-
2
-
-
84943632039
-
Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, Other Systems
-
P. Kocher "Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, Other Systems" CRYPTO, pp. 104-113, 1996.
-
(1996)
CRYPTO
, pp. 104-113
-
-
Kocher, P.1
-
3
-
-
84939573910
-
Differential Power Analysis
-
P. Kocher, J. Jaffe, B. Jun "Differential Power Analysis" CRYPTO, pp. 388-397, 1999.
-
(1999)
CRYPTO
, pp. 388-397
-
-
Kocher, P.1
Jaffe, J.2
Jun, B.3
-
4
-
-
35248815162
-
Secure Elliptic Curve Implementations: An Analysis of Resistance to Power-Attacks in a DSP Processor
-
C. H. Gebotys, R. J. Gebotys "Secure Elliptic Curve Implementations: An Analysis of Resistance to Power-Attacks in a DSP Processor" CHES, pp. 114-128, 2002.
-
(2002)
CHES
, pp. 114-128
-
-
Gebotys, C.H.1
Gebotys, R.J.2
-
5
-
-
35248827733
-
-
FPL, pp
-
F.-X. Standaert, L. van Oldeneel tot Oldenzeel, D. Samyde, J.-J. Quisquater "Differential Power Analysis of FPGAs: How Practical is the Attack?" FPL, pp. 701-709, 2003.
-
(2003)
Differential Power Analysis of FPGAs: How Practical is the Attack
, pp. 701-709
-
-
Standaert, F.-X.1
van Oldeneel tot Oldenzeel, L.2
Samyde, D.3
Quisquater, J.-J.4
-
6
-
-
3042545023
-
-
S. B. Ors, F. Gurkaynak, E. Oswald, B. Preneel Power-Analysis Attack on an ASIC AES implementation ITCC, 2004.
-
S. B. Ors, F. Gurkaynak, E. Oswald, B. Preneel "Power-Analysis Attack on an ASIC AES implementation" ITCC, 2004.
-
-
-
-
7
-
-
35248855964
-
Cryptanalysis of DES Implemented on Computers with Cache
-
Y. Tsunoo, T. Saito, T. Suzaki, M. Shigeri, H. Miyauchi "Cryptanalysis of DES Implemented on Computers with Cache" CHES, pp. 62-76, 2003.
-
(2003)
CHES
, pp. 62-76
-
-
Tsunoo, Y.1
Saito, T.2
Suzaki, T.3
Shigeri, M.4
Miyauchi, H.5
-
8
-
-
84954462346
-
A practical implementation of the timing attack
-
J.F. Dhem, F. Koeune, P.-A. Leroux, P. Mestré, J.-J. Quisquater, J.-L. Willems "A practical implementation of the timing attack" CARDIS, pp. 167-182, 1998.
-
(1998)
CARDIS
, pp. 167-182
-
-
Dhem, J.F.1
Koeune, F.2
Leroux, P.-A.3
Mestré, P.4
Quisquater, J.-J.5
Willems, J.-L.6
-
9
-
-
35248862449
-
Electromagnetic Analysis: Concrete Results
-
K. Gandolfi, C. Mourtel, F. Olivier "Electromagnetic Analysis: Concrete Results" CHES, pp. 251-261, 2001.
-
(2001)
CHES
, pp. 251-261
-
-
Gandolfi, K.1
Mourtel, C.2
Olivier, F.3
-
11
-
-
4444331720
-
-
DAC, pp
-
P. Kocher, R. Lee, G. McGraw, A. Raghunathan, S. Ravi "Security as a New Dimension in Embedded System Design" DAC, pp.735-760, 2004.
-
(2004)
Security as a New Dimension in Embedded System Design
, pp. 735-760
-
-
Kocher, P.1
Lee, R.2
McGraw, G.3
Raghunathan, A.4
Ravi, S.5
-
13
-
-
34047117968
-
Cache missing for fun, profit
-
〈online〈
-
C. Percival "Cache missing for fun, profit" BSDCan, http://www.daemonology.net/papers/htt.pdf 〈online〈, 2005.
-
(2005)
BSDCan
-
-
Percival, C.1
-
15
-
-
0029210672
-
The Intel 80×86 Processor Architecture: Pitfalls for Secure Systems
-
O. Sibert, P. A. Porras, R. Lindell "The Intel 80×86 Processor Architecture: Pitfalls for Secure Systems" IEEE Symposium on Security, Privacy, pp. 211, 1995.
-
(1995)
IEEE Symposium on Security, Privacy
, pp. 211
-
-
Sibert, O.1
Porras, P.A.2
Lindell, R.3
-
18
-
-
34547322041
-
-
E. Brickell, G. Graunke, M. Neve, J.-P. Seifert Software mitigations to hedge AES against cache-based software side channel vulnerabilities IACR ePrint, rep. 2006/052, 2006.
