-
1
-
-
35048891868
-
Keying hash functions for message authentication
-
Koblitz, N, ed, CRYPTO 1996, Springer, Heidelberg
-
Bellare, M., Canetti, R., Krawczyk, H.: Keying hash functions for message authentication. In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol. 1109, pp. 1-15. Springer, Heidelberg (1996)
-
(1996)
LNCS
, vol.1109
, pp. 1-15
-
-
Bellare, M.1
Canetti, R.2
Krawczyk, H.3
-
2
-
-
35048818034
-
-
Brier, E., Clavier, C., Olivier, F.: Correlation power analysis with a leakage model. In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, 3156, pp. 16-29. Springer, Heidelberg (2004)
-
Brier, E., Clavier, C., Olivier, F.: Correlation power analysis with a leakage model. In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, vol. 3156, pp. 16-29. Springer, Heidelberg (2004)
-
-
-
-
3
-
-
35248899532
-
-
Chari, S., Rao, J.R., Rohatgi, P.: Template attacks. In: Kaliski Jr., B.S., Koç, Ç.K., Paar, C. (eds.) CHES 2002. LNCS, 2523, pp. 13-28. Springer, Heidelberg (2003)
-
Chari, S., Rao, J.R., Rohatgi, P.: Template attacks. In: Kaliski Jr., B.S., Koç, Ç.K., Paar, C. (eds.) CHES 2002. LNCS, vol. 2523, pp. 13-28. Springer, Heidelberg (2003)
-
-
-
-
4
-
-
33750729555
-
-
Chaves, R., Kuzmanov, G., Sousa, L., Vassiliadis, S.: Improving SHA-2 hardware implementations. In: Goubin, L., Matsui, M. (eds.) CHES 2006. LNCS, 4249, pp. 298-310. Springer, Heidelberg (2006)
-
Chaves, R., Kuzmanov, G., Sousa, L., Vassiliadis, S.: Improving SHA-2 hardware implementations. In: Goubin, L., Matsui, M. (eds.) CHES 2006. LNCS, vol. 4249, pp. 298-310. Springer, Heidelberg (2006)
-
-
-
-
5
-
-
35248883440
-
-
Coron, J.-S., Tchoulkine, A.: A new algorithm for switching from arithmetic to boolean masking. In: D.Walter, C., Koç, Ç.K., Paar, C. (eds.) CHES 2003. LNCS, 2779, pp. 89-97. Springer, Heidelberg (2003)
-
Coron, J.-S., Tchoulkine, A.: A new algorithm for switching from arithmetic to boolean masking. In: D.Walter, C., Koç, Ç.K., Paar, C. (eds.) CHES 2003. LNCS, vol. 2779, pp. 89-97. Springer, Heidelberg (2003)
-
-
-
-
6
-
-
38549148313
-
-
Dierks, T, Rescorla, E, The Transport Layer Security (TLS) Protocol, Version 1.1. RFC 4346 April 2006
-
Dierks, T., Rescorla, E.: The Transport Layer Security (TLS) Protocol, Version 1.1. RFC 4346 (April 2006), http://tools.ietf.org/html/rfc4346
-
-
-
-
8
-
-
84944879586
-
-
Goubin, L.: A sound method for switching between boolean and arithmetic masking. In: Koç, Ç.K., Naccache, D., Paar, C. (eds.) CHES 2001. LNCS, 2162, pp. 3-15. Springer, Heidelberg (2001)
-
Goubin, L.: A sound method for switching between boolean and arithmetic masking. In: Koç, Ç.K., Naccache, D., Paar, C. (eds.) CHES 2001. LNCS, vol. 2162, pp. 3-15. Springer, Heidelberg (2001)
-
-
-
-
9
-
-
84939573910
-
Differential power analysis
-
Wiener, M.J, ed, CRYPTO 1999, Springer, Heidelberg
-
Kocher, P., Jaffe, J., Jun, B.: Differential power analysis. In: Wiener, M.J. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 388-397. Springer, Heidelberg (1999)
-
(1999)
LNCS
, vol.1666
, pp. 388-397
-
-
Kocher, P.1
Jaffe, J.2
Jun, B.3
-
10
-
-
35048852153
-
-
Lemke, K., Schramm, K., Paar, C.: DPA on n-bit sized boolean and arithmetic operations and its application to IDEA, RC6, and the HMAC-Construction. In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, 3156, pp. 205-219. Springer, Heidelberg (2004)
-
Lemke, K., Schramm, K., Paar, C.: DPA on n-bit sized boolean and arithmetic operations and its application to IDEA, RC6, and the HMAC-Construction. In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, vol. 3156, pp. 205-219. Springer, Heidelberg (2004)
-
-
-
-
11
-
-
38549141786
-
-
Lenstra, A.K.: Further progress in hashing cryptanalysis (white paper) (February 2005), http://cm.bell-labs.com/who/akl/hash.pdf
-
Lenstra, A.K.: Further progress in hashing cryptanalysis (white paper) (February 2005), http://cm.bell-labs.com/who/akl/hash.pdf
