-
1
-
-
34547231019
-
-
The PEAS Team, Available at
-
The PEAS Team. ASIP Meister, 2002. Available at: http://www.eda-meister. org/asipmeister.
-
(2002)
ASIP Meister
-
-
-
2
-
-
84937438279
-
Power analysis, what is now possible
-
London, UK, Springer-Verlag
-
M.-L. Akkar, R. Bevan, P. Dischamp, and D. Moyart. Power analysis, what is now possible... In Asiacrypt '00, pages 489-502, London, UK, 2000. Springer-Verlag.
-
(2000)
Asiacrypt '00
, pp. 489-502
-
-
Akkar, M.-L.1
Bevan, R.2
Dischamp, P.3
Moyart, D.4
-
3
-
-
33646826538
-
On the automatic construction of indistinguishable operations
-
November
-
M. Barbosa and D. Page. On the automatic construction of indistinguishable operations. In Cryptography And Coding, pages 233-247, November 2005.
-
(2005)
Cryptography And Coding
, pp. 233-247
-
-
Barbosa, M.1
Page, D.2
-
4
-
-
85032541897
-
Remote timing attacks are practical
-
August
-
D. Brumley and D. Boneh. Remote timing attacks are practical. In USENIX, August 2003.
-
(2003)
USENIX
-
-
Brumley, D.1
Boneh, D.2
-
5
-
-
84957079591
-
Towards sound approaches to counteract power-analysis attacks
-
S. Chari, C. S. Jutla, J. R. Rao, and P. Rohatgi. Towards sound approaches to counteract power-analysis attacks. In CRYPTO, pages 398-412, 1999.
-
(1999)
CRYPTO
, pp. 398-412
-
-
Chari, S.1
Jutla, C.S.2
Rao, J.R.3
Rohatgi, P.4
-
6
-
-
68549099548
-
Differential power analysis in the presence of hardware countermeasures
-
London, UK
-
C. Clavier, J.-S. Coron, and N. Dabbous. Differential power analysis in the presence of hardware countermeasures. In Ches '00, pages 252-263, London, UK, 2000.
-
(2000)
Ches '00
, pp. 252-263
-
-
Clavier, C.1
Coron, J.-S.2
Dabbous, N.3
-
7
-
-
68549105908
-
On boolean and arithmetic masking against differential power analysis
-
London, UK, Springer-Verlag
-
J.-S. Coron and L. Goubin. On boolean and arithmetic masking against differential power analysis. In Ches '00, pages 231-237, London, UK, 2000. Springer-Verlag.
-
(2000)
Ches '00
, pp. 231-237
-
-
Coron, J.-S.1
Goubin, L.2
-
8
-
-
33746866764
-
-
C. Gebotys. A Table Masking Countermeasure for Low-Energy Secure Embedded Systems. IEEE Trans. on VLSI, 14(7):740-753, 2006.
-
C. Gebotys. A Table Masking Countermeasure for Low-Energy Secure Embedded Systems. IEEE Trans. on VLSI, 14(7):740-753, 2006.
-
-
-
-
9
-
-
35248815162
-
Secure elliptic curve implementations: An analysis of resistance to power-attacks in a dsp processor
-
London, UK, Springer-Verlag
-
C. H. Gebotys and R. J. Gebotys. Secure elliptic curve implementations: An analysis of resistance to power-attacks in a dsp processor. In CHES '02:, pages 114-128, London, UK, 2003. Springer-Verlag.
-
(2003)
CHES '02
, pp. 114-128
-
-
Gebotys, C.H.1
Gebotys, R.J.2
-
10
-
-
84949520149
-
Des and differential power analysis (the "duplication" method)
-
London, UK, Springer-Verlag
-
L. Goubin and J. Patarin. Des and differential power analysis (the "duplication" method). In Ches '99, pages 158-172, London, UK, 1999. Springer-Verlag.
-
(1999)
Ches '99
, pp. 158-172
-
-
Goubin, L.1
Patarin, J.2
-
11
-
-
84948778220
-
Instruction stream mutation for non-deterministic processors
-
Washington, DC, USA
-
J. Irwin, D. Page, and N. P. Smart. Instruction stream mutation for non-deterministic processors. In Asap '02, page 286, Washington, DC, USA, 2002.
-
(2002)
Asap '02
, pp. 286
-
-
Irwin, J.1
Page, D.2
Smart, N.P.3
-
12
-
-
35248892041
-
-
S. Mangard. A Simple Power-Analysis (SPA) Attack on Implementations of the AES Key Expansion. In icisc 2002, 2587, pages 343-358, 2003.
-
S. Mangard. A Simple Power-Analysis (SPA) Attack on Implementations of the AES Key Expansion. In icisc 2002, volume 2587, pages 343-358, 2003.
