-
1
-
-
84957018842
-
Low Cost Attacks on Tamper Resistant Devices Springer-Verlag
-
Proc. Security Protocols, 5th International Workshop, Paris, France, April
-
Ross Anderson and Markus Kühn. Low Cost Attacks on Tamper Resistant Devices. In Proc. Security Protocols, 5th International Workshop, Paris, France, Springer-Verlag LNCS Volume 1361 , pp 125-136, April 1997.
-
(1997)
LNCS
, vol.1361
, pp. 125-136
-
-
Anderson, R.1
Kühn, M.2
-
2
-
-
3042641393
-
On the Importance of Checking Cryptographic Protocols for Faults
-
Dan Boneh, Richard DeMillo and Richard Lipton. On the Importance of Checking Cryptographic Protocols for Faults. Journal of Cryptology, Springer-Verlag, Volume 14, Number 2, pp 101-119, 2001.
-
(2001)
Journal of Cryptology, Springer-Verlag
, vol.14
, Issue.2
, pp. 101-119
-
-
Boneh, D.1
Demillo, R.2
Lipton, R.3
-
3
-
-
84957079591
-
Towards Sound Countermeasures to Counteract Power-Analysis Attacks
-
Proc. Crypto '99, Springer-Verlag
-
Suresh Chari, Charanjit S. Jutla, Josyula R. Rao and Pankaj Rohatgi. Towards Sound Countermeasures to Counteract Power-Analysis Attacks. Proc. Crypto '99, Springer-Verlag, LNCS 1666, August 1999, pages 398-412.
-
(1999)
LNCS
, vol.1666
-
-
Chari, S.1
Jutla, C.S.2
Rao, J.R.3
Rohatgi, P.4
-
4
-
-
0012022904
-
A Cautionary Note Regarding the Evaluation of AES Candidates on Smart Cards
-
Rome, Italy, March
-
Suresh Chari, Charanjit S. Jutla, Josyula R. Rao and Pankaj Rohatgi. A Cautionary Note Regarding the Evaluation of AES Candidates on Smart Cards. Proc. Second AES Candidate Conference, Rome, Italy, March 1999.
-
(1999)
Proc. Second AES Candidate Conference
-
-
Chari, S.1
Jutla, C.S.2
Rao, J.R.3
Rohatgi, P.4
-
5
-
-
68549099548
-
Differential Power Analysis in the Presence of Hardware Countermeasures
-
Proc. Workshop on Cryptographic Hardware and Embedded Systems, Aug., Springer-Verlag
-
Christopher Clavier, Jean-Sebastien Coron, and Nora Dabbous. Differential Power Analysis in the Presence of Hardware Countermeasures. In Proc. Workshop on Cryptographic Hardware and Embedded Systems, Aug. 2000, LNCS 1965, Springer-Verlag, pp 252-263.
-
(2000)
LNCS
, vol.1965
, pp. 252-263
-
-
Clavier, C.1
Coron, J.-S.2
Dabbous, N.3
-
6
-
-
84880293917
-
Resistance against Differential Power Analysis for Elliptic Curve Cryptosystems
-
Proc. Workshop on Cryptographic Hardware and Embedded Systems, Aug., Springer-Verlag
-
Jean-Sebastien Coron. Resistance against Differential Power Analysis for Elliptic Curve Cryptosystems. In Proc. Workshop on Cryptographic Hardware and Embedded Systems , Aug. 1999, LNCS 1717, Springer-Verlag, pp 292-302.
-
(1999)
LNCS
, vol.1717
, pp. 292-302
-
-
Coron, J.-S.1
-
7
-
-
68549105908
-
On Boolean and Arithmetic Masking against Differential Power Analysis
-
Proc, Workshop on Cryptographic Hardware and Embedded Systems, Aug., Springer-Verlag
-
Jean-Sebastien Coron, and Louis Goubin. On Boolean and Arithmetic Masking against Differential Power Analysis. In Proc, Workshop on Cryptographic Hardware and Embedded Systems, Aug. 2000, LNCS 1965, Springer-Verlag, pp 231-237.
-
(2000)
LNCS
, vol.1965
, pp. 231-237
-
-
Coron, J.-S.1
Goubin, L.2
-
8
-
-
84942593174
-
IPA: A New Class of Power Attacks
-
Proc.Workshop on Cryptographic Hardware and Embedded Systems, Aug., Springer-Verlag
-
P.N. Fahn and P.K. Pearson. IPA: A New Class of Power Attacks. In Proc.Workshop on Cryptographic Hardware and Embedded Systems, Aug. 1999, LNCS 1717, Springer-Verlag, pp 173-186.
-
(1999)
LNCS
, vol.1717
, pp. 173-186
-
-
Fahn, P.N.1
Pearson, P.K.2
-
10
-
-
84949520149
-
DES and Differential Power Analysis
-
Proc. Workshop on Cryptographic Hardware and Embedded Systems, Aug., Springer-Verlag
-
L. Goubin and J. Patarin. DES and Differential Power Analysis. In Proc. Workshop on Cryptographic Hardware and Embedded Systems, Aug. 1999, LNCS 1717, Springer-Verlag, pp 158-172.
