-
1
-
-
84939573910
-
Differential Power Analysis
-
Proc. CRYPTO
-
P. Kocher, J. Jaffe, and B. Jun, "Differential Power Analysis," Proc. CRYPTO, LNCS 1666, 1999, pp. 388-397.
-
(1999)
LNCS
, vol.1666
, pp. 388-397
-
-
Kocher, P.1
Jaffe, J.2
Jun, B.3
-
2
-
-
35248847436
-
Power-Analysis Attacks on an FPGA: First Experimental Results
-
Proc. CHES
-
S.B. Ors, E. Oswald, and B. Preneel, "Power-Analysis Attacks on an FPGA: First Experimental Results," Proc. CHES, LNCS 2779, 2003, pp. 35-50.
-
(2003)
LNCS
, vol.2779
, pp. 35-50
-
-
Ors, S.B.1
Oswald, E.2
Preneel, B.3
-
3
-
-
3042545023
-
Power-Analysis Attack on an ASIC AES Implementation
-
S.B. Ors, F. Gurkaynak, E. Oswald, and B. Preneel, "Power-Analysis Attack on an ASIC AES Implementation," Proc. ITCC, vol. 2, 2004, pp. 546-552.
-
(2004)
Proc. ITCC
, vol.2
, pp. 546-552
-
-
Ors, S.B.1
Gurkaynak, F.2
Oswald, E.3
Preneel, B.4
-
4
-
-
24744465637
-
Power Analysis of an FPGA Implementation of Rijndael: Is Pipelining a DPA Countermeasurer?
-
Proc. CHES
-
F. Standaert, S. Örs, and B. Preneel, "Power Analysis of an FPGA Implementation of Rijndael: Is Pipelining a DPA Countermeasurer?" Proc. CHES, LNCS 3156, 2004, pp. 30-44.
-
(2004)
LNCS
, vol.3156
, pp. 30-44
-
-
Standaert, F.1
Örs, S.2
Preneel, B.3
-
5
-
-
33748999531
-
Updates on the Security of FPGAs against Power Analysis Attacks
-
Proc. CHES
-
F.X Standaert, F. Mace, and J.J. Quisquater, "Updates on the Security of FPGAs against Power Analysis Attacks," Proc. CHES, LNCS 3985, 2006, pp. 335-346.
-
(2006)
LNCS
, vol.3985
, pp. 335-346
-
-
Standaert, F.X.1
Mace, F.2
Quisquater, J.J.3
-
6
-
-
35048829391
-
New Block Cipher ARIA
-
Proc. ICISC'03
-
D. Kwon, J. Kim, S. Park, S. Sung, Y. Sohn, J. Song, Y. Yeom, E. Yoon, S. Lee, J. Lee, S. Chee, D. Han, and J. Hong, "New Block Cipher ARIA," Proc. ICISC'03, LNCS 2971, 2004, pp. 432-445.
-
(2004)
LNCS
, vol.2971
, pp. 432-445
-
-
Kwon, D.1
Kim, J.2
Park, S.3
Sung, S.4
Sohn, Y.5
Song, J.6
Yeom, Y.7
Yoon, E.8
Lee, S.9
Lee, J.10
Chee, S.11
Han, D.12
Hong, J.13
-
7
-
-
33646407063
-
Differential Power Analysis on Block Cipher ARIA
-
Proc. HPCC
-
J. Ha, C. Kim, S. Moon, I. Park, and H. Yoo, "Differential Power Analysis on Block Cipher ARIA," Proc. HPCC, LNCS 3726,2005, pp. 541-548.
-
(2005)
LNCS
, vol.3726
, pp. 541-548
-
-
Ha, J.1
Kim, C.2
Moon, S.3
Park, I.4
Yoo, H.5
-
8
-
-
38049161288
-
Investigations of Power Analysis Attacks and Coimterrneasures for ARIA
-
Proc. WISA'06
-
H. Yoo, C. Herbst, S. Mangard, E. Oswald, and S. Moon, 'Investigations of Power Analysis Attacks and Coimterrneasures for ARIA,"Proc. WISA'06,LNCS 4298, 2007.
-
(2007)
LNCS
, vol.4298
-
-
Yoo, H.1
Herbst, C.2
Mangard, S.3
Oswald, E.4
Moon, S.5
-
9
-
-
35248862449
-
Hectromagnetic Analysis: Concrete Results
-
Proc. CHES
-
K. Gandolfi, C. Mourtel, and F. Olivier, 'Hectromagnetic Analysis: Concrete Results," Proc. CHES,LNCS 2162, 2001, pp. 251-261.
