-
1
-
-
84868867635
-
-
http://www.home.agilent.com/agilent/home.jspx.
-
-
-
-
2
-
-
84868871881
-
-
http://www.moteiv.com.
-
-
-
-
3
-
-
35248817849
-
The EM Side-Channel(s)
-
London, UK, Springer-Verlag
-
D. Agrawal, B. Archambeault, J. R. Rao, and P. Rohatgi. The EM Side-Channel(s). In CHES '02: Revised Papers from the 4th International Workshop on Cryptographic Hardware and Embedded Systems, pages 29-45, London, UK, 2003. Springer-Verlag.
-
(2003)
CHES '02: Revised Papers from the 4th International Workshop on Cryptographic Hardware and Embedded Systems
, pp. 29-45
-
-
Agrawal, D.1
Archambeault, B.2
Rao, J.R.3
Rohatgi, P.4
-
4
-
-
84943615552
-
An implementation of des and aes, secure against some attacks
-
London, UK, Springer-Verlag
-
M.-L. Akkar and C. Giraud. An implementation of des and aes, secure against some attacks. In CHES '01: Proceedings of the Third International Workshop on Cryptographic Hardware and Embedded Systems, pages 309-318, London, UK, 2001. Springer-Verlag.
-
(2001)
CHES '01: Proceedings of the Third International Workshop on Cryptographic Hardware and Embedded Systems
, pp. 309-318
-
-
Akkar, M.-L.1
Giraud, C.2
-
5
-
-
34547404724
-
Diversify sensor nodes to improve resilience against node compromise
-
New York, NY, USA, ACM
-
A. Alarifri and W. Du. Diversify sensor nodes to improve resilience against node compromise. In SASN '06: Proceedings of the fourth ACM workshop on Security of ad hoc and sensor networks, pages 101-112, New York, NY, USA, 2006. ACM.
-
(2006)
SASN '06: Proceedings of the fourth ACM workshop on Security of ad hoc and sensor networks
, pp. 101-112
-
-
Alarifri, A.1
Du, W.2
-
8
-
-
0017792448
-
-
A. Avizienis and L. Chen. On the implementation of N-version programming for software fault-tolerance during program execution. In Proceedings of Intl. Computer software and Appl. Conf, pages 145-155, 1977
-
A. Avizienis and L. Chen. On the implementation of N-version programming for software fault-tolerance during program execution. In Proceedings of Intl. Computer software and Appl. Conf., pages 145-155, 1977.
-
-
-
-
9
-
-
33745513832
-
Side-channel issues for designing secure hardware implementations
-
Washington, DC, USA, IEEE Computer Society
-
L. Batina, N. Mentens, and I. Verbauwhede. Side-channel issues for designing secure hardware implementations. In Proceedings of 11th IEEE International On-Line Testing Symposium, pages 118-121, Washington, DC, USA, 2005. IEEE Computer Society.
-
(2005)
Proceedings of 11th IEEE International On-Line Testing Symposium
, pp. 118-121
-
-
Batina, L.1
Mentens, N.2
Verbauwhede, I.3
-
10
-
-
34547321338
-
Dictionary attacks using keyboard acoustic emanations
-
New York, NY, USA, ACM Press
-
Y. Berger, A. Wool, and A. Yeredor. Dictionary attacks using keyboard acoustic emanations. In CCS '06: Proceedings of the 13th ACM conference on Computer and communications security, pages 245-254, New York, NY, USA, 2006. ACM Press.
-
(2006)
CCS '06: Proceedings of the 13th ACM conference on Computer and communications security
, pp. 245-254
-
-
Berger, Y.1
Wool, A.2
Yeredor, A.3
-
12
-
-
84957355967
-
On the importance of checking cryptographic protocols for faults
-
D. Boneh, R. A. DeMillo, and R. J. Lipton. On the importance of checking cryptographic protocols for faults, volume 1233, pages 37-51, 1997.
-
(1997)
, vol.1233
, pp. 37-51
-
-
Boneh, D.1
DeMillo, R.A.2
Lipton, R.J.3
-
13
-
-
0020915882
-
Blind signatures for untraceable payments
-
D. Chaum. Blind signatures for untraceable payments. CRYPTO 82: Advances in Cryptology, pages 199-203, 1982.
-
(1982)
CRYPTO 82: Advances in Cryptology
, pp. 199-203
-
-
Chaum, D.1
-
14
-
-
3042527150
-
-
B. Chevallier-Mames, M. Ciet, and M. Joye. Low-cost solutions for preventing simple side-channel analysis: Side-channel atomicity, 53, pages 760-768, Los Alamitos, CA, USA, 2004. IEEE Computer Society.
