-
1
-
-
84891452265
-
The EM Side-channel(s)
-
Cryptographic Hardware and Embedded Systems - CHES 2002, Springer-Verlag
-
D. Agrawal, B. Archambeault, J.R. Rao, and P. Rohatgi. The EM Side-channel(s). In Cryptographic Hardware and Embedded Systems - CHES 2002, Lecture Notes in Computer Science (LNCS). Springer-Verlag, 2002.
-
(2002)
Lecture Notes in Computer Science (LNCS)
-
-
Agrawal, D.1
Archambeault, B.2
Rao, J.R.3
Rohatgi, P.4
-
2
-
-
0042591369
-
Energy-Aware Design Techniques for Differential Power Analysis Protection
-
ACM
-
L. Benini, A. Macii, E. Macii, E. Omerbegovic, M. Poncino, and F. Pro. Energy-Aware Design Techniques for Differential Power Analysis Protection. In 40th Design Automation Conference - DAC 2003. ACM, 2003.
-
(2003)
40th Design Automation Conference - DAC 2003
-
-
Benini, L.1
Macii, A.2
Macii, E.3
Omerbegovic, E.4
Poncino, M.5
Pro, F.6
-
3
-
-
68549099548
-
Differential Power Analysis in the presence of Hardware Countermeasures
-
Workshop on Cryptographic Hardware and Embedded Systems - CHES 2000, Springer-Verlag
-
C. Clavier, J.-S. Coron, and N. Dabbous. Differential Power Analysis in the presence of Hardware Countermeasures. In Workshop on Cryptographic Hardware and Embedded Systems - CHES 2000, volume 1965 of Lecture Notes in Computer Science (LNCS), pages 252-263. Springer-Verlag, 2000.
-
(2000)
Lecture Notes in Computer Science (LNCS)
, vol.1965
, pp. 252-263
-
-
Clavier, C.1
Coron, J.-S.2
Dabbous, N.3
-
4
-
-
84880293917
-
Resistance against Differential Power Analysis for Elliptic Curve Cryptosystems
-
Workshop on Cryptographic Hardware and Embedded Systems - CHES 1999, Springer-Verlag
-
J.-S. Coron. Resistance against Differential Power Analysis for Elliptic Curve Cryptosystems. In Workshop on Cryptographic Hardware and Embedded Systems - CHES 1999, volume 1717 of Lecture Notes in Computer Science (LNCS), pages 292-302. Springer-Verlag, 1999.
-
(1999)
Lecture Notes in Computer Science (LNCS)
, vol.1717
, pp. 292-302
-
-
Coron, J.-S.1
-
5
-
-
0041695788
-
Multiplicative Masking and Power Analysis of AES
-
Cryptographic Hardware and Embedded Systems - CHES 2002, Springer-Verlag
-
J. Dj. Golic and C. Tymen. Multiplicative Masking and Power Analysis of AES. In Cryptographic Hardware and Embedded Systems - CHES 2002, Lecture Notes in Computer Science (LNCS). Springer-Verlag, 2002.
-
(2002)
Lecture Notes in Computer Science (LNCS)
-
-
Golic, J.Dj.1
Tymen, C.2
-
6
-
-
84944879586
-
A Sound Method for Switching between Boolean and Arithmetic Masking
-
Workshop on Cryptographic Hardware and Embedded Systems - CHES 2001, Springer-Verlag
-
L. Goubin. A Sound Method for Switching between Boolean and Arithmetic Masking. In Workshop on Cryptographic Hardware and Embedded Systems - CHES 2001, volume 2162 of Lecture Notes in Computer Science (LNCS), pages 3-15. Springer-Verlag, 2001.
-
(2001)
Lecture Notes in Computer Science (LNCS)
, vol.2162
, pp. 3-15
-
-
Goubin, L.1
-
7
-
-
84949520149
-
DES and Differential Power Analysis - The Duplication Method
-
Cryptographic Hardware and Embedded Systems - CHES 1999, Springer-Verlag
-
L. Goubin and J. Patarin. DES and Differential Power Analysis - The Duplication Method. In Cryptographic Hardware and Embedded Systems - CHES 1999, volume 1717 of Lecture Notes in Computer Science, pages 158-172. Springer-Verlag, 1999.
