-
2
-
-
85025704284
-
Linear cryptanalysis method for DES cipher
-
Aug
-
M. Matsui, "Linear cryptanalysis method for DES cipher," in Proc. Advances in Cryptology (CRYPTO '94), pp. 386-397, Aug. 1994.
-
(1994)
Proc. Advances in Cryptology (CRYPTO '94)
, pp. 386-397
-
-
Matsui, M.1
-
3
-
-
84943632039
-
Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems
-
Aug
-
P. Kocher, "Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems," in Proc. Advances in Cryptology (CRYPTO '96), pp. 104-113, Aug. 1996.
-
(1996)
Proc. Advances in Cryptology (CRYPTO '96)
, pp. 104-113
-
-
Kocher, P.1
-
4
-
-
84939573910
-
Differential power analysis
-
Aug
-
P. Kocher, J. Jaffe, and B. Jun, "Differential power analysis," in Proc. Advances in Cryptology (CRYPTO '99), pp. 388-397, Aug. 1999.
-
(1999)
Proc. Advances in Cryptology (CRYPTO '99)
, pp. 388-397
-
-
Kocher, P.1
Jaffe, J.2
Jun, B.3
-
5
-
-
0036566408
-
Examining smartcard security under the threat of power analysis attacks
-
May
-
T. Messerges, E. A. Dabbish, and R. H. Sloan, "Examining smartcard security under the threat of power analysis attacks," IEEE Trans. Computers, vol. 51, pp. 541-552, May 2002.
-
(2002)
IEEE Trans. Computers
, vol.51
, pp. 541-552
-
-
Messerges, T.1
Dabbish, E.A.2
Sloan, R.H.3
-
6
-
-
0022218742
-
Electromagnetic radiation from video display units: An eavesdropping risk
-
W. van Eck, "Electromagnetic radiation from video display units: An eavesdropping risk," Computers and Security, vol. 4, pp. 269-288, 1985.
-
(1985)
Computers and Security
, vol.4
, pp. 269-288
-
-
van Eck, W.1
-
7
-
-
84957355967
-
On the importance of checking cryptographic protocols for faults
-
May
-
D. Boneh, R. A. Demillo, and R. J. Lipton, "On the importance of checking cryptographic protocols for faults," in Proc. Advances in Cryptology (Eurocrypt '97), pp. 37-51, May 1997.
-
(1997)
Proc. Advances in Cryptology (Eurocrypt '97)
, pp. 37-51
-
-
Boneh, D.1
Demillo, R.A.2
Lipton, R.J.3
-
8
-
-
0033705991
-
Side channel cryptanalysis of product ciphers
-
J. Kelsey, B. Schneier, D. Wagner, and C. Hall, "Side channel cryptanalysis of product ciphers," J. Computer Security, vol. 8, no. 2, pp. 141-158, 2000.
-
(2000)
J. Computer Security
, vol.8
, Issue.2
, pp. 141-158
-
-
Kelsey, J.1
Schneier, B.2
Wagner, D.3
Hall, C.4
-
9
-
-
0038714059
-
A novel architecture for power maskable arithmetic units
-
Apr
-
L. Benini, A. Macii, E. Macii, E. Omerbegovic, M. Poncino, and F. Pro, "A novel architecture for power maskable arithmetic units," in Proc. Great Lakes Symp. VLSI, pp. 136-140, Apr. 2003.
-
(2003)
Proc. Great Lakes Symp. VLSI
, pp. 136-140
-
-
Benini, L.1
Macii, A.2
Macii, E.3
Omerbegovic, E.4
Poncino, M.5
Pro, F.6
-
10
-
-
84893793732
-
Masking the energy behavior of DES encryption
-
Mar
-
H. Saputra, N. Vijaykrishnan, M. Kandemir, M. J. Irwin, R. Brooks, S. Kim, and W. Zhang, "Masking the energy behavior of DES encryption," in Proc. Design Automation & Test in Europe Conf., pp. 10084-10089, Mar. 2003.