-
(2001)
LNCS
, vol.2162
, pp. 251-261
-
-
Gandolfi, K.1
Mourtel, C.2
Olivier, F.3
-
10
-
-
84946832086
-
A Compact Rijndael Hardware Architecture with S-Box Optimization
-
Proc. ASIACRYPT
-
A Satoh, S. Morioka, K. Takano, and S. Munetoh, "A Compact Rijndael Hardware Architecture with S-Box Optimization," Proc. ASIACRYPT, LNCS 2248, 2001, pp. 239-254.
-
(2001)
LNCS
, vol.2248
, pp. 239-254
-
-
Satoh, A.1
Morioka, S.2
Takano, K.3
Munetoh, S.4
-
11
-
-
34547479335
-
Unified Hardware Architecture for 128-bit Block Cipher AES and Camellia, Proa CHES
-
A Satoh and S. Morioka, "Unified Hardware Architecture for 128-bit Block Cipher AES and Camellia," Proa CHES, LNCS 2779, 2003, pp. 304-318.
-
(2003)
LNCS
, vol.2779
, pp. 304-318
-
-
Satoh, A.1
Morioka, S.2
-
12
-
-
34547466844
-
The Smallest ARIA Module with 16Bit Architecture
-
Proc. ICISC
-
S. Yang, J. Park, and Y. You, "The Smallest ARIA Module with 16Bit Architecture," Proc. ICISC, LNCS 4296, 2006, pp. 107-117.
-
(2006)
LNCS
, vol.4296
, pp. 107-117
-
-
Yang, S.1
Park, J.2
You, Y.3
-
13
-
-
35048818034
-
Correlation Power Analysis with a Leakage Model
-
Proc. CHES
-
E. Brier, C. Clavier, and F. Olivier, "Correlation Power Analysis with a Leakage Model," Proc. CHES, LNCS 3156, 2004, pp. 16-29.
-
(2004)
LNCS
, vol.3156
, pp. 16-29
-
-
Brier, E.1
Clavier, C.2
Olivier, F.3
-
14
-
-
35248817849
-
The EM Side-Channel(s)
-
Proc. CHES
-
D. Agrawal, B. Archambeault, J.R. Rao, and P. Rohatgi, "The EM Side-Channel(s)," Proc. CHES, LNCS 2523, 2002, pp. 2945.
-
(2002)
LNCS
, vol.2523
, pp. 2945
-
-
Agrawal, D.1
Archambeault, B.2
Rao, J.R.3
Rohatgi, P.4
-
15
-
-
23944499474
-
Advances in Side-Channel Cryptanalysis, Hectromagnetic Analysis and Template Attacks
-
D. Agrowal, B. Archambeault, S. Chari, P. Rohatgi, and J. Rao, "Advances in Side-Channel Cryptanalysis, Hectromagnetic Analysis and Template Attacks," Cryptobytes, vol. 6, no. 1, 2003, pp. 20-32.
-
(2003)
Cryptobytes
, vol.6
, Issue.1
, pp. 20-32
-
-
Agrowal, D.1
Archambeault, B.2
Chari, S.3
Rohatgi, P.4
Rao, J.5
-
16
-
-
27244449350
-
EM Analysis of Rijndael and ECC on a Wireless Java-Based PDA
-
Proc. CHES
-
C.H. Gebotys, S. Ho, and C.C. Tiu, "EM Analysis of Rijndael and ECC on a Wireless Java-Based PDA," Proc. CHES, LNCS 3659, 2005, pp. 250-264.
-
(2005)
LNCS
, vol.3659
, pp. 250-264
-
-
Gebotys, C.H.1
Ho, S.2
Tiu, C.C.3
-
17
-
-
42149123932
-
-
LANGER EMV-Technik, http//www.langer-emv.de/en/produ kte/prod_rf2.htm/.
-
Technik
-
-
-
18
-
-
35048819488
-
Hardware Countermeasures against DPA: A Statistical Analysis of Their Effectiveness
-
Proc. CT-RSA
-
S. Mangard, "Hardware Countermeasures against DPA: A Statistical Analysis of Their Effectiveness," Proc. CT-RSA, LNCS 2964, 2004, pp. 222-235.
-
(2004)
LNCS
, vol.2964
, pp. 222-235
-
-
Mangard, S.1
-
19
-
-
24144459808
-
Side-Channel Leakage of Masked CMOS Gates
-
Proc. CT-RSA
-
S. Mangard, T. Popp, and BM Gammel, "Side-Channel Leakage of Masked CMOS Gates," Proc. CT-RSA, LNCS 3376, 2005, pp. 351-365.
