004)
Lecture Notes in Computer Science
, vol.3017
, pp. 332-347
-
-
Akkar, M.-L.1
Bevan, R.2
Goubin, L.3
-
2
-
-
84943615552
-
An implementation of des and AES, secure against some attacks
-
Çetin Kaya Koç, David Naccache, and Christof Paar, editors, Cryptographic Hardware and Embedded Systems - CHES 2001, Third International Workshop, Paris, France, May 14-16, 2001, Proceedings, Springer
-
Mehdi-Laurent Akkar and Christophe Giraud. An Implementation of DES and AES, Secure against Some Attacks. In Çetin Kaya Koç, David Naccache, and Christof Paar, editors, Cryptographic Hardware and Embedded Systems - CHES 2001, Third International Workshop, Paris, France, May 14-16, 2001, Proceedings, volume 2162 of Lecture Notes in Computer Science, pages 309-318. Springer, 2001.
-
(2001)
Lecture Notes in Computer Science
, vol.2162
, pp. 309-318
-
-
Akkar, M.-L.1
Giraud, C.2
-
3
-
-
35048848490
-
Provably secure masking of AES
-
Helena Handschuh and M. Anwar Hasan, editors, Selected Areas in Cryptography, 11th International Workshop, SAC 2004, Waterloo, Canada, August 9-10, 2004, Revised Selected Papers, Springer
-
Johannes Blömer, Jorge Guajardo, and Volker Krummel. Provably Secure Masking of AES. In Helena Handschuh and M. Anwar Hasan, editors, Selected Areas in Cryptography, 11th International Workshop, SAC 2004, Waterloo, Canada, August 9-10, 2004, Revised Selected Papers, volume 3357 of Lecture Notes in Computer Science, pages 69-83. Springer, 2005.
-
(2005)
Lecture Notes in Computer Science
, vol.3357
, pp. 69-83
-
-
Blömer, J.1
Guajardo, J.2
Krummel, V.3
-
4
-
-
27244432772
-
Masking at gate level in the presence of glitches
-
Josyula R. Rao and Berk Sunar, editors, Cryptographic Hardware and Embedded Systems - CHES 2005, 7th International Workshop, Edinburgh, Scotland, August 29 - September 1, 2005, Proceedings, Springer
-
Wieland Fischer and Berndt M. Gammel. Masking at Gate Level in the Presence of Glitches. In Josyula R. Rao and Berk Sunar, editors, Cryptographic Hardware and Embedded Systems - CHES 2005, 7th International Workshop, Edinburgh, Scotland, August 29 - September 1, 2005, Proceedings, volume 3659 of Lecture Notes in Computer Science, pages 187-200. Springer, 2005.
-
(2005)
Lecture Notes in Computer Science
, vol.3659
, pp. 187-200
-
-
Fischer, W.1
Gammel, B.M.2
-
5
-
-
35248830819
-
Multiplicative masking and power analysis of AES
-
Burton S. Kaliski Jr., Çetin Kaya Koç, and Christof Paar, editors, Cryptographic Hardware and Embedded Systems - CHES 2002, 4th International Workshop, Redwood Shores, CA, USA, August 13-15, 2002, Revised Papers, Springer
-
Jovan D. Golić and Christophe Tymen. Multiplicative Masking and Power Analysis of AES. In Burton S. Kaliski Jr., Çetin Kaya Koç, and Christof Paar, editors, Cryptographic Hardware and Embedded Systems - CHES 2002, 4th International Workshop, Redwood Shores, CA, USA, August 13-15, 2002, Revised Papers, volume 2535 of Lecture Notes in Computer Science, pages 198-212. Springer, 2003.
-
(2003)
Lecture Notes in Computer Science
, vol.2535
, pp. 198-212
-
-
Golić, J.D.1
Tymen, C.2
-
6
-
-
27244453895
-
On second-order differential power analysis
-
Josyula R. Rao and Berk Sunar, editors, Cryptographic Hardware and Embedded Systems - CHES 2005, 7th International Workshop, Edinburgh, UK, August 29 - September 1, 2005, Proceedings, Springer
-
Marc Joye, Pascal Paillier, and Berry Schoenmakers. On Second-Order Differential Power Analysis. In Josyula R. Rao and Berk Sunar, editors, Cryptographic Hardware and Embedded Systems - CHES 2005, 7th International Workshop, Edinburgh, UK, August 29 - September 1, 2005, Proceedings, volume 3659 of Lecture Notes in Computer Science, pages 293-308. Springer, 2005.
