-
1
-
-
84939573910
-
Differential Power Analysis
-
99, M. Wiener, ed, pp
-
P. Kocher, J. Jaffe, and B. Jun, "Differential Power Analysis," Advances in Cryptology - Proc. Int'l Crytology Conf. (CRYPTO '99 , M. Wiener, ed., pp. 388-397, 1999.
-
(1999)
Advances in Cryptology - Proc. Int'l Crytology Conf. (CRYPTO
, pp. 388-397
-
-
Kocher, P.1
Jaffe, J.2
Jun, B.3
-
2
-
-
66049100932
-
-
S. Chari, J. Rao, and P. Rohatgi, Template Attacks, Proc. Int'l Workshop Cryptographic Hardware and Embedded Systems CHES 2002 , B. Kaliski, Jr., C,. Koc, and C. Paar, eds., pp. 13-29, 2002.
-
S. Chari, J. Rao, and P. Rohatgi, "Template Attacks," Proc. Int'l Workshop Cryptographic Hardware and Embedded Systems (CHES 2002 , B. Kaliski, Jr., C,. Koc,, and C. Paar, eds., pp. 13-29, 2002.
-
-
-
-
3
-
-
27244432445
-
A Stochastic Model for Differential Side Channel Cryptanalysis
-
J. Rao and B. Sunar, eds, pp
-
W. Schindler, K. Lemke, and C. Paar, "A Stochastic Model for Differential Side Channel Cryptanalysis," Proc. Int'l Workshop Cryptographic Hardware and Embedded Systems (CHES 2005), J. Rao and B. Sunar, eds., pp. 30-46, 2005.
-
(2005)
Proc. Int'l Workshop Cryptographic Hardware and Embedded Systems (CHES 2005)
, pp. 30-46
-
-
Schindler, W.1
Lemke, K.2
Paar, C.3
-
4
-
-
33750722766
-
Template Attacks in Principal Subspaces
-
L. Goubin and M. Matsui, eds, pp
-
C. Archambeau, E. Peeters, F.-X. Standaert, and J.-J. Quisquater, "Template Attacks in Principal Subspaces," Proc. Int'l Workshop Cryptographic Hardware and Embedded Systems (CHES 2006), L. Goubin and M. Matsui, eds., pp. 1-14, 2006.
-
(2006)
Proc. Int'l Workshop Cryptographic Hardware and Embedded Systems (CHES 2006)
, pp. 1-14
-
-
Archambeau, C.1
Peeters, E.2
Standaert, F.-X.3
Quisquater, J.-J.4
-
5
-
-
84957079591
-
Towards Sound Approaches to Counteract Power-Analysis Attacks
-
99, M. Wiener, ed, pp
-
S. Chari, C. Jutla, J. Rao, and P. Rohatgi, "Towards Sound Approaches to Counteract Power-Analysis Attacks," Advances in Cryptology-Proc. Int'l Crytology Conf. (CRYPTO '99), M. Wiener, ed., pp. 398-412, 1999.
-
(1999)
Advances in Cryptology-Proc. Int'l Crytology Conf. (CRYPTO
, pp. 398-412
-
-
Chari, S.1
Jutla, C.2
Rao, J.3
Rohatgi, P.4
-
6
-
-
84949520149
-
DES and Differential Power Analysis - The Duplication Method
-
99, Ç. Koc, and C. Paar, eds, pp
-
L. Goubin and J. Patarin, "DES and Differential Power Analysis - The Duplication Method," Proc. Int'l Workshop Cryptographic Hardware and Embedded Systems (CHES '99), Ç. Koc, and C. Paar, eds., pp. 158-172, 1999.