-
(1999)
Lecture Notes in Computer Science
, vol.1717
, pp. 158-172
-
-
Goubin, L.1
Patarin, J.2
-
8
-
-
84948778220
-
Instruction Stream Mutation for Non-Deterministic Processors
-
IEEE
-
J. Irwin, D. Page, and N.P. Smart. Instruction Stream Mutation for Non-Deterministic Processors. In IEEE International Conference on Application-Specific Systems, Architectures, and Processors - ASAP 2002, pages 286-295. IEEE, 2002.
-
(2002)
IEEE International Conference on Application-Specific Systems, Architectures, and Processors - ASAP 2002
, pp. 286-295
-
-
Irwin, J.1
Page, D.2
Smart, N.P.3
-
9
-
-
84943632039
-
Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS and Related Attacks
-
Advances in Cryptology - CRYPTO 1996, Springer-Verlag
-
P.C. Kocher. Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS and Related Attacks. In Advances in Cryptology - CRYPTO 1996, volume 1109 of Lecture Notes in Computer Science, pages 104-113. Springer-Verlag, 1996.
-
(1996)
Lecture Notes in Computer Science
, vol.1109
, pp. 104-113
-
-
Kocher, P.C.1
-
10
-
-
84939573910
-
Differential Power Analysis
-
Advances in Cryptology - CRYPTO 1999, Springer-Verlag
-
P.C. Kocher, J. Jaffe, and B. Jun. Differential Power Analysis. In Advances in Cryptology - CRYPTO 1999, volume 1666 of Lecture Notes in Computer Science (LNCS), pages 388-397. Springer-Verlag, 1999.
-
(1999)
Lecture Notes in Computer Science (LNCS)
, vol.1666
, pp. 388-397
-
-
Kocher, P.C.1
Jaffe, J.2
Jun, B.3
-
11
-
-
35248892041
-
A Simple Power-Analysis (SPA) Attack on Implementations of the AES Key Expansion
-
Information Security and Cryptology - ICISC 2002, Springer-Verlag
-
S. Mangard. A Simple Power-Analysis (SPA) Attack on Implementations of the AES Key Expansion. In Information Security and Cryptology - ICISC 2002, volume 2587 of Lecture Notes in Computer Science (LNCS), pages 343-358. Springer-Verlag, 2002.
-
(2002)
Lecture Notes in Computer Science (LNCS)
, vol.2587
, pp. 343-358
-
-
Mangard, S.1
-
12
-
-
84958757658
-
Non-deterministic Processors
-
Information Security and Privacy - ACISP 2001, Springer-Verlag
-
D. May, H.L. Muller, and N.P. Smart. Non-deterministic Processors. In Information Security and Privacy - ACISP 2001, volume 2119 of Lecture Notes in Computer Science (LNCS), pages 115-129. Springer-Verlag, 2001.
-
(2001)
Lecture Notes in Computer Science (LNCS)
, vol.2119
, pp. 115-129
-
-
May, D.1
Muller, H.L.2
Smart, N.P.3
-
13
-
-
68549099555
-
Using Second-Order Power Analysis to Attack DPA Resistant Software
-
Cryptographic Hardware and Embedded Systems - CHES 2000, Springer-Verlag
-
T.S. Messerges. Using Second-Order Power Analysis to Attack DPA Resistant Software. In Cryptographic Hardware and Embedded Systems - CHES 2000, volume 1965 of Lecture Notes in Computer Science (LNCS), pages 238-251. Springer-Verlag, 2000.
-
(2000)
Lecture Notes in Computer Science (LNCS)
, vol.1965
, pp. 238-251
-
-
Messerges, T.S.1
-
14
-
-
84949514743
-
Power Analysis Attacks of Modular Exponentiation in Smartcards
-
Cryptographic Hardware and Embedded Systems - CHES 1999, Springer-Verlag
-
T.S. Messerges, E. A. Dabbish, and R. H. Sloan. Power Analysis Attacks of Modular Exponentiation in Smartcards. In Cryptographic Hardware and Embedded Systems - CHES 1999, volume 1717 of Lecture Notes in Computer Science, pages 144-157. Springer-Verlag, 2000.