-
(2005)
Lecture Notes in Computer Science
, vol.3659
, pp. 293-308
-
-
Joye, M.1
Paillier, P.2
Schoenmakers, B.3
-
7
-
-
84939573910
-
Differential power analysis
-
Michael Wiener, editor, Advances in Cryptology - CRYPTO '99, 19th Annual International Cryptology Conference, Santa Barbara, California, USA, August 15-19, 1999, Proceedings, Springer
-
Paul C. Kocher, Joshua Jaffe, and Benjamin Jun. Differential Power Analysis. In Michael Wiener, editor, Advances in Cryptology - CRYPTO '99, 19th Annual International Cryptology Conference, Santa Barbara, California, USA, August 15-19, 1999, Proceedings, volume 1666 of Lecture Notes in Computer Science, pages 388-397. Springer, 1999.
-
(1999)
Lecture Notes in Computer Science
, vol.1666
, pp. 388-397
-
-
Kocher, P.C.1
Jaffe, J.2
Jun, B.3
-
8
-
-
24144459808
-
Side-channel leakage of masked CMOS gates
-
Alfred Menezes, editor, Topics in Cryptology - CT-RSA 2005, The Cryptographers' Track at the RSA Conference 2005, San Francisco, CA, USA, February 14-18, 2005, Proceedings, Springer
-
Stefan Mangard, Thomas Popp, and Berndt M. Gammel. Side-Channel Leakage of Masked CMOS Gates. In Alfred Menezes, editor, Topics in Cryptology - CT-RSA 2005, The Cryptographers' Track at the RSA Conference 2005, San Francisco, CA, USA, February 14-18, 2005, Proceedings, volume 3376 of Lecture Notes in Computer Science, pages 351-365. Springer, 2005.
-
(2005)
Lecture Notes in Computer Science
, vol.3376
, pp. 351-365
-
-
Mangard, S.1
Popp, T.2
Gammel, B.M.3
-
9
-
-
27244451021
-
Successfully attacking masked AES hardware implementations
-
Josyula R. Rao and Berk Sunar, editors, Cryptographic Hardware and Embedded Systems - CHES 2005, 7th International Workshop, Edinburgh, Scotland, August 29 - September 1, 2005, Proceedings, Springer
-
Stefan Mangard, Norbert Pramstaller, and Elisabeth Oswald. Successfully Attacking Masked AES Hardware Implementations. In Josyula R. Rao and Berk Sunar, editors, Cryptographic Hardware and Embedded Systems - CHES 2005, 7th International Workshop, Edinburgh, Scotland, August 29 - September 1, 2005, Proceedings, volume 3659 of Lecture Notes in Computer Science, pages 157-171. Springer, 2005.
-
(2005)
Lecture Notes in Computer Science
, vol.3659
, pp. 157-171
-
-
Mangard, S.1
Pramstaller, N.2
Oswald, E.3
-
10
-
-
68549099555
-
Using second-order power analysis to attack DPA resistant software
-
Çetin Kaya Koç and Christof Paar, editors, Cryptographic Hardware and Embedded Systems - CHES 2000, Second International Workshop, Worcester, MA, USA, August 17-18, 2000, Proceedings, Springer
-
Thomas S. Messerges. Using Second-Order Power Analysis to Attack DPA Resistant Software. In Çetin Kaya Koç and Christof Paar, editors, Cryptographic Hardware and Embedded Systems - CHES 2000, Second International Workshop, Worcester, MA, USA, August 17-18, 2000, Proceedings, volume 1965 of Lecture Notes in Computer Science, pages 238-251. Springer, 2000.
-
(2000)
Lecture Notes in Computer Science
, vol.1965
, pp. 238-251
-
-
Messerges, T.S.1
-
11
-
-
33750731688
-
A DPA-resistant compact AES S-box circuit using additive mask
-
September (in Japanese only)
-
Sumio Morioka and Toru Akishita. A DPA-resistant Compact AES S-Box Circuit using Additive Mask. In Computer Security Composium (CSS), October 16, 2004, Proceedings, pages 679-684, September 2004. (in Japanese only).
-
(2004)
Computer Security Composium (CSS), October 16, 2004, Proceedings
, pp. 679-684
-
-
Morioka, S.1
Akishita, T.2
-
12
-
-
35248894915
-
An optimized S-box circuit architecture for low power AES design
-
Burton S. Kaliski Jr., Çetin Kaya Koç, and Christof Paar, editors, Cryptographic Hardware and Embedded Systems - CHES 2002, 4th International Workshop, Redwood Shores, CA, USA, August 13-15, 2002, Revised Papers, Springer
-
Sumio Morioka and Akashi Satoh. An Optimized S-Box Circuit Architecture for Low Power AES Design. In Burton S. Kaliski Jr., Çetin Kaya Koç, and Christof Paar, editors, Cryptographic Hardware and Embedded Systems - CHES 2002, 4th International Workshop, Redwood Shores, CA, USA, August 13-15, 2002, Revised Papers, volume 2535 of Lecture Notes in Computer Science, pages 172-186. Springer, 2003.
