-
1
-
-
67049092199
-
-
Agmon, S.: The relaxation method for linear inequalities. Canadian J. of Mathematics, 382-392 (1964)
-
Agmon, S.: The relaxation method for linear inequalities. Canadian J. of Mathematics, 382-392 (1964)
-
-
-
-
2
-
-
0002380073
-
Tamper resistance: A cautionary note
-
Berkeley, CA, USA, p, USENIX Association
-
Anderson, R., Kuhn, M.: Tamper resistance: a cautionary note. In: WOEC 1996: Proceedings of the 2nd conference on Proceedings of the Second USENIX Workshop on Electronic Commerce, Berkeley, CA, USA, p. 1. USENIX Association (1996)
-
(1996)
WOEC 1996: Proceedings of the 2nd conference on Proceedings of the Second USENIX Workshop on Electronic Commerce
, pp. 1
-
-
Anderson, R.1
Kuhn, M.2
-
3
-
-
84957018842
-
Low cost attacks on tamper resistant devices
-
London, UK, pp, Springer, London
-
Anderson, R.J., Kuhn, M.G.: Low cost attacks on tamper resistant devices. In: Proceedings of the 5th International Workshop on Security Protocols, London, UK, pp. 125-136. Springer, London (1998)
-
(1998)
Proceedings of the 5th International Workshop on Security Protocols
, pp. 125-136
-
-
Anderson, R.J.1
Kuhn, M.G.2
-
4
-
-
31344443130
-
The sorcerer's apprentice guide to fault attacks
-
Bar-El, H., Choukri, H., Naccache, D., Tunstall, M., Whelan, C.: The sorcerer's apprentice guide to fault attacks. Proceedings of the IEEE 94, 370-382 (2006)
-
(2006)
Proceedings of the IEEE
, vol.94
, pp. 370-382
-
-
Bar-El, H.1
Choukri, H.2
Naccache, D.3
Tunstall, M.4
Whelan, C.5
-
5
-
-
36849077064
-
Fault tolerant design techniques for asynchronous single event upsets within synchronous finite state machine architectures
-
NASA September
-
Berg, M.: Fault tolerant design techniques for asynchronous single event upsets within synchronous finite state machine architectures. In: 7th International Military and Aerospace Programmable Logic Devices (MAPLD) Conference. NASA (September 2004)
-
(2004)
7th International Military and Aerospace Programmable Logic Devices (MAPLD) Conference
-
-
Berg, M.1
-
6
-
-
0037624935
-
Error analysis and detection procedures for a hardware implementation of the advanced encryption standard
-
Bertoni, G., Breveglieri, L., Koren, I., Maistri, P., Piuri, V.: Error analysis and detection procedures for a hardware implementation of the advanced encryption standard. IEEE Transactions on Computers 52(4), 492-505 (2003)
-
(2003)
IEEE Transactions on Computers
, vol.52
, Issue.4
, pp. 492-505
-
-
Bertoni, G.1
Breveglieri, L.2
Koren, I.3
Maistri, P.4
Piuri, V.5
-
7
-
-
84958641478
-
Differential fault analysis of secret key cryptosystems
-
Kaliski Jr, B.S, ed, CRYPTO 1997, Springer, Heidelberg
-
Biham, E., Shamir, A.: Differential fault analysis of secret key cryptosystems. In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 513-525. Springer, Heidelberg (1997)
-
(1997)
LNCS
, vol.1294
, pp. 513-525
-
-
Biham, E.1
Shamir, A.2
-
8
-
-
84957355967
-
On the importance of checking cryptographic protocols for faults
-
Fumy, W, ed, EUROCRYPT 1997, Springer, Heidelberg
-
Boneh, D., DeMillo, R.A., Lipton, R.J.: On the importance of checking cryptographic protocols for faults. In: Fumy, W. (ed.) EUROCRYPT 1997. LNCS, vol. 1233, pp. 37-51. Springer, Heidelberg (1997)
-
(1997)
LNCS
, vol.1233
, pp. 37-51
-
-
Boneh, D.1
DeMillo, R.A.2
Lipton, R.J.3
-
9
-
-
77957948240
-
Improving Smart Card Security Using Self-Timed Circuits
-
IEEE Computer Society, Washington
-