-
(2000)
Lecture Notes in Computer Science
, vol.1717
, pp. 144-157
-
-
Messerges, T.S.1
Dabbish, E.A.2
Sloan, R.H.3
-
16
-
-
77957948240
-
Improving Smart Card Security using Self-timed Circuits
-
IEEE Computer Society Press
-
S. Moore, R. Anderson, P. Cunningham, R. Mullins, and G. Taylor. Improving Smart Card Security using Self-timed Circuits. In Eighth IEEE International Symposium on Asynchronous Circuits and Systems - Async 2002. IEEE Computer Society Press, 2002.
-
(2002)
Eighth IEEE International Symposium on Asynchronous Circuits and Systems - Async 2002
-
-
Moore, S.1
Anderson, R.2
Cunningham, P.3
Mullins, R.4
Taylor, G.5
-
18
-
-
35248821853
-
Enhancing Simple Power-Analysis Attacks on Elliptic Curve Cryptosystems
-
Cryptographic Hardware and Embedded Systems - CHES 2002, Springer-Verlag
-
E. Oswald. Enhancing Simple Power-Analysis Attacks on Elliptic Curve Cryptosystems. In Cryptographic Hardware and Embedded Systems - CHES 2002, volume 2523 of Lecture Notes in Computer Science (LNCS), pages 82-97. Springer-Verlag, 2002.
-
(2002)
Lecture Notes in Computer Science (LNCS)
, vol.2523
, pp. 82-97
-
-
Oswald, E.1
-
19
-
-
84893793732
-
Masking the Energy Behavior of des Encryption
-
IEEE
-
H. Saputra, N. Vijaykrishnan, M. Kandemir, M.J. Irwin, R. Brooks, S. Kim, and W. Zhang. Masking the Energy Behavior of DES Encryption. In Design, Automation and Test in Europe Conference and Exhibition - DATE 2003, pages 84-89. IEEE, 2003.
-
(2003)
Design, Automation and Test in Europe Conference and Exhibition - DATE 2003
, pp. 84-89
-
-
Saputra, H.1
Vijaykrishnan, N.2
Kandemir, M.3
Irwin, M.J.4
Brooks, R.5
Kim, S.6
Zhang, W.7
-
20
-
-
84893732023
-
A Dynamic and Differential CMOS Logic with Signal Independent Power Consumption to Withstand Differential Power Analysis on Smart Cards
-
K. Tiri, M. Akmal, and I. Verbauwhede. A Dynamic and Differential CMOS Logic with Signal Independent Power Consumption to Withstand Differential Power Analysis on Smart Cards. In 29th European Solid-State Circuits Conference - ESSCIRC 2002, 2002.
-
(2002)
29th European Solid-State Circuits Conference - ESSCIRC 2002
-
-
Tiri, K.1
Akmal, M.2
Verbauwhede, I.3
-
21
-
-
35248825993
-
Securing Encryption Algorithms against DPA at the Logic Level: Next Generation Smart Card Technology
-
Cryptographic Hardware and Embedded Systems - CHES 2003, Springer-Verlag
-
K. Tiri and I. Verbauwhede. Securing Encryption Algorithms against DPA at the Logic Level: Next Generation Smart Card Technology. In Cryptographic Hardware and Embedded Systems - CHES 2003, volume 2779 of Lecture Notes in Computer Science (LNCS), pages 125-136. Springer-Verlag, 2003.
-
(2003)
Lecture Notes in Computer Science (LNCS)
, vol.2779
, pp. 125-136
-
-
Tiri, K.1
Verbauwhede, I.2
-
22
-
-
35048820406
-
Simplified Adaptive Multiplicative Masking for AES and its Secure Implementation
-
Cryptographic Hardware and Embedded Systems - CHES 2002, Springer-Verlag
-
E. Trichina, D. De Seta, and L. Germani. Simplified Adaptive Multiplicative Masking for AES and its Secure Implementation. In Cryptographic Hardware and Embedded Systems - CHES 2002, Lecture Notes in Computer Science (LNCS). Springer-Verlag, 2002.
-
(2002)
Lecture Notes in Computer Science (LNCS)
-
-
Trichina, E.1
De Seta, D.2
Germani, L.3
|