-
E. Brickell, G. Graunke, M. Neve, J.-P. Seifert "Software mitigations to hedge AES against cache-based software side channel vulnerabilities" IACR ePrint, rep. 2006/052, 2006.
-
-
-
-
19
-
-
34547246932
-
-
OpenSSL Project, 〈online〉
-
OpenSSL Project, http://www.openssl.org/ 〈online〉.
-
-
-
-
20
-
-
84880293917
-
Resistance against Differential Power Analysis for Elliptic Curve Crypto systems
-
J.-S. Coron "Resistance against Differential Power Analysis for Elliptic Curve Crypto systems" CHES, pp. 292-302, 1999.
-
(1999)
CHES
, pp. 292-302
-
-
Coron, J.-S.1
-
21
-
-
33645692468
-
AES-Based Cryptographic, Biometrie Security Coprocessor IC in 0.18-μm CMOS Resistant to Side-Channel Power Analysis Attacks
-
K. Tiri, D. Hwang, A. Hodjat, B.-C. Lai, S. Yang, P. Schaumont, I. Verbauwhede "AES-Based Cryptographic, Biometrie Security Coprocessor IC in 0.18-μm CMOS Resistant to Side-Channel Power Analysis Attacks" VLSI SYMPOSIUM, pp. 216-219, 2005.
-
(2005)
VLSI SYMPOSIUM
, pp. 216-219
-
-
Tiri, K.1
Hwang, D.2
Hodjat, A.3
Lai, B.-C.4
Yang, S.5
Schaumont, P.6
Verbauwhede, I.7
-
22
-
-
0036566408
-
Examining smart-card security under the threat of power analysis attacks
-
T. Messerges, E. Dabbish, R. Sloan "Examining smart-card security under the threat of power analysis attacks" IEEE TC, Vol. 51, Issue: 5, pp. 541-552, 2002.
-
(2002)
IEEE TC
, vol.51
, Issue.5
, pp. 541-552
-
-
Messerges, T.1
Dabbish, E.2
Sloan, R.3
-
23
-
-
68549099548
-
Differential Power Analysis in the Presence of Hardware Countermeasures
-
C. Clavier, J. Coron, N. Dabbous "Differential Power Analysis in the Presence of Hardware Countermeasures" CHES, pp. 252-263, 2000.
-
(2000)
CHES
, pp. 252-263
-
-
Clavier, C.1
Coron, J.2
Dabbous, N.3
-
24
-
-
68549107606
-
Protecting Smart Cards from Passive Power Analysis with Detached Power Supplies
-
A. Shamir "Protecting Smart Cards from Passive Power Analysis with Detached Power Supplies" CHES, pp. 71-77, 2000.
-
(2000)
CHES
, pp. 71-77
-
-
Shamir, A.1
-
25
-
-
17644372417
-
Towards an AES Crypto-chip Resis-tant to Differential Power Analysis
-
N. Pramstaller, F. Gürkaynak, S. Häne, H. Kaeslin, N. Felber, W. Fichtner "Towards an AES Crypto-chip Resis-tant to Differential Power Analysis" ESSCIRC, pp. 307-310, 2004.
-
(2004)
ESSCIRC
, pp. 307-310
-
-
Pramstaller, N.1
Gürkaynak, F.2
Häne, S.3
Kaeslin, H.4
Felber, N.5
Fichtner, W.6
-
26
-
-
27244431906
-
Random Switching Logic: A Countermeasure against DPA based on Transition Probability
-
D. Suzuki, M. Saeki, T. Ichikawa "Random Switching Logic: A Countermeasure against DPA based on Transition Probability," IACR ePrint, rep. 2004/346, 2004.
-
(2004)
IACR ePrint, rep
, pp. 2004-2346
-
-
Suzuki, D.1
Saeki, M.2
Ichikawa, T.3
-
27
-
-
27244451515
-
Masked Dual-Rail Pre-charge Logic: DPA Resistance without the Routing Constraints
-
T. Popp, S. Mangard "Masked Dual-Rail Pre-charge Logic: DPA Resistance without the Routing Constraints," CHES, pp. 172-186, 2005.
-
(2005)
CHES
, pp. 172-186
-
-
Popp, T.1
Mangard, S.2
-
28
-
-
84893732023
-
A Dynamic, Differential CMOS Logic with Signal Independent Power Consumption to Withstand Differential Power Analysis on Smart Cards
-
K. Tiri, M. Akmal, I. Verbauwhede "A Dynamic, Differential CMOS Logic with Signal Independent Power Consumption to Withstand Differential Power Analysis on Smart Cards" ESSCIRC, pp. 403-406, 2002.
