-
1
-
-
84939573910
-
Differential Power Analysis
-
Lecture Notes in Computer Science, Springer, Berlin
-
P. Kocher, J. Jaffe and B. Jun, "Differential Power Analysis", in: Proceedings of Advances in Cryptology - CRYPTO '99, Lecture Notes in Computer Science, Vol. 1666, Springer, Berlin 1999, pp. 388-397
-
(1999)
Proceedings of Advances in Cryptology - CRYPTO '99
, vol.1666
, pp. 388-397
-
-
Kocher, P.1
Jaffe, J.2
Jun, B.3
-
2
-
-
84949514743
-
Power Analysis Attacks of Modular Exponentiation in Smartcards
-
Springer, Lecture Notes in Computer Science, Springer, Berlin
-
T. S. Messerges, E. A. Dabbish and R. H. Sloan, "Power Analysis Attacks of Modular Exponentiation in Smartcards", in: Proceedings of Workshop on Cryptographic Hardware and Embedded Systems, Springer, Lecture Notes in Computer Science, Vol. 1717, Springer, Berlin 1999, pp. 144-157
-
(1999)
Proceedings of Workshop on Cryptographic Hardware and Embedded Systems
, vol.1717
, pp. 144-157
-
-
Messerges, T.S.1
Dabbish, E.A.2
Sloan, R.H.3
-
3
-
-
84958769993
-
Side Channel Cryptanalysis of Product Ciphers
-
Lecture Notes in Computer Science, Springer, Berlin
-
J. Kelsey, B. Schneier, D. Wagner, C. Hall, "Side Channel Cryptanalysis of Product Ciphers", in: Computer Security - ESORICS 98, Lecture Notes in Computer Science, Vol. 1485, Springer, Berlin 1998, pp. 487-496
-
(1998)
Computer Security - ESORICS 98
, vol.1485
, pp. 487-496
-
-
Kelsey, J.1
Schneier, B.2
Wagner, D.3
Hall, C.4
-
4
-
-
84904650499
-
-
USENIX Workshop on Smartcard Technology, USENIX Association
-
T. S. Messerges, E. A. Dabbish, R. H. Sloan, "Investigations of Power Analysis Attacks on Smartcards", USENIX Workshop on Smartcard Technology, USENIX Association, 1999, pp. 151-161
-
(1999)
Investigations of Power Analysis Attacks on Smartcards
, pp. 151-161
-
-
Messerges, T.S.1
Dabbish, E.A.2
Sloan, R.H.3
-
5
-
-
84944319704
-
Statistics and Secret Leakage
-
Lecture Notes in Computer Science, Springer, Berlin
-
J.-S. Coron, P. Kocher, D. Naccache, "Statistics and Secret Leakage", in: Financial Cryptography 2000, Lecture Notes in Computer Science, Vol. 1962, Springer, Berlin 2001, pp. 157-173
-
(2001)
Financial Cryptography 2000
, vol.1962
, pp. 157-173
-
-
Coron, J.-S.1
Kocher, P.2
Naccache, D.3
-
6
-
-
68549099555
-
Using Second-Order Power Analysis to Attack DPA Resistant Software
-
Lecture Notes in Computer Science, Springer, Berlin
-
T. S. Messerges, "Using Second-Order Power Analysis to Attack DPA Resistant Software", in: Proceedings of Workshop on Cryptographic Hardware and Embedded Systems, Lecture Notes in Computer Science, Vol. 1965, Springer, Berlin 2000, pp. 238-251
-
(2000)
Proceedings of Workshop on Cryptographic Hardware and Embedded Systems
, vol.1965
, pp. 238-251
-
-
Messerges, T.S.1
-
7
-
-
68549126765
-
Smartly Analyzing the Simplicity nd the Power of Simple Power Analysis on Smartcards
-
Lecture Notes in Computer Science, Springer, Berlin
-
R. Mayer-Sommer, "Smartly Analyzing the Simplicity nd the Power of Simple Power Analysis on Smartcards", in: Proceedings of Workshop on Cryptographic Hardware and Embedded Systems, Lecture Notes in Computer Science, Vol. 1965, Springer, Berlin 2000, pp. 78-92
-
(2000)
Proceedings of Workshop on Cryptographic Hardware and Embedded Systems
, vol.1965
, pp. 78-92
-
-
Mayer-Sommer, R.1
-
8
-
-
84942593174
-
IPA: A New Class of Power Attacks
-
Lecture Notes in Computer Science, Springer, Berlin
-
P. N. Fahn and P. K. Pearson, "IPA: A New Class of Power Attacks", in Proceedings of Workshop on Cryptographic Hardware and Embedded Systems, Lecture Notes in Computer Science, Vol. 1717, Springer, Berlin 1999, pp. 158-172
-
(1999)
Proceedings of Workshop on Cryptographic Hardware and Embedded Systems
, vol.1717
, pp. 158-172
-
-
Fahn, P.N.1
Pearson, P.K.2
-
9
-
-
84957355967
-
On the Importance of Checking Cryptographic Protocols for Faults
-
Lecture Notes in Computer Science, Springer, Berlin
-
D. Boneh, R. A. DeMillo, R. J. Lipton, "On the Importance of Checking Cryptographic Protocols for Faults", in Advances in Cryptology - Eurocrypt 97, Lecture Notes in Computer Science, Vol. 1233, Springer, Berlin 1997, pp. 37-51
-
(1997)
Advances in Cryptology - Eurocrypt 97
, vol.1233
, pp. 37-51
-
-
Boneh, D.1
Demillo, R.A.2
Lipton, R.J.3
-
10
-
-
84958641478
-
Differential Fault Analysis of Secret Key Cryptosystems
-
Lecture Notes in Computer Science, Springer, Berlin
-
E. Biham and A. Shamir, "Differential Fault Analysis of Secret Key Cryptosystems", in: Advances in Cryptology - Crypto '97, Lecture Notes in Computer Science, Vol. 1294, Springer, Berlin 1997, pp. 513-525
-
(1997)
Advances in Cryptology - Crypto '97
, vol.1294
, pp. 513-525
-
-
Biham, E.1
Shamir, A.2
-
11
-
-
84943632039
-
Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Systems
-
Lecture Notes in Computer Science, Springer, Berlin
-
P. Kocher, "Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Systems", in: Advances in Cryptology - Crypto '96, Lecture Notes in Computer Science, Vol. 1109, Springer, Berlin 1996, pp. 104-113
-
(1996)
Advances in Cryptology - Crypto '96
, vol.1109
, pp. 104-113
-
-
Kocher, P.1
|