-
(2005)
LNCS
, vol.3376
, pp. 351-365
-
-
Mangard, S.1
Popp, T.2
Gammel, B.M.3
-
20
-
-
27244451021
-
Successfully Attacking Masked AES Hardware Irnplementations, Proa CHES
-
S. Mangard, N. Pramstaller, and E. Oswald, "Successfully Attacking Masked AES Hardware Irnplementations," Proa CHES, LNCS 3659, 2005, pp. 157-171.
-
(2005)
LNCS
, vol.3659
, pp. 157-171
-
-
Mangard, S.1
Pramstaller, N.2
Oswald, E.3
-
21
-
-
27244432772
-
Masking at Gate Level in the Presence of Glitches
-
Proc. CHES
-
W. Fischer and B.M. Gammel, "Masking at Gate Level in the Presence of Glitches," Proc. CHES, LNCS 3659, 2005, pp. 187-200.
-
(2005)
LNCS
, vol.3659
, pp. 187-200
-
-
Fischer, W.1
Gammel, B.M.2
-
22
-
-
33750700765
-
Pinpointing the Side-Channel Leakage of Masked AES Hardware Implementations
-
Proc. CHES
-
S. Mangard and K. Schramm "Pinpointing the Side-Channel Leakage of Masked AES Hardware Implementations," Proc. CHES, LNCS 4249, 2006, pp. 76-90.
-
(2006)
LNCS
, vol.4249
, pp. 76-90
-
-
Mangard, S.1
Schramm, K.2
-
23
-
-
68549099555
-
Using Second-Order Power Analysis to Attack DPA Resistant Software
-
Proc. CHES'00
-
T. Messerges, "Using Second-Order Power Analysis to Attack DPA Resistant Software," Proc. CHES'00, LNCS 1965, 2004, pp. 238-251.
-
(1965)
LNCS
, pp. 238-251
-
-
Messerges, T.1
-
24
-
-
35048870686
-
Towards Efficient Second-Order Power Analysis
-
Proc. CHES
-
J. Waddle and D. Wagner, "Towards Efficient Second-Order Power Analysis," Proc. CHES, LNCS 3156, 2004, pp. 1-15.
-
(2004)
LNCS
, vol.3156
, pp. 1-15
-
-
Waddle, J.1
Wagner, D.2
-
25
-
-
24744434942
-
On the Masking Countermeasure and Higher-Order Power Analysis Attacks
-
F. Standaert, E. Peeters, and J. Quisquater, "On the Masking Countermeasure and Higher-Order Power Analysis Attacks," Proc. ITCC, vol 1,2005, pp. 562-567.
-
(2005)
Proc. ITCC
, vol.1
, pp. 562-567
-
-
Standaert, F.1
Peeters, E.2
Quisquater, J.3
-
26
-
-
27244453895
-
On Second-Order Differential Power Analysis
-
Proc. CHES
-
M. Joye, P. Paillier, and B. Schoenmakers, "On Second-Order Differential Power Analysis," Proc. CHES, LNCS 3659, 2005, pp. 293-308.
-
(2005)
LNCS
, vol.3659
, pp. 293-308
-
-
Joye, M.1
Paillier, P.2
Schoenmakers, B.3
-
27
-
-
27244438087
-
Improved Higher Order Side-Channel Attacks with FPGA Experiments
-
Proc. CHES
-
E. Peeters, F. Standaert, N. Donckers, and J. Quisquater, '"Improved Higher Order Side-Channel Attacks with FPGA Experiments," Proc. CHES, LNCS 3659, 2005, pp. 309-323.
-
(2005)
LNCS
, vol.3659
, pp. 309-323
-
-
Peeters, E.1
Standaert, F.2
Donckers, N.3
Quisquater, J.4
-
28
-
-
33745679179
-
-
E. Oswald, S. Mangard, C. Herbst, and S. Tillich, Practical Second-Order DPA Attacks for Masked Smart Card Implementations of Block Ciphers, Proc. CT-RSA, LNCS 3860, 2006, pp. 192-207.
-
E. Oswald, S. Mangard, C. Herbst, and S. Tillich, "Practical Second-Order DPA Attacks for Masked Smart Card Implementations of Block Ciphers," Proc. CT-RSA, LNCS 3860, 2006, pp. 192-207.
-
-
-
|