-
(2002)
ESSCIRC
, pp. 403-406
-
-
Tiri, K.1
Akmal, M.2
Verbauwhede, I.3
-
29
-
-
0041325255
-
-
S. Moore, R. Anderson, R. Mullins, G. Taylor Balanced selfchecking asynchronous logic for smart card applications, J. Microprocess. Microsyst., 27.9, pp. 421-430, 2003.
-
S. Moore, R. Anderson, R. Mullins, G. Taylor "Balanced selfchecking asynchronous logic for smart card applications," J. Microprocess. Microsyst., vol. 27.9, pp. 421-430, 2003.
-
-
-
-
30
-
-
33744734677
-
-
K. Tiri, I. Verbauwhede A digital design flow for secure integrated circuits IEEE TCAD, 25.7, pp. 1197-1208, 2006.
-
K. Tiri, I. Verbauwhede "A digital design flow for secure integrated circuits" IEEE TCAD, vol. 25.7, pp. 1197-1208, 2006.
-
-
-
-
32
-
-
33750693916
-
Towards Security Limits in Side-Channel Attacks
-
F.-X. Standaert, E. Peeters, C. Archambeau, J.-J. Quisquater "Towards Security Limits in Side-Channel Attacks" CHES, pp. 30-45, 2006.
-
(2006)
CHES
, pp. 30-45
-
-
Standaert, F.-X.1
Peeters, E.2
Archambeau, C.3
Quisquater, J.-J.4
-
33
-
-
33750723763
-
Automated Design of Cryptographic Devices Resistant to Multiple Side-Channel Attacks
-
K. Kulikowski, A. Smirnov, A. Taubin "Automated Design of Cryptographic Devices Resistant to Multiple Side-Channel Attacks" CHES, pp. 399-413, 2006.
-
(2006)
CHES
, pp. 399-413
-
-
Kulikowski, K.1
Smirnov, A.2
Taubin, A.3
-
34
-
-
34547241618
-
-
ISCAS
-
Aigner M., Popp T., Mangard S., Trifiletti A., Renato M., Olivieri M., Scotti G., "Side Channel Analysis Resistant Design Flow", ISCAS, 2006.
-
(2006)
Side Channel Analysis Resistant Design Flow
-
-
Aigner, M.1
Popp, T.2
Mangard, S.3
Trifiletti, A.4
Renato, M.5
Olivieri, M.6
Scotti, G.7
-
35
-
-
27244444584
-
The "backend duplication" method
-
S. Guilley, Ph. Hoogvorst, Y. Mathieu and R. Pacalet, "The "backend duplication" method", CHES, pp. 383-397, 2005.
-
(2005)
CHES
, pp. 383-397
-
-
Guilley, S.1
Hoogvorst, P.2
Mathieu, Y.3
Pacalet, R.4
-
36
-
-
27244458099
-
Security Evaluation Against Electromagnetic Analysis at Design Time
-
H. Li, A. Markettos, S. Moore "Security Evaluation Against Electromagnetic Analysis at Design Time" CHES, pp. 280-292, 2005.
-
(2005)
CHES
, pp. 280-292
-
-
Li, H.1
Markettos, A.2
Moore, S.3
-
37
-
-
33750700765
-
Pinpointing the Side-Channel Leakage of Masked AES Hardware Implementations
-
S. Mangard, K. Schramm "Pinpointing the Side-Channel Leakage of Masked AES Hardware Implementations" CHES, pp. 76-90, 2006.
-
(2006)
CHES
, pp. 76-90
-
-
Mangard, S.1
Schramm, K.2
-
38
-
-
34247278256
-
Power Attacks on Secure Hardware Based on Early Propagation of Data
-
K. J. Kulikowski, M. G. Karpovsky, A. Taubin "Power Attacks on Secure Hardware Based on Early Propagation of Data" IOLTS, pp. 131-138,2006.
-
(2006)
IOLTS
, pp. 131-138
-
-
Kulikowski, K.J.1
Karpovsky, M.G.2
Taubin, A.3
-
39
-
-
33745679179
-
-
CT-RSA, pp
-
E. Oswald, S. Mangard, C. Herbst, S. Tillich "Practical Second-Order DPA Attacks for Masked Smart Card Implementations of Block Ciphers" CT-RSA, pp. 192-207, 2006.
-
(2006)
Practical Second-Order DPA Attacks for Masked Smart Card Implementations of Block Ciphers
, pp. 192-207
-
-
Oswald, E.1
Mangard, S.2
Herbst, C.3
Tillich, S.4
|