-
(2003)
Proc. Design Automation & Test in Europe Conf
, pp. 10084-10089
-
-
Saputra, H.1
Vijaykrishnan, N.2
Kandemir, M.3
Irwin, M.J.4
Brooks, R.5
Kim, S.6
Zhang, W.7
-
11
-
-
35248825993
-
Securing encryption algorithms against DPA at the logic level: Next generation smart card technology
-
K. Tiri and I. Verbauwhede, "Securing encryption algorithms against DPA at the logic level: Next generation smart card technology," in Proc. Cryptographic Hardware and Embedded Systems, pp. 125-136, 2003.
-
(2003)
Proc. Cryptographic Hardware and Embedded Systems
, pp. 125-136
-
-
Tiri, K.1
Verbauwhede, I.2
-
12
-
-
24044554454
-
Statistics and information leakage
-
Aug
-
J. S. Coron, D. Naccache, and P. Kocher, "Statistics and information leakage," ACM Trans. Embedded Comput. Systems, vol. 3, pp. 492-508, Aug. 2004.
-
(2004)
ACM Trans. Embedded Comput. Systems
, vol.3
, pp. 492-508
-
-
Coron, J.S.1
Naccache, D.2
Kocher, P.3
-
14
-
-
34047158316
-
Security bugs exposed: A system-atic approach to uncovering software vulnerabilities
-
Mar
-
J. Whittaker and H. H. Thompson, "Security bugs exposed: A system-atic approach to uncovering software vulnerabilities," Software Testing and Quality Engineering, pp. 28-32, Mar. 2003.
-
(2003)
Software Testing and Quality Engineering
, pp. 28-32
-
-
Whittaker, J.1
Thompson, H.H.2
-
15
-
-
85084160792
-
Understanding data lifetime via whole system simulation
-
Aug
-
J. Chow, B. Pfaff, T. Garfinkel, K. Christopher, and M. Rosenblum, "Understanding data lifetime via whole system simulation," in Proc. USENIX Security Symp., pp. 321-336, Aug. 2004.
-
(2004)
Proc. USENIX Security Symp
, pp. 321-336
-
-
Chow, J.1
Pfaff, B.2
Garfinkel, T.3
Christopher, K.4
Rosenblum, M.5
-
17
-
-
84937545785
-
The quest for efficient Boolean satisfiability solvers
-
July
-
L. Zhang and S. Malik, "The quest for efficient Boolean satisfiability solvers," in Proc. Int. Conf. Computer-Aided Verif., pp. 17-36, July 2002.
-
(2002)
Proc. Int. Conf. Computer-Aided Verif
, pp. 17-36
-
-
Zhang, L.1
Malik, S.2
-
19
-
-
26144437464
-
Cryptanalysis of the data encryption standard by the method of formal coding
-
May
-
I. Schaumuller-Bichl, "Cryptanalysis of the data encryption standard by the method of formal coding," in Proc. Advances in Cryptology (Eurocrypt '82), pp. 235-255, May 1982.
-
(1982)
Proc. Advances in Cryptology (Eurocrypt '82)
, pp. 235-255
-
-
Schaumuller-Bichl, I.1
-
20
-
-
0034140491
-
Logical cryptanalysis as a SAT problem
-
Feb
-
F. Massacci and L. Marraro, "Logical cryptanalysis as a SAT problem," J. Automated Reasoning, vol. 24, pp. 165-203, Feb. 2000.
-
(2000)
J. Automated Reasoning
, vol.24
, pp. 165-203
-
-
Massacci, F.1
Marraro, L.2
-
27
-
-
3042738504
-
Why secure applications are difficult to write
-
Mar
-
J. Whittaker, "Why secure applications are difficult to write," IEEE Security and Privacy, vol. 1, pp. 81-83, Mar. 2003.
-
(2003)
IEEE Security and Privacy
, vol.1
, pp. 81-83
-
-
Whittaker, J.1
-
28
-
-
33645492588
-
-
National Institute of Standards and Technology
-
National Institute of Standards and Technology, Federal Information Processing Standard 46-3. http://csrc.nist.gov/publications/fips/fips46-3/ fips46-3.pdf, 1999.
-
(1999)
Federal Information Processing Standard 46-3
-
-
|