-
1
-
-
84939573910
-
Differential power analysis
-
Crypto'99, Springer-Verlag
-
P. Kocher, J. Jaffe, and B. Jun, "Differential power analysis," Crypto'99, LNCS 1666, pp.388-397, Springer-Verlag, 1999.
-
(1666)
LNCS
, pp. 388-397
-
-
Kocher, P.1
Jaffe, J.2
Jun, B.3
-
2
-
-
84880293917
-
Resistance against differential power analysis for elliptic curve cryptosystems
-
CHES'99, Springer-Verlag
-
J.-S. Coron, "Resistance against differential power analysis for elliptic curve cryptosystems," CHES'99, LNCS 1717, pp.292-302, Springer-Verlag, 1999.
-
(1717)
LNCS
, pp. 292-302
-
-
Coron, J.-S.1
-
3
-
-
84943615552
-
An implementation of DES and AES, secure against some attacks
-
CHES, Springer-Verlag
-
M. Akkar and C. Giraud, "An implementation of DES and AES, secure against some attacks," CHES 2001, LNCS 2162, pp.309-318, Springer-Verlag, 2001.
-
(2001)
LNCS
, vol.2162
, pp. 309-318
-
-
Akkar, M.1
Giraud, C.2
-
4
-
-
24144437895
-
Combinational logic design for AES subbyte transformation on masked data
-
E. Trichina, "Combinational logic design for AES subbyte transformation on masked data," Cryptology ePrint Archive, 2003/236, 2003.
-
(2003)
Cryptology ePrint Archive
, vol.2003 236
-
-
Trichina, E.1
-
5
-
-
3042604811
-
A logic level design methodology for a secure DPA resistant ASIC or FPGA implementation
-
K. Tiri and I. Verbauwhede, "A logic level design methodology for a secure DPA resistant ASIC or FPGA implementation," Proc. Design Automation and Test in Europe Conference, pp.246-251, 2004.
-
(2004)
Proc. Design Automation and Test in Europe Conference
, pp. 246-251
-
-
Tiri, K.1
Verbauwhede, I.2
-
6
-
-
85027165359
-
An attack on cryptographic hardware design with masking method
-
ISEC2004-57, 2004
-
T. Ichikawa, D. Suzuki, and M. Saeki, "An attack on cryptographic hardware design with masking method," IEICE Technical Report, ISEC2004-57, 2004.
-
IEICE Technical Report
-
-
Ichikawa, T.1
Suzuki, D.2
Saeki, M.3
-
7
-
-
24144459808
-
Side-channel leakage of masked CMOS gates
-
CT-RSA, Springer-Verlag
-
S. Mangard, T. Popp, and B.M. Gammel, "Side-channel leakage of masked CMOS gates," CT-RSA 2005, LNCS 3376, pp.361-365, Springer-Verlag, 2005.
-
(2005)
LNCS
, vol.3376
, pp. 361-365
-
-
Mangard, S.1
Popp, T.2
Gammel, B.M.3
-
8
-
-
27244451021
-
Successfully attacking mased AES hardware implementation
-
CHES, Springer-Verlag
-
S. Mangard, N. Pramstaller, and E. Oswald, "Successfully attacking mased AES hardware implementation," CHES 2005, LNCS 3659, pp.157-171, Springer-Verlag, 2005.
-
(2005)
LNCS
, vol.3659
, pp. 157-171
-
-
Mangard, S.1
Pramstaller, N.2
Oswald, E.3
-
9
-
-
27244445509
-
DPA leakage models for CMOS logic circuits
-
CHES, Springer-Verlag
-
D. Suzuki, M. Saeki, and T. Ichikawa, "DPA leakage models for CMOS logic circuits," CHES 2005, LNCS 3659, pp.366-382, Springer-Verlag, 2005.
-
(2005)
LNCS
, vol.3659
, pp. 366-382
-
-
Suzuki, D.1
Saeki, M.2
Ichikawa, T.3
-
10
-
-
24144491908
-
Provably secure masking of AES
-
Cryptology ePrint Archive, Report 2004/101
-
J. Blömer, J.G. Merchan, and V. Krummel, "Provably secure masking of AES," Cryptology ePrint Archive, Report 2004/101, 2004.
-
(2004)
-
-
Blömer, J.1
Merchan, J.G.2
Krummel, V.3
-
11
-
-
68549099555
-
Using second-order power analysis to attack DPA resistant software
-
CHES, Springer-Verlag, 2000
-
T.S. Messerges, "Using second-order power analysis to attack DPA resistant software," CHES 2000, LNCS 1965, pp.238-251, Springer-Verlag, 2000.
-
(1965)
LNCS
, pp. 238-251
-
-
Messerges, T.S.1
-
12
-
-
35048870686
-
Towards efficient second-order power analysis
-
CHES, Springer-Verlag
-
J. Waddle and D. Wagner, "Towards efficient second-order power analysis," CHES 2004, LNCS 3156, pp.1-15, Springer-Verlag, 2004.
-
(2004)
LNCS
, vol.3156
, pp. 1-15
-
-
Waddle, J.1
Wagner, D.2
-
13
-
-
0031336623
-
TITAC-2: A 32-bit asynchronous microprocessor based on scalable-delay-insensitive model
-
A. Takamura, M. Kuwako, M. Imai, T. Fujii, M. Ozawa, I. Fukasaku, Y. Ueno, and T. Nanya, "TITAC-2: A 32-bit asynchronous microprocessor based on scalable-delay-insensitive model," Proc. 1997 IEEE International Conference (ICCD'97), pp.288-294, 1997.
-
(1997)
Proc. 1997 IEEE International Conference (ICCD'97)
, pp. 288-294
-
-
Takamura, A.1
Kuwako, M.2
Imai, M.3
Fujii, T.4
Ozawa, M.5
Fukasaku, I.6
Ueno, Y.7
Nanya, T.8
-
14
-
-
0026853681
-
Low power digital CMOS design
-
A.P. Chandrakasan, S. Sheng, and R.W. Brodersen, "Low power digital CMOS design," IEEE J. Solid State Circuits, vol.27, no.4, pp.473-484, 1992.
-
(1992)
IEEE J. Solid State Circuits
, vol.27
, Issue.4
, pp. 473-484
-
-
Chandrakasan, A.P.1
Sheng, S.2
Brodersen, R.W.3
-
16
-
-
85027189064
-
Development of a side channel attack platform for evaluation
-
in Japanese
-
T. Ichikawa, M. Yoshida, D. Suzuki, and M. Saeki, "Development of a side channel attack platform for evaluation," Proc. 2004 IEICE Society Conference, IA-7-2, 2004 (in Japanese).
-
Proc. 2004 IEICE Society Conference
, vol.IA-7-2
, pp. 2004
-
-
Ichikawa, T.1
Yoshida, M.2
Suzuki, D.3
Saeki, M.4
|