-
(2003)
Lecture Notes in Computer Science
, vol.2535
, pp. 172-186
-
-
Morioka, S.1
Satoh, A.2
-
13
-
-
3042644992
-
-
November
-
National Institute of Standards and Technology (NIST). FIPS-197: Advanced Encryption Standard, November 2001. Available online at http://www.itl.nist. gov/fipspubs/.
-
(2001)
FIPS-197: Advanced Encryption Standard
-
-
-
14
-
-
33745679179
-
Practical second-order DPA attacks for masked smart card implementations of block ciphers
-
David Pointcheval, editor, Topics in Cryptology - CT-RSA 2006, The Cryptographers' Track at the RSA Conference 2006, San Jose, CA, USA, February 13-17, 2006, Proceedings, Springer
-
Elisabeth Oswald, Stefan Mangard, Christoph Herbst, and Stefan Tillich. Practical Second-Order DPA Attacks for Masked Smart Card Implementations of Block Ciphers. In David Pointcheval, editor, Topics in Cryptology - CT-RSA 2006, The Cryptographers' Track at the RSA Conference 2006, San Jose, CA, USA, February 13-17, 2006, Proceedings, volume 3860 of Lecture Notes in Computer Science, pages 192-207. Springer, 2006.
-
(2006)
Lecture Notes in Computer Science
, vol.3860
, pp. 192-207
-
-
Oswald, E.1
Mangard, S.2
Herbst, C.3
Tillich, S.4
-
15
-
-
26444465110
-
A side-channel analysis resistant description of the AES S-box
-
Henri Gilbert and Helena Handschuh, editors, Fast Software Encryption, 12th International Workshop, FSE 2005, Paris, France, February 21-23, 2005, Proceedings, Springer
-
Elisabeth Oswald, Stefan Mangard, Norbert Pramstaller, and Vincent Rijmen. A Side-Channel Analysis Resistant Description of the AES S-box. In Henri Gilbert and Helena Handschuh, editors, Fast Software Encryption, 12th International Workshop, FSE 2005, Paris, France, February 21-23, 2005, Proceedings, volume 3557 of Lecture Notes in Computer Science, pages 413-423. Springer, 2005.
-
(2005)
Lecture Notes in Computer Science
, vol.3557
, pp. 413-423
-
-
Oswald, E.1
Mangard, S.2
Pramstaller, N.3
Rijmen, V.4
-
16
-
-
27244451515
-
Masked dual-rail pre-charge logic: DPA-resistance without routing constraints
-
Josyula R. Rao and Berk Sunar, editors, Cryptographic Hardware and Embedded Systems - CHES 2005, 7th International Workshop, Edinburgh, Scotland, August 29 - September 1, 2005, Proceedings, Springer
-
Thomas Popp and Stefan Mangard. Masked Dual-Rail Pre-Charge Logic: DPA-Resistance without Routing Constraints. In Josyula R. Rao and Berk Sunar, editors, Cryptographic Hardware and Embedded Systems - CHES 2005, 7th International Workshop, Edinburgh, Scotland, August 29 - September 1, 2005, Proceedings, volume 3659 of Lecture Notes in Computer Science, pages 172-186. Springer, 2005.
-
(2005)
Lecture Notes in Computer Science
, vol.3659
, pp. 172-186
-
-
Popp, T.1
Mangard, S.2
-
17
-
-
84946832086
-
A compact rijndael hardware architecture with S-box optimization
-
Colin Boyd, editor, Advances in Cryptology - ASIACRYPT 2001, 7th International Conference on the Theory and Application of Cryptology and Information Security, Gold Coast, Australia, December 9-13, 2001, Proceedings, Springer
-
Akashi Satoh, Sumio Morioka, Kohji Takano, and Seiji Munetoh. A Compact Rijndael Hardware Architecture with S-Box Optimization. In Colin Boyd, editor, Advances in Cryptology - ASIACRYPT 2001, 7th International Conference on the Theory and Application of Cryptology and Information Security, Gold Coast, Australia, December 9-13, 2001, Proceedings, volume 2248 of Lecture Notes in Computer Science, pages 239-254. Springer, 2001.