-
B. Chevallier-Mames, M. Ciet, and M. Joye. Low-cost solutions for preventing simple side-channel analysis: Side-channel atomicity, volume 53, pages 760-768, Los Alamitos, CA, USA, 2004. IEEE Computer Society.
-
-
-
-
15
-
-
0004046658
-
A taxonomy of obfuscating transformations
-
Technical Report 148, July
-
C. Collberg, C. Thomborson, and D. Low. A taxonomy of obfuscating transformations. Technical Report 148, July 1997.
-
(1997)
-
-
Collberg, C.1
Thomborson, C.2
Low, D.3
-
17
-
-
0004777155
-
Resistance against implementation attacks: A comparative study of the ales proposals
-
Gaithersburg, MD, National Institute of Standards and Technology
-
J. Daemen and V. Rijmen. Resistance against implementation attacks: A comparative study of the ales proposals. In The Second AES Candidate Conference, pages 122-132, Gaithersburg, MD, 1999. National Institute of Standards and Technology.
-
(1999)
The Second AES Candidate Conference
, pp. 122-132
-
-
Daemen, J.1
Rijmen, V.2
-
18
-
-
24744463878
-
A countermeasure for EM attack of a wireless PDA
-
Washington, DC, USA, IEEE Computer Society
-
C. H. Gebotys, C. C. Tiu, and X. Chen. A countermeasure for EM attack of a wireless PDA. In ITCC '05: Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC05) - Volume I, pages 544-549, Washington, DC, USA, 2005. IEEE Computer Society.
-
(2005)
ITCC '05: Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC05)
, vol.1
, pp. 544-549
-
-
Gebotys, C.H.1
Tiu, C.C.2
Chen, X.3
-
21
-
-
58449097014
-
Blind attacks on engineering samples. Cryptology ePrint Archive
-
Report 2005/468
-
V. Gratzer and D. Naccache. Blind attacks on engineering samples. Cryptology ePrint Archive, Report 2005/468, 2005.
-
(2005)
-
-
Gratzer, V.1
Naccache, D.2
-
22
-
-
0034445661
-
System architecture directions for networked sensors
-
J. Hill, R. Szewczyk, A. Woo, S. Hollar, D. E. Culler, and K. S. J. Pister. System architecture directions for networked sensors. In Architectural Support for Programming Languages and Operating Systems, pages 93-104, 2000.
-
(2000)
Architectural Support for Programming Languages and Operating Systems
, pp. 93-104
-
-
Hill, J.1
Szewczyk, R.2
Woo, A.3
Hollar, S.4
Culler, D.E.5
Pister, K.S.J.6
-
23
-
-
33746066725
-
Private circuits 2: Keeping secrets in tamperable circuits
-
May
-
Y. Ishai, M. Prabhakaran, A. Sahai, and D. Wagner. Private circuits 2: Keeping secrets in tamperable circuits. In Proceedings of Eurocrypt, pages 308-327, May 2006.
-
(2006)
Proceedings of Eurocrypt
, pp. 308-327
-
-
Ishai, Y.1
Prabhakaran, M.2
Sahai, A.3
Wagner, D.4
-
24
-
-
35248830337
-
Private circuits: Securing hardware against probing attacks
-
Y. Ishai, A. Sahai, and D. Wagner. Private circuits: Securing hardware against probing attacks. In Proceedings of CRYPTO, pages 463-481, 2003.
-
(2003)
Proceedings of CRYPTO
, pp. 463-481
-
-
Ishai, Y.1
Sahai, A.2
Wagner, D.3
-
25
-
-
84943632039
-
Timing attacks on implementations of diffie-hellman, RSA, DSS, and other systems
-
London, UK, Springer-Verlag
-
P. C. Kocher. Timing attacks on implementations of diffie-hellman, RSA, DSS, and other systems. In CRYPTO '96: Proceedings of the 16th Annual International Cryptology Conference on Advances in Cryptology, pages 104-113, London, UK, 1996. Springer-Verlag.