Cunningham, P., Anderson, R., Mullins, R., Taylor, G., Moore, S.: Improving Smart Card Security Using Self-Timed Circuits. In: Proceedings of the 8th international Symposium on Asynchronus Circuits and Systems, ASYNC, p. 211. IEEE Computer Society, Washington (2002)
-
(2002)
Proceedings of the 8th international Symposium on Asynchronus Circuits and Systems, ASYNC
, pp. 211
-
-
Cunningham, P.1
Anderson, R.2
Mullins, R.3
Taylor, G.4
Moore, S.5
-
10
-
-
0037999043
-
Delay-based Circuit Authentication and Applications
-
Gassend, B., Clarke, D., van Dijk, M., Devadas, S.: Delay-based Circuit Authentication and Applications. In: Proceedings of the 2003 ACM Symposium on Applied Computing, pp. 294-301 (2003)
-
(2003)
Proceedings of the 2003 ACM Symposium on Applied Computing
, pp. 294-301
-
-
Gassend, B.1
Clarke, D.2
van Dijk, M.3
Devadas, S.4
-
11
-
-
33845269365
-
-
Gaubatz, G., Sunar, B., Karpovsky, M.G.: Non-linear residue codes for robust public-key arithmetic. In: Breveglieri, L., Koren, I., Naccache, D., Seifert, J.-P. (eds.) FDTC 2006. LNCS, 4236, pp. 173-184. Springer, Heidelberg (2006)
-
Gaubatz, G., Sunar, B., Karpovsky, M.G.: Non-linear residue codes for robust public-key arithmetic. In: Breveglieri, L., Koren, I., Naccache, D., Seifert, J.-P. (eds.) FDTC 2006. LNCS, vol. 4236, pp. 173-184. Springer, Heidelberg (2006)
-
-
-
-
12
-
-
36849047668
-
Robust finite field arithmetic for fault-tolerant public-key cryptography
-
Breveglieri, L, Koren, I, eds, September
-
Gaubatz, G., Sunar, B.: Robust finite field arithmetic for fault-tolerant public-key cryptography. In: Breveglieri, L., Koren, I. (eds.) 2nd Workshop on Fault Diagnosis and Tolerance in Cryptography - FDTC 2005 (September 2005)
-
(2005)
2nd Workshop on Fault Diagnosis and Tolerance in Cryptography - FDTC
-
-
Gaubatz, G.1
Sunar, B.2
-
13
-
-
36849018417
-
Sequential Circuit Design for Embedded Cryptographic Applications Resilient to Adversarial Faults
-
Gaubatz, G., Sunar, B., Savas, E.: Sequential Circuit Design for Embedded Cryptographic Applications Resilient to Adversarial Faults. IEEE Transactions on Computers 57(1), 126-138 (2008)
-
(2008)
IEEE Transactions on Computers
, vol.57
, Issue.1
, pp. 126-138
-
-
Gaubatz, G.1
Sunar, B.2
Savas, E.3
-
14
-
-
38049015807
-
-
Guajardo, J., Kumar, S.S., Schrijen, G.-J., Tuyls, P.: FPGA intrinsic pUFs and their use for IP protection. In: Paillier, P., Verbauwhede, I. (eds.) CHES 2007. LNCS, 4727, pp. 63-80. Springer, Heidelberg (2007)
-
Guajardo, J., Kumar, S.S., Schrijen, G.-J., Tuyls, P.: FPGA intrinsic pUFs and their use for IP protection. In: Paillier, P., Verbauwhede, I. (eds.) CHES 2007. LNCS, vol. 4727, pp. 63-80. Springer, Heidelberg (2007)
-
-
-
-
15
-
-
67049139425
-
-
Hammouri, G, Ozturk, E, Sunar, B, A Tamper-Proof, Lightweight and Secure Authentication Scheme under review
-
Hammouri, G., Ozturk, E., Sunar, B.: A Tamper-Proof, Lightweight and Secure Authentication Scheme (under review)
-
-
-
-
16
-
-
45749153036
-
-
Hammouri, G., Sunar, B.: PUF-HB: A Tamper-Resilient HB Based Authentication Protocol. In: Bellovin, S.M., Gennaro, R., Keromytis, A.D., Yung, M. (eds.) ACNS 2008. LNCS, 5037, pp. 346-365. Springer, Heidelberg (2008)
-
Hammouri, G., Sunar, B.: PUF-HB: A Tamper-Resilient HB Based Authentication Protocol. In: Bellovin, S.M., Gennaro, R., Keromytis, A.D., Yung, M. (eds.) ACNS 2008. LNCS, vol. 5037, pp. 346-365. Springer, Heidelberg (2008)
-
-
-
-
17
-
-
38049090584
-
-