-
-
-
-
13
-
-
84958757658
-
Non-deterministic processors
-
London, UK, Springer-Verlag
-
D. May, H. L. Muller, and N. P. Smart. Non-deterministic processors. In Acisp '01, pages 115-129, London, UK, 2001. Springer-Verlag.
-
(2001)
Acisp '01
, pp. 115-129
-
-
May, D.1
Muller, H.L.2
Smart, N.P.3
-
14
-
-
84944906595
-
Random register renaming to foil dpa
-
London, UK, Springer-Verlag
-
D. May, H. L. Muller, and N. P. Smart. Random register renaming to foil dpa. In Ches '01, pages 28-38, London, UK, 2001. Springer-Verlag.
-
(2001)
Ches '01
, pp. 28-38
-
-
May, D.1
Muller, H.L.2
Smart, N.P.3
-
15
-
-
0036566408
-
Examining smart-card security under the threat of power analysis attacks
-
T. S. Messerges, E. A. Dabbish, and R. H. Sloan. Examining smart-card security under the threat of power analysis attacks. IEEE Trans. Computers, 51(5):541-552, 2002.
-
(2002)
IEEE Trans. Computers
, vol.51
, Issue.5
, pp. 541-552
-
-
Messerges, T.S.1
Dabbish, E.A.2
Sloan, R.H.3
-
16
-
-
16244378918
-
Current flattening in software and hardware for security applications
-
R. Muresan and C. H. Gebotys. Current flattening in software and hardware for security applications. In CODES+ISSS, pages 218-223, 2004.
-
(2004)
CODES+ISSS
, pp. 218-223
-
-
Muresan, R.1
Gebotys, C.H.2
-
17
-
-
3042545023
-
Power-analysis attack on an asic aes implementation
-
02:546
-
S.B. Ors, E Gurkaynak, E. Oswald, and B. Preneel. Power-analysis attack on an asic aes implementation, itcc, 02:546, 2004.
-
(2004)
itcc
-
-
Ors, S.B.1
Gurkaynak, E.2
Oswald, E.3
Preneel, B.4
-
18
-
-
33745679179
-
Practical Second-Order DPA Attacks for Masked Smart Card Implementations of Block Ciphers
-
Springer
-
E. Oswald, S. Mangard, C. Herbst, and S. Tillich. Practical Second-Order DPA Attacks for Masked Smart Card Implementations of Block Ciphers. In ct-rsa 2006, pages 192-207. Springer, 2006.
-
(2006)
ct-rsa 2006
, pp. 192-207
-
-
Oswald, E.1
Mangard, S.2
Herbst, C.3
Tillich, S.4
-
21
-
-
78650238574
-
Electromagnetic analysis (ema): Measures and counter-measures for smart cards
-
J.-J. Quisquater and D. Samyde. Electromagnetic analysis (ema): Measures and counter-measures for smart cards. In E-smart, pages 200-210, 2001.
-
(2001)
E-smart
, pp. 200-210
-
-
Quisquater, J.-J.1
Samyde, D.2
-
23
-
-
84893793732
-
Masking the energy behavior of des encryption
-
01:10084
-
H. Saputra, N. Vijaykrishnan, M. Kandemir, M. J. Irwin, R. Brooks, S. Kim, and W. Zhang. Masking the energy behavior of des encryption, date, 01:10084, 2003.
-
(2003)
date
-
-
Saputra, H.1
Vijaykrishnan, N.2
Kandemir, M.3
Irwin, M.J.4
Brooks, R.5
Kim, S.6
Zhang, W.7
-
24
-
-
24744434942
-
On the Masking Countermeasure and Higher-Order Power Analysis Attacks
-
E-X. Standaert, E. Peeters, and J.-J. Quisquater. On the Masking Countermeasure and Higher-Order Power Analysis Attacks. In ITCC 2005, pages 562-567, 2005.
-
(2005)
ITCC 2005
, pp. 562-567
-
-
Standaert, E.-X.1
Peeters, E.2
Quisquater, J.-J.3
-
25
-
-
27944462240
-
A side-channel leakage free coprocessor ic in 0.18um cmos for embedded aes-based cryptographic and biometric processing
-
New York, NY, USA, ACM Press
-
K.Tiri, D. Hwang, A. Hodjat, B. Lai, S. Yang, P. Schaumont, and I. Verbauwhede. A side-channel leakage free coprocessor ic in 0.18um cmos for embedded aes-based cryptographic and biometric processing. In Dac '05, pages 222-227, New York, NY, USA, 2005. ACM Press.
-
(2005)
Dac '05
, pp. 222-227
-
-
Tiri, K.1
Hwang, D.2
Hodjat, A.3
Lai, B.4
Yang, S.5
Schaumont, P.6
Verbauwhede, I.7
|