-
(1999)
LNCS
, vol.1717
, pp. 158-172
-
-
Goubin, L.1
Patarin, J.2
-
11
-
-
68549092452
-
Power Analysis Attacks and Algorithmic Approaches to Their Countermeasures for the Koblitz Curve Cryptosystems
-
Proc. Workshop on Cryptographic Hardware and Embedded Systems, Aug., Springer-Verlag
-
M.A. Hasan. Power Analysis Attacks and Algorithmic Approaches to Their Countermeasures for the Koblitz Curve Cryptosystems. In Proc. Workshop on Cryptographic Hardware and Embedded Systems, Aug. 2000, LNCS 1965, Springer-Verlag, pp 93-108.
-
(2000)
LNCS
, vol.1965
, pp. 93-108
-
-
Hasan, M.A.1
-
12
-
-
84939573910
-
Differential Power Analysis: Leaking Secrets
-
Proc. Crypto '99, Springer-Verlag
-
P. Kocher, J. Jaffe and B. Jun. Differential Power Analysis: Leaking Secrets. In Proc. Crypto '99, Springer-Verlag, LNCS 1666, pages 388-397.
-
LNCS
, vol.1666
, pp. 388-397
-
-
Kocher, P.1
Jaffe, J.2
Jun, B.3
-
13
-
-
84943632039
-
Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS and Other Systems
-
Proc. Crypto '96, Springer-Verlag
-
P. Kocher. Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS and Other Systems. In Proc. Crypto '96, LNCS 1109, Springer-Verlag, pp 104-113.
-
LNCS
, vol.1109
, pp. 104-113
-
-
Kocher, P.1
-
14
-
-
0033705991
-
Side Channel Cryptanalysis of Product Ciphers
-
J. Kelsey, Bruce Schneier, D. Wagner and C. Hall. Side Channel Cryptanalysis of Product Ciphers. Journal of Computer Security, Volume 8, Number 2-3, 2000, pages 141-158.
-
(2000)
Journal of Computer Security
, vol.8
, Issue.2-3
, pp. 141-158
-
-
Kelsey, J.1
Schneier, B.2
Wagner, D.3
Hall, C.4
-
15
-
-
68549126765
-
Smartly Analyzing the Simplicity and the Power of Simple Power Analysis on Smart Cards
-
Proc. Workshop on Cryptographic Hardware and Embedded Systems, Worcester, MA, USA, Aug., Springer-Verlag
-
Rita Mayer-Sommer. Smartly Analyzing the Simplicity and the Power of Simple Power Analysis on Smart Cards. In Proc. Workshop on Cryptographic Hardware and Embedded Systems, Worcester, MA, USA, Aug. 2000, LNCS 1965, Springer-Verlag, pp 78-92.
-
(2000)
LNCS
, vol.1965
, pp. 78-92
-
-
Mayer-Sommer, R.1
-
16
-
-
23044523291
-
Securing the AES Finalists Against Power Analysis Attacks
-
New York, NY, USA, April Springer-Verlag.
-
Thomas S. Messerges. Securing the AES Finalists Against Power Analysis Attacks. In Proc. Fast Software Encryption Workshop 2000, New York, NY, USA, April 2000, Springer-Verlag.
-
(2000)
Proc. Fast Software Encryption Workshop 2000
-
-
Messerges, T.S.1
-
17
-
-
68549099555
-
Using Second-Order Power Analysis to Attack DPA Resistant Software
-
Proc. Workshop on Cryptographic Hardware and Embedded Systems, Aug., Springer-Verlag
-
Thomas S. Messerges. Using Second-Order Power Analysis to Attack DPA Resistant Software. In Proc. Workshop on Cryptographic Hardware and Embedded Systems, Aug. 2000, LNCS 1965, Springer-Verlag, pp 238-251.
-
(2000)
LNCS
, vol.1965
, pp. 238-251
-
-
Messerges, T.S.1
-
18
-
-
84949514743
-
Power Analysis Attacks of Modular Exponentiation in Smart Cards
-
Proc. Workshop on Cryptographic Hardware and Embedded Systems 1999, Aug., Springer-Verlag
-
T.S. Messerges, E.A. Dabbish, and R.H. Sloan. Power Analysis Attacks of Modular Exponentiation in Smart Cards. In Proc. Workshop on Cryptographic Hardware and Embedded Systems 1999, Aug. 1999, LNCS 1717, Springer-Verlag, pp 144-157.
-
(1999)
LNCS
, vol.1717
, pp. 144-157
-
-
Messerges, T.S.1
Dabbish, E.A.2
Sloan, R.H.3
-
21
-
-
68549107606
-
Protecting Smart Cards from Power Analysis with Detached Power Supplies
-
Proc. Workshop on Cryptographic Hardware and Embedded Systems, Aug., Springer-Verlag
-
Adi Shamir. Protecting Smart Cards from Power Analysis with Detached Power Supplies. In Proc. Workshop on Cryptographic Hardware and Embedded Systems, Aug. 2000, LNCS 1965, Springer-Verlag, pp 71-77.
-
(2000)
LNCS
, vol.1965
, pp. 71-77
-
-
Shamir, A.1
|