-
1
-
-
84937438279
-
Power Analysis, What Is Now Possible
-
Advances in Cryptology - ASIACRYPT 2000, Springer-Verlag
-
M.-L. Akkar, R. Bevan, P. Dischamp, and D. Moyart. Power Analysis, What Is Now Possible... In Advances in Cryptology - ASIACRYPT 2000, volume 1976 of Lecture Notes in Computer Science (LNCS), pages 489-502. Springer-Verlag, 2000.
-
(2000)
Lecture Notes in Computer Science (LNCS)
, vol.1976
, pp. 489-502
-
-
Akkar, M.-L.1
Bevan, R.2
Dischamp, P.3
Moyart, D.4
-
2
-
-
84943615552
-
An implementation of des and AES, secure against some attacks
-
Cryptographic Hardware and Embedded Systems - CHES 2001, Springer-Verlag
-
M.-L. Akkar and C. Giraud. An implementation of DES and AES, secure against some attacks. In Cryptographic Hardware and Embedded Systems - CHES 2001, volume 2162 of Lecture Notes in Computer Science (LNCS), pages 309-318. Springer-Verlag, 2001.
-
(2001)
Lecture Notes in Computer Science (LNCS)
, vol.2162
, pp. 309-318
-
-
Akkar, M.-L.1
Giraud, C.2
-
3
-
-
0038112355
-
Efficient Software Implementation of AES on 32-bits Platforms
-
Cryptographic Hardware and Embedded Systems - CHES 2002, Springer-Verlag
-
G. Bertoni, L. Breveglieri, P. Fragneto, M. Macchetti, and S. Marchesin. Efficient Software Implementation of AES on 32-bits Platforms. In Cryptographic Hardware and Embedded Systems - CHES 2002, Lecture Notes in Computer Science (LNCS). Springer-Verlag, 2002.
-
(2002)
Lecture Notes in Computer Science (LNCS)
-
-
Bertoni, G.1
Breveglieri, L.2
Fragneto, P.3
Macchetti, M.4
Marchesin, S.5
-
5
-
-
11244262309
-
A Cautionary Note Regarding Evaluation of AES Candidates on Smart-Cards
-
Rome, Italy
-
S. Chari, C. Jutla, J. R. Rao, and P. Rohatgi. A Cautionary Note Regarding Evaluation of AES Candidates on Smart-Cards. In Second Advanced Encryption Standard (AES) Candidate Conference, Rome, Italy, 1999.
-
(1999)
Second Advanced Encryption Standard (AES) Candidate Conference
-
-
Chari, S.1
Jutla, C.2
Rao, J.R.3
Rohatgi, P.4
-
9
-
-
84942593174
-
IPA: A New Class of Power Attacks. in Workshop on Cryptographic Hardware and Embedded Systems - CHES 1999
-
Springer-Verlag
-
P. Fahn and P. Pearson. IPA: A New Class of Power Attacks. In Workshop on Cryptographic Hardware and Embedded Systems - CHES 1999, volume 1717 of Lecture Notes in Computer Science (LNCS), pages 173-186. Springer-Verlag, 1999.
-
(1999)
Lecture Notes in Computer Science (LNCS)
, vol.1717
, pp. 173-186
-
-
Fahn, P.1
Pearson, P.2
-
10
-
-
84944872607
-
Two Methods of Rijndael Implementation in Reconfigurable Hardware
-
Workshop on Cryptographic Hardware and Embedded Systems - CHES 2001, Springer-Verlag
-
V. Fischer and M. Drutarovský. Two Methods of Rijndael Implementation in Reconfigurable Hardware. In Workshop on Cryptographic Hardware and Embedded Systems - CHES 2001, volume 2162 of Lecture Notes in Computer Science (LNCS), pages 77-92. Springer-Verlag, 2001.
-
(2001)
Lecture Notes in Computer Science (LNCS)
, vol.2162
, pp. 77-92
-
-
Fischer, V.1
Drutarovský, M.2
-
11
-
-
0041695788
-
Multiplicative Masking and Power Analysis of AES
-
Cryptographic Hardware and Embedded Systems - CHES 2002, Springer-Verlag
-
J. Dj. Golic and C. Tymen. Multiplicative Masking and Power Analysis of AES. In Cryptographic Hardware and Embedded Systems - CHES 2002, Lecture Notes in Computer Science (LNCS). Springer-Verlag, 2002.
-
(2002)
Lecture Notes in Computer Science (LNCS)
-
-
Golic, J.Dj.1
Tymen, C.2
-
12
-
-
84949954262
-
DPA Countermeasure Based on the "Masking Method"
-
Information Security and Cryptology - ICISC 2001, Springer-Verlag
-
K. Itoh, M. Takenaka, and N. Torii. DPA Countermeasure Based on the "Masking Method". In Information Security and Cryptology - ICISC 2001, volume 2288 of Lecture Notes in Computer Science (LNCS), pages 440-456. Springer-Verlag, 2002.
-
(2002)
Lecture Notes in Computer Science (LNCS)
, vol.2288
, pp. 440-456
-
-
Itoh, K.1
Takenaka, M.2
Torii, N.3
-
13
-
-
84939573910
-
Differential Power Analysis
-
Advances in Cryptology - CRYPTO 1999, Springer-Verlag
-
P. C. Kocher, J. Jaffe, and B. Jun. Differential Power Analysis. In Advances in Cryptology - CRYPTO 1999, volume 1666 of Lecture Notes in Computer Science (LNCS), pages 388-397. Springer-Verlag, 1999.
