-
1
-
-
35048818034
-
Correlation power analysis with a leakage model
-
Marc Joye and Jean-Jacques Quisquater, editors, CHES. Springer
-
Eric Brier, Christophe Clavier, and Francis Olivier. Correlation power analysis with a leakage model. In Marc Joye and Jean-Jacques Quisquater, editors, CHES, volume 3156 of Lecture Notes in Computer Science, pages 16-29. Springer, 2004.
-
(2004)
Lecture Notes in Computer Science
, vol.3156
, pp. 16-29
-
-
Brier, E.1
Clavier, C.2
Olivier, F.3
-
2
-
-
35248899532
-
Template attacks
-
Burton S. Kaliski Jr., Çetin Kaya Koç, and Christof Paar, editors, 4th International Workshop on Cryptographic Hardware and Embedded Systems (CHES). Springer
-
Suresh Chari, Josyula R. Rao, and Pankaj Rohatgi. Template attacks. In Burton S. Kaliski Jr., Çetin Kaya Koç, and Christof Paar, editors, 4th International Workshop on Cryptographic Hardware and Embedded Systems (CHES), volume 2523 of Lecture Notes in Computer Science, 13-28. Springer, 2002.
-
(2002)
Lecture Notes in Computer Science
, vol.2523
, pp. 13-28
-
-
Chari, S.1
Rao, J.R.2
Rohatgi, P.3
-
6
-
-
84943632039
-
Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems
-
Neal Koblitz, editor, 16th Annual International Cryptology Conference (CRYPTO). Springer
-
Paul C. Kocher. Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems. In Neal Koblitz, editor, 16th Annual International Cryptology Conference (CRYPTO), volume 1109 of Lecture Notes in Computer Science, 104-113. Springer, 1996.
-
(1996)
Lecture Notes in Computer Science
, vol.1109
, pp. 104-113
-
-
Kocher, P.C.1
-
7
-
-
84941162644
-
-
Microship. PIC16F877 datasheet, url: wwl.microchip.com/downloads/en/ Device-Doc/30292c.pdf, 2001.
-
(2001)
PIC16F877 Datasheet
-
-
-
8
-
-
23944455328
-
Practical template attacks
-
Chae Hoon Lim and Moti Yung, editors, 5th International Workshop on Information Security Applications (WISA). Springer
-
Christian Rechberger and Elisabeth Oswald. Practical template attacks. In Chae Hoon Lim and Moti Yung, editors, 5th International Workshop on Information Security Applications (WISA), volume 3325 of Lecture Notes in Computer Science, 440-456. Springer, 2004.
-
(2004)
Lecture Notes in Computer Science
, vol.3325
, pp. 440-456
-
-
Rechberger, C.1
Oswald, E.2
-
9
-
-
24744465637
-
Power analysis of an FPGA implementation of Rijndael: Is pipelining a DPA countermeasure?
-
Marc Joye and Jean-Jacques Quisquater, editors, 6th International Workshop Cryptographic Hardware and Embedded Systems (CHES). Springer
-
F.-X. Standaert, S.B. Ors, and B. Preneel. Power analysis of an FPGA implementation of Rijndael: Is pipelining a DPA countermeasure? In Marc Joye and Jean-Jacques Quisquater, editors, 6th International Workshop Cryptographic Hardware and Embedded Systems (CHES), volume 3156 of Lecture Notes in Computer Science, 30-44. Springer, 2004.
-
(2004)
Lecture Notes in Computer Science
, vol.3156
, pp. 30-44
-
-
Standaert, F.-X.1
Ors, S.B.2
Preneel, B.3
-
10
-
-
33748999531
-
Updates on the security of FPGAs against power analysis attacks
-
LNCS 3985
-
F.-X. Standaert, E. Peeters, F. Mace, and J.-J. Quisquater. Updates on the security of FPGAs against power analysis attacks. In proceedings of ARC 2006, LNCS 3985, pp. 335-346, 2006.
-
(2006)
Proceedings of ARC 2006
, pp. 335-346
-
-
Standaert, F.-X.1
Peeters, E.2
Mace, F.3
Quisquater, J.-J.4
-
11
-
-
35248847435
-
Efficient implementation of Rijndael encryption in reconfigurable hardware: Improvements and design tradeoffs
-
Colin D. Walter, Çetin Kaya Koç, and Christof Paar, editors, 5th International Workshop Cryptographic Hardware and Embedded Systems (CHES). Springer
-
F.-X. Standaert, G. Rouvroy, J.-J. Quisquater, and J.-D. Legat. Efficient implementation of Rijndael encryption in reconfigurable hardware: Improvements and design tradeoffs. In Colin D. Walter, Çetin Kaya Koç, and Christof Paar, editors, 5th International Workshop Cryptographic Hardware and Embedded Systems (CHES), volume 2779 of Lecture Notes in Computer Science, 334-350. Springer, 2003.
-
(2003)
Lecture Notes in Computer Science
, vol.2779
, pp. 334-350
-
-
Standaert, F.-X.1
Rouvroy, G.2
Quisquater, J.-J.3
Legat, J.-D.4
|