-
(1996)
CRYPTO '96: Proceedings of the 16th Annual International Cryptology Conference on Advances in Cryptology
, pp. 104-113
-
-
Kocher, P.C.1
-
26
-
-
67650658687
-
Design and validation strategies for obtaining assurance in countermeasures to power analysis and related attacks
-
sept
-
P. C. Kocher. Design and validation strategies for obtaining assurance in countermeasures to power analysis and related attacks. In NIST Physical Security workshop, sept 2005.
-
(2005)
NIST Physical Security workshop
-
-
Kocher, P.C.1
-
27
-
-
84939573910
-
Differential power analysis
-
P. C. Kocher, J. Jaffe, and B. Jun. Differential power analysis. In CRYPTO, pages 388-397, 1999.
-
(1999)
CRYPTO
, pp. 388-397
-
-
Kocher, P.C.1
Jaffe, J.2
Jun, B.3
-
28
-
-
84859015303
-
Soft tempest: Hidden data transmission using electromagnetic emanations
-
M. G. Kuhn and R. J. Anderson. Soft tempest: Hidden data transmission using electromagnetic emanations. In Information Hiding, pages 124-142, 1998.
-
(1998)
Information Hiding
, pp. 124-142
-
-
Kuhn, M.G.1
Anderson, R.J.2
-
30
-
-
1242304439
-
Protecting Java code via code obfuscation
-
D. Low. Protecting Java code via code obfuscation. Crossroads, 4(3):21-23, 1998.
-
(1998)
Crossroads
, vol.4
, Issue.3
, pp. 21-23
-
-
Low, D.1
-
32
-
-
77957948240
-
Improving smart-card security using self-timed circuit technology
-
S. Moore, R. Anderson, and M. Kuhn. Improving smart-card security using self-timed circuit technology. In Fourth ACiD-WG Workshop, Grenoble, pages 211-218, 2002.
-
(2002)
Fourth ACiD-WG Workshop, Grenoble
, pp. 211-218
-
-
Moore, S.1
Anderson, R.2
Kuhn, M.3
-
33
-
-
84962341811
-
Side channel attacks on message authentication codes
-
K. Okeya and T. Iwata. Side channel attacks on message authentication codes. IPSJ Digital Courier, 2:478-488, 2006.
-
(2006)
IPSJ Digital Courier
, vol.2
, pp. 478-488
-
-
Okeya, K.1
Iwata, T.2
-
35
-
-
58449118585
-
Acoustic cryptanalysis: On nosy people and noisy machines
-
A. Shamir and E. tromer. Acoustic cryptanalysis: on nosy people and noisy machines. In Proceedings of EURO-CRYPT, 2004.
-
(2004)
Proceedings of EURO-CRYPT
-
-
Shamir, A.1
tromer, E.2
-
36
-
-
35248813476
-
Optical fault induction attacks
-
S. P. Skorobogatov and R. J. Anderson. Optical fault induction attacks. In CHES, pages 2-12, 2002.
-
(2002)
CHES
, pp. 2-12
-
-
Skorobogatov, S.P.1
Anderson, R.J.2
-
37
-
-
27944462240
-
A side-channel leakage free coprocessor IC in 0.18μm CMOS for embedded AES-based cryptographic and biometric processing
-
New York, NY, USA, ACM Press
-
K. Tiri, D. Hwang, A. Hodjat, B. Lai, S. Yang, P. Schaumont, and I. Verbauwhede. A side-channel leakage free coprocessor IC in 0.18μm CMOS for embedded AES-based cryptographic and biometric processing. In DAC '05: Proceedings of the 42nd annual conference on Design automation, pages 222-227, New York, NY, USA, 2005. ACM Press.
-
(2005)
DAC '05: Proceedings of the 42nd annual conference on Design automation
, pp. 222-227
-
-
Tiri, K.1
Hwang, D.2
Hodjat, A.3
Lai, B.4
Yang, S.5
Schaumont, P.6
Verbauwhede, I.7
-
39
-
-
33745778686
-
Keyboard acoustic emanations revisited
-
New York, NY, USA, ACM Press
-
L. Zhuang, F. Zhou, and J. D. Tygar. Keyboard acoustic emanations revisited. In CCS '05: Proceedings of the 12th ACM conference on Computer and communications security, pages 373-382, New York, NY, USA, 2005. ACM Press.
-
(2005)
CCS '05: Proceedings of the 12th ACM conference on Computer and communications security
, pp. 373-382
-
-
Zhuang, L.1
Zhou, F.2
Tygar, J.D.3
|