-
(2001)
Lecture Notes in Computer Science
, vol.2248
, pp. 239-254
-
-
Satoh, A.1
Morioka, S.2
Takano, K.3
Munetoh, S.4
-
18
-
-
33745652931
-
Higher order masking of the AES
-
David Pointcheval, editor, Topics in Cryptology - CT-RSA 2006, The Cryptographers' Track at the RSA Conference 2006, San Jose, CA, USA, February 13-17, 2006, Proceedings, Springer
-
Kai Schramm and Christof Paar. Higher Order Masking of the AES. In David Pointcheval, editor, Topics in Cryptology - CT-RSA 2006, The Cryptographers' Track at the RSA Conference 2006, San Jose, CA, USA, February 13-17, 2006, Proceedings, volume 3860 of Lecture Notes in Computer Science, pages 208-225. Springer, 2006.
-
(2006)
Lecture Notes in Computer Science
, vol.3860
, pp. 208-225
-
-
Schramm, K.1
Paar, C.2
-
20
-
-
27244445509
-
DPA leakage models for CMOS logic circuits
-
Josyula R. Rao and Berk Sunar, editors, Cryptographic Hardware and Embedded Systems - CHES 2005, 7th International Workshop, Edinburgh, UK, August 29 - September 1, 2005, Proceedings, Springer
-
Daisuke Suzuki, Minoru Saeki, and Tetsuya Ichikawa. DPA Leakage Models for CMOS Logic Circuits. In Josyula R. Rao and Berk Sunar, editors, Cryptographic Hardware and Embedded Systems - CHES 2005, 7th International Workshop, Edinburgh, UK, August 29 - September 1, 2005, Proceedings, volume 3659 of Lecture Notes in Computer Science, pages 366-382. Springer, 2005.
-
(2005)
Lecture Notes in Computer Science
, vol.3659
, pp. 366-382
-
-
Suzuki, D.1
Saeki, M.2
Ichikawa, T.3
-
21
-
-
24144458916
-
Small size, low power, side channel-immune AES coprocessor: Design and synthesis results
-
Hans Dobbertin, Vincent Rijmen, and Aleksandra Sowa, editors, Advanced Encryption Standard - AES, 4th International Conference, AES 2004, Bonn, Germany, May 10-12, 2004, Revised Selected and Invited Papers, Springer
-
Elena Trichina, Tymur Korkishko, and Kyung-Hee Lee. Small Size, Low Power, Side Channel-Immune AES Coprocessor: Design and Synthesis Results. In Hans Dobbertin, Vincent Rijmen, and Aleksandra Sowa, editors, Advanced Encryption Standard - AES, 4th International Conference, AES 2004, Bonn, Germany, May 10-12, 2004, Revised Selected and Invited Papers, volume 3373 of Lecture Notes in Computer Science, pages 113-127. Springer, 2005.
-
(2005)
Lecture Notes in Computer Science
, vol.3373
, pp. 113-127
-
-
Trichina, E.1
Korkishko, T.2
Lee, K.-H.3
-
22
-
-
35248890508
-
Simplified adaptive multiplicative masking for AES
-
Burton S. Kaliski Jr., Çetin Kaya Koç, and Christof Paar, editors, Cryptographic Hardware and Embedded Systems - CHES 2002, 4th International Workshop, Redwood Shores, CA, USA, August 13-15, 2002, Revised Papers, Springer
-
Elena Trichina, Domenico De Seta, and Lucia Germani. Simplified Adaptive Multiplicative Masking for AES. In Burton S. Kaliski Jr., Çetin Kaya Koç, and Christof Paar, editors, Cryptographic Hardware and Embedded Systems - CHES 2002, 4th International Workshop, Redwood Shores, CA, USA, August 13-15, 2002, Revised Papers, volume 2535 of Lecture Notes in Computer Science, pages 187-197. Springer, 2003.
-
(2003)
Lecture Notes in Computer Science
, vol.2535
, pp. 187-197
-
-
Trichina, E.1
De Seta, D.2
Germani, L.3
-
23
-
-
35048870686
-
Towards efficient second-order power analysis
-
Marc Joye and Jean-Jacques Quisquater, editors, Cryptographic Hardware and Embedded Systems - CHES 2004, 6th International Workshop, Cambridge, MA, USA, August 11-13, 2004, Proceedings, Springer
-
Jason Waddle and David Wagner. Towards Efficient Second-Order Power Analysis. In Marc Joye and Jean-Jacques Quisquater, editors, Cryptographic Hardware and Embedded Systems - CHES 2004, 6th International Workshop, Cambridge, MA, USA, August 11-13, 2004, Proceedings, volume 3156 of Lecture Notes in Computer Science, pages 1-15. Springer, 2004.
-
(2004)
Lecture Notes in Computer Science
, vol.3156
, pp. 1-15
-
-
Waddle, J.1
Wagner, D.2
|