-
(1999)
Proc. Int'l Workshop Cryptographic Hardware and Embedded Systems (CHES
, pp. 158-172
-
-
Goubin, L.1
Patarin, J.2
-
8
-
-
38049064396
-
Side Channel Cryptanalysis of a Higher Order Masking
-
P. Paillier and I. Verbauwhede, eds, pp
-
J.-S. Coron, E. Prouff, and M. Rivain, "Side Channel Cryptanalysis of a Higher Order Masking," Proc. Int'l Workshop Cryptographic Hardware and Embedded Systems (CHES 2007), P. Paillier and I. Verbauwhede, eds., pp. 28-44, 2007,
-
(2007)
Proc. Int'l Workshop Cryptographic Hardware and Embedded Systems (CHES 2007)
, pp. 28-44
-
-
Coron, J.-S.1
Prouff, E.2
Rivain, M.3
-
9
-
-
23044523291
-
Securing the AES Finalists Against Power Analysis Attacks
-
B. Schneier, ed, pp
-
T. Messerges, "Securing the AES Finalists Against Power Analysis Attacks," Proc. Int'l Conf. Fast Software Encryption (FSE 2000 , B. Schneier, ed., pp. 150-164, 2000.
-
(2000)
Proc. Int'l Conf. Fast Software Encryption (FSE 2000
, pp. 150-164
-
-
Messerges, T.1
-
10
-
-
84943615552
-
An Implementation of DES and AES, Secure against Some Attacks
-
Ç. Koç, D. Naccache, and C. Paar, eds, pp
-
M.-L. Akkar and C. Giraud, "An Implementation of DES and AES, Secure against Some Attacks," Proc. Int'l Workshop Cryptographic Hardware and Embedded Systems (CHES 2001), Ç. Koç, D. Naccache, and C. Paar, eds., pp. 309-318, 2001.
-
(2001)
Proc. Int'l Workshop Cryptographic Hardware and Embedded Systems (CHES 2001)
, pp. 309-318
-
-
Akkar, M.-L.1
Giraud, C.2
-
11
-
-
68549099555
-
Using Second Order Power Analysis to Attack DPA Resistant Software
-
Ç. Koç and C. Paar, eds, pp
-
T. Messerges, "Using Second Order Power Analysis to Attack DPA Resistant Software," Proc. Int'l Workshop Cryptographic Hardware and Embedded Systems (CHES 2000), Ç. Koç and C. Paar, eds., pp. 238-251, 2000.
-
(2000)
Proc. Int'l Workshop Cryptographic Hardware and Embedded Systems (CHES 2000)
, pp. 238-251
-
-
Messerges, T.1
-
12
-
-
35048870686
-
Toward Efficient Second Order Power Analysis
-
M. Joye and J.-J. Quisquater, eds, pp
-
J. Waddle and D. Wagner, "Toward Efficient Second Order Power Analysis," Proc. Int'l Workshop Cryptographic Hardware and Embedded Systems (CHES 2004), M. Joye and J.-J. Quisquater, eds., pp. 1-15, 2004.
-
(2004)
Proc. Int'l Workshop Cryptographic Hardware and Embedded Systems (CHES 2004)
, pp. 1-15
-
-
Waddle, J.1
Wagner, D.2
-
13
-
-
27244453895
-
On Second Order Differential Power Analysis
-
J. Rao and B. Sunar, eds, pp
-
M. Joye, P. Paillier, and B. Schoenmakers, "On Second Order Differential Power Analysis," Proc. Int'l Workshop Cryptographic Hardware and Embedded Systems (CHES 2005), J. Rao and B. Sunar, eds., pp. 293-308, 2005.
-
(2005)
Proc. Int'l Workshop Cryptographic Hardware and Embedded Systems (CHES 2005)
, pp. 293-308
-
-
Joye, M.1
Paillier, P.2
Schoenmakers, B.3
-
14
-
-
27244438087
-
Improving Higher-Order Side Channel Attacks with FPGA Expermiments
-
J. Rao and B. Sunar, eds, pp
-
E. Peeters, F.-X. Standaert, N. Donckers, and J.-J. Quisquater, "Improving Higher-Order Side Channel Attacks with FPGA Expermiments," Proc. Int'l Workshop Cryptographic Hardware and Embedded Systems (CHES 2005), J. Rao and B. Sunar, eds., pp. 309-321, 2005.