-
-
-
-
12
-
-
84890863577
-
-
Springer, Heidelberg
-
Mangard, S., Oswald, E., Popp, T.: Power Analysis Attacks: Revealing the Secrets of Smart Cards. Springer, Heidelberg (2007)
-
(2007)
Power Analysis Attacks: Revealing the Secrets of Smart Cards
-
-
Mangard, S.1
Oswald, E.2
Popp, T.3
-
13
-
-
27244451021
-
-
Mangard, S., Pramstaller, N., Oswald, E.: Successfully attacking masked AES hardware implementations. In: Rao, J.R., Sunar, B. (eds.) CHES 2005. LNCS, 3659, pp. 157-171. Springer, Heidelberg (2005)
-
Mangard, S., Pramstaller, N., Oswald, E.: Successfully attacking masked AES hardware implementations. In: Rao, J.R., Sunar, B. (eds.) CHES 2005. LNCS, vol. 3659, pp. 157-171. Springer, Heidelberg (2005)
-
-
-
-
15
-
-
33947379034
-
-
Neiße, O., Pulkus, J.: Switching blindings with a view torwards IDEA. In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, 3156, pp. 230-239. Springer, Heidelberg (2004)
-
Neiße, O., Pulkus, J.: Switching blindings with a view torwards IDEA. In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, vol. 3156, pp. 230-239. Springer, Heidelberg (2004)
-
-
-
-
16
-
-
38549158924
-
-
National Institute of Standards and Technology. FIPS PUB 180-2. Secure Hash Standard (August 2002)
-
National Institute of Standards and Technology. FIPS PUB 180-2. Secure Hash Standard (August 2002)
-
-
-
-
17
-
-
38549180508
-
-
National Institute of Standards and Technology. FIPS PUB 198. The Keyed-Hash Message Authentication Code (HMAC) (March 2002)
-
National Institute of Standards and Technology. FIPS PUB 198. The Keyed-Hash Message Authentication Code (HMAC) (March 2002)
-
-
-
-
18
-
-
33746370148
-
-
Okeya, K.: Side channel attacks against HMACs based on block-cipher based hash functions. In: Batten, L.M., Safavi-Naini, R. (eds.) ACISP 2006. LNCS, 4058, pp. 432-443. Springer, Heidelberg (2006)
-
Okeya, K.: Side channel attacks against HMACs based on block-cipher based hash functions. In: Batten, L.M., Safavi-Naini, R. (eds.) ACISP 2006. LNCS, vol. 4058, pp. 432-443. Springer, Heidelberg (2006)
-
-
-
-
19
-
-
33745754379
-
-
Okeya. K., Iwata, T.: Side channel attacks on message authentication codes. In: Molva, R., Tsudik, G., Westhoff, D. (eds.) ESAS 2005. LNCS, 3813, pp. 205-217. Springer, Heidelberg (2005)
-
Okeya. K., Iwata, T.: Side channel attacks on message authentication codes. In: Molva, R., Tsudik, G., Westhoff, D. (eds.) ESAS 2005. LNCS, vol. 3813, pp. 205-217. Springer, Heidelberg (2005)
-
-
-
-
20
-
-
38549083621
-
FPGA vendor agnostic true random number generator
-
IEEE August
-
Schellekens, D., Preneel, B., Verbauwhede, I.: FPGA vendor agnostic true random number generator. In: FPL 2006. 16th International Conference on Field Programmable Logic and Applications, pp. 139-144. IEEE (August 2006)
-
(2006)
FPL 2006. 16th International Conference on Field Programmable Logic and Applications
, pp. 139-144
-
-
Schellekens, D.1
Preneel, B.2
Verbauwhede, I.3
-
21
-
-
23044530464
-
-
Steinwandt, R., Geiselmann, W., Beth, T.: A theoretical DPA-based cryptanalysis of the NESSIE candidates FLASH and SFLASH. In: Davida, G.I., Frankel, Y. (eds.) ISC 2001. LNCS, 2200, pp. 280-293. Springer, Heidelberg (2001)
-
Steinwandt, R., Geiselmann, W., Beth, T.: A theoretical DPA-based cryptanalysis of the NESSIE candidates FLASH and SFLASH. In: Davida, G.I., Frankel, Y. (eds.) ISC 2001. LNCS, vol. 2200, pp. 280-293. Springer, Heidelberg (2001)
-
-
-
-
22
-
-
77951108942
-
Correlation power analysis of large word sizes
-
IEEE submitted
-
Tunstall, M., Hanley, N., McEvoy, R., Whelan, C., Murphy, C.C., Marnane, W.P.: Correlation power analysis of large word sizes. In: IET Irish Signals and Systems Conference (ISSC) 2007. IEEE (submitted, 2007)
-
(2007)
IET Irish Signals and Systems Conference (ISSC)
-
-
Tunstall, M.1
Hanley, N.2
McEvoy, R.3
Whelan, C.4
Murphy, C.C.5
Marnane, W.P.6
|