-
(1999)
Lecture Notes in Computer Science (LNCS)
, vol.1666
, pp. 388-397
-
-
Kocher, P.C.1
Jaffe, J.2
Jun, B.3
-
14
-
-
35248861095
-
Architectural Optimization for a 1.82Gbits/sec VLSI Implementation of the AES Rijndael Algorithm
-
Workshop on Cryptographic Hardware and Embedded Systems - CHES 2001, Springer-Verlag
-
H. Kuo and I. Verbauwhede. Architectural Optimization for a 1.82Gbits/sec VLSI Implementation of the AES Rijndael Algorithm. In Workshop on Cryptographic Hardware and Embedded Systems - CHES 2001, volume 2162 of Lecture Notes in Computer Science (LNCS), pages 51-64. Springer-Verlag, 2001.
-
(2001)
Lecture Notes in Computer Science (LNCS)
, vol.2162
, pp. 51-64
-
-
Kuo, H.1
Verbauwhede, I.2
-
15
-
-
68549126765
-
Smartly Analyzing the Simplicity and the Power of Simple Power Analysis on Smartcards
-
Cryptographic Hardware and Embedded Systems - CHES 2000, Springer-Verlag
-
R. Mayer-Sommer. Smartly Analyzing the Simplicity and the Power of Simple Power Analysis on Smartcards. In Cryptographic Hardware and Embedded Systems - CHES 2000, volume 1965 of Lecture Notes in Computer Science (LNCS), pages 78-92. Springer-Verlag, 2000.
-
(2000)
Lecture Notes in Computer Science (LNCS)
, vol.1965
, pp. 78-92
-
-
Mayer-Sommer, R.1
-
16
-
-
84944878412
-
High Performance Single-Chip FPGA Rijndael Algorithm Implementations
-
Workshop on Cryptographic Hardware and Embedded Systems - CHES 2001, Springer-Verlag
-
M. McLoone and J. V. McCanny. High Performance Single-Chip FPGA Rijndael Algorithm Implementations. In Workshop on Cryptographic Hardware and Embedded Systems - CHES 2001, volume 2162 of Lecture Notes in Computer Science (LNCS), pages 65-76. Springer-Verlag, 2001.
-
(2001)
Lecture Notes in Computer Science (LNCS)
, vol.2162
, pp. 65-76
-
-
McLoone, M.1
McCanny, J.V.2
-
17
-
-
68549099555
-
Using Second-Order Power Analysis to Attack DPA Resistant Software
-
Cryptographic Hardware and Embedded Systems - CHES 2000, Springer-Verlag
-
T. S. Messerges. Using Second-Order Power Analysis to Attack DPA Resistant Software. In Cryptographic Hardware and Embedded Systems - CHES 2000, volume 1965 of Lecture Notes in Computer Science (LNCS), pages 238-251. Springer-Verlag, 2000.
-
(2000)
Lecture Notes in Computer Science (LNCS)
, vol.1965
, pp. 238-251
-
-
Messerges, T.S.1
-
19
-
-
3042644992
-
-
National Institute of Standards and Technology. FIPS 197 Advanced Encryption Standard (AES). Available at http://csrc.nist.gov/publications/fips/ fips197/fips-197.pdf.
-
FIPS 197 Advanced Encryption Standard (AES)
-
-
-
21
-
-
35248843822
-
-
The AES Home Page
-
National Institute of Standards and Technology. The AES Home Page. Available at http://csrc.nist.gov/encryption/aes/.
-
-
-
-
22
-
-
84946832086
-
A Compact Rijndael Hardware Architecture with S-Box Optimization
-
Advances in Cryptology - ASIACRYPT 2001, Springer-Verlag
-
A. Satoh, S. Morioka, K. Takano, and S. Munetoh. A Compact Rijndael Hardware Architecture with S-Box Optimization. In Advances in Cryptology - ASIACRYPT 2001, volume 2248 of Lecture Notes in Computer Science (LNCS), pages 239-254. Springer-Verlag, 2001.
-
(2001)
Lecture Notes in Computer Science (LNCS)
, vol.2248
, pp. 239-254
-
-
Satoh, A.1
Morioka, S.2
Takano, K.3
Munetoh, S.4
-
23
-
-
84893732023
-
A Dynamic and Differential CMOS Logic with Signal Independent Power Consumption to Withstand Differential Power Analysis on Smart Cards
-
Florence, Italy
-
K. Tiri, M. Akmal, and I. Verbauwhede. A Dynamic and Differential CMOS Logic with Signal Independent Power Consumption to Withstand Differential Power Analysis on Smart Cards. In 28th European Solid-State Circuits Conference - ESSCIRC 2002, Florence, Italy, 2002.
-
(2002)
28th European Solid-State Circuits Conference - ESSCIRC 2002
-
-
Tiri, K.1
Akmal, M.2
Verbauwhede, I.3
-
24
-
-
35048820406
-
Simplified Adaptive Multiplicative Masking for AES and its Secure Implementation
-
Cryptographic Hardware and Embedded Systems - CHES 2002, Springer-Verlag
-
E. Trichina, D. De Seta, and L. Germani. Simplified Adaptive Multiplicative Masking for AES and its Secure Implementation. In Cryptographic Hardware and Embedded Systems - CHES 2002, Lecture Notes in Computer Science (LNCS). Springer-Verlag, 2002.
-
(2002)
Lecture Notes in Computer Science (LNCS)
-
-
Trichina, E.1
De Seta, D.2
Germani, L.3
|