-
(2005)
Proc. Int'l Workshop Cryptographic Hardware and Embedded Systems (CHES 2005)
, pp. 309-321
-
-
Peeters, E.1
Standaert, F.-X.2
Donckers, N.3
Quisquater, J.-J.4
-
15
-
-
24744434942
-
On the Masking Countermeasure and Higher-Order Power Analysis Attacks
-
F.-X. Standaert, E. Peeters, and J.-J. Quisquater, "On the Masking Countermeasure and Higher-Order Power Analysis Attacks," Proc. Int'l Conf. Information Technology: Coding and Computing (ITCC '05), vol. I, pp. 562-567, 2005.
-
(2005)
Proc. Int'l Conf. Information Technology: Coding and Computing (ITCC '05)
, vol.1
, pp. 562-567
-
-
Standaert, F.-X.1
Peeters, E.2
Quisquater, J.-J.3
-
16
-
-
33745679179
-
Practical Second Order DPA Attacks for Masked Smart Card Implementations of Block Ciphers
-
E. Oswald, S. Mangard, C. Herbst, and S. Tillich, "Practical Second Order DPA Attacks for Masked Smart Card Implementations of Block Ciphers," Topics in Cryptology - Proc. Cryptographers' Track (CT)-RSA Conf. 2006, pp. 192-207, 2006.
-
(2006)
Topics in Cryptology - Proc. Cryptographers' Track (CT)-RSA Conf
, pp. 192-207
-
-
Oswald, E.1
Mangard, S.2
Herbst, C.3
Tillich, S.4
-
17
-
-
35048818034
-
Correlation Power Analysis with a Leakage Model
-
M. Joye and J.-J. Quisquater, eds, pp
-
E. Brier, C. Clavier, and F. Olivier, "Correlation Power Analysis with a Leakage Model," Proc. Int'l Workshop Cryptographic Hardware and Embedded Systems (CHES '04), M. Joye and J.-J. Quisquater, eds., pp. 16-29, 2004.
-
(2004)
Proc. Int'l Workshop Cryptographic Hardware and Embedded Systems (CHES '04)
, pp. 16-29
-
-
Brier, E.1
Clavier, C.2
Olivier, F.3
-
18
-
-
35048819488
-
Hardware Countermeasures against DPA - A Statistical Analysis of Their Effectiveness
-
T. Okamoto, ed, pp
-
S. Mangard, "Hardware Countermeasures against DPA - A Statistical Analysis of Their Effectiveness," Topics in Cryptology - Proc. Cryptographers' Track (CT)-RSA Conf. 2004, T. Okamoto, ed., pp. 222-235, 2004.
-
(2004)
Topics in Cryptology - Proc. Cryptographers' Track (CT)-RSA Conf. 2004
, pp. 222-235
-
-
Mangard, S.1
-
20
-
-
31344461368
-
An Overview of Power Analysis Attacks against Field Programmable Gate Arrays
-
Feb
-
F.-X. Standaert, E. Peeters, G. Rouvroy, and J.-J. Quisquater, "An Overview of Power Analysis Attacks against Field Programmable Gate Arrays," Proc. IEEE, vol. 94, no. 2, pp. 383-394, Feb. 2006.
-
(2006)
Proc. IEEE
, vol.94
, Issue.2
, pp. 383-394
-
-
Standaert, F.-X.1
Peeters, E.2
Rouvroy, G.3
Quisquater, J.-J.4
-
21
-
-
66049147222
-
Template Attacks on Masking-Resistance is Futile
-
M. Abe, ed, pp
-
E. Oswald and S. Mangard, "Template Attacks on Masking-Resistance is Futile," Topics in Cryptology - Proc. Cryptographers' Track (CT -RSA 2007 Conf., M. Abe, ed., pp. 562-567, 2007.
-
(2007)
Topics in Cryptology - Proc. Cryptographers' Track (CT -RSA 2007 Conf
, pp. 562-567
-
-
Oswald, E.1
Mangard, S.2
|