Joye, M.: Highly Regular Right-to-Left Algorithms for Scalar Multiplication. In: Paillier, P., Verbauwhede, I. (eds.) CHES 2007. LNCS, 4727, p. 135. Springer, Heidelberg (2007)
-
Joye, M.: Highly Regular Right-to-Left Algorithms for Scalar Multiplication. In: Paillier, P., Verbauwhede, I. (eds.) CHES 2007. LNCS, vol. 4727, p. 135. Springer, Heidelberg (2007)
-
-
-
-
18
-
-
33645606023
-
The Montgomery Powering Ladder
-
CA, USA: Revised Papers, August 13-15
-
Joye, M., Yen, S.M.: The Montgomery Powering Ladder. In: Cryptographic Hardware and Embedded Systems-Ches 2002: 4th International Workshop, Redwood Shores, CA, USA: Revised Papers, August 13-15 (2002)
-
(2002)
Cryptographic Hardware and Embedded Systems-Ches 2002: 4th International Workshop, Redwood Shores
-
-
Joye, M.1
Yen, S.M.2
-
19
-
-
33845209099
-
Differential fault analysis attack resistant architectures for the advanced encryption standard
-
Karpovsky, M., Kulikowski, K.J., Taubin, A.: Differential fault analysis attack resistant architectures for the advanced encryption standard. In: Proc. World Computing Congress (2004)
-
(2004)
Proc. World Computing Congress
-
-
Karpovsky, M.1
Kulikowski, K.J.2
Taubin, A.3
-
20
-
-
4544294542
-
Robust protection against fault- injection attacks on smart cards implementing the advanced encryption standard
-
Washington, DC, USA, p, IEEE Computer Society Press, Los Alamitos
-
Karpovsky, M., Kulikowski, K.J., Taubin, A.: Robust protection against fault- injection attacks on smart cards implementing the advanced encryption standard. In: DSN 2004: Proceedings of the 2004 International Conference on Dependable Systems and Networks (DSN 2004), Washington, DC, USA, p. 93. IEEE Computer Society Press, Los Alamitos (2004)
-
(2004)
DSN 2004: Proceedings of the 2004 International Conference on Dependable Systems and Networks (DSN
, pp. 93
-
-
Karpovsky, M.1
Kulikowski, K.J.2
Taubin, A.3
-
21
-
-
3943069113
-
A new class of nonlinear systematic error detecting codes
-
Karpovsky, M., Taubin, A.: A new class of nonlinear systematic error detecting codes. IEEE Trans. Info. Theory 50(8), 1818-1820 (2004)
-
(2004)
IEEE Trans. Info. Theory
, vol.50
, Issue.8
, pp. 1818-1820
-
-
Karpovsky, M.1
Taubin, A.2
-
22
-
-
0036913523
-
Concurrent error detection schemes for fault-based side-channel cryptanalysis of symmetric block ciphers
-
Karri, R., Wu, K., Mishra, P., Kim, Y.: Concurrent error detection schemes for fault-based side-channel cryptanalysis of symmetric block ciphers. IEEE Transactions on computer-aided design of integrated circuits and systems 21(12), 1509-1517 (2002)
-
(2002)
IEEE Transactions on computer-aided design of integrated circuits and systems
, vol.21
, Issue.12
, pp. 1509-1517
-
-
Karri, R.1
Wu, K.2
Mishra, P.3
Kim, Y.4
-
23
-
-
84868982866
-
Estimation of keys stored in cmos cryptographic device after baking by using the charge shift. Cryptology ePrint Archive
-
Report 2007/134
-
Kocar, O.: Estimation of keys stored in cmos cryptographic device after baking by using the charge shift. Cryptology ePrint Archive, Report 2007/134 (2007), http://eprint.iacr.org/
-
(2007)
-
-
Kocar, O.1
-
24
-
-
0000474763
-
Differential Power Analysis
-
Kocher, P., Jaffe, J., Jun, B.: Differential Power Analysis. In: Advances in Cryptology-Crypto 1999: 19th Annual International Cryptology Conference, Santa Barbara, California, USA, August 15-19, 1999 Proceedings (1999)
-
(1999)
Advances in Cryptology-Crypto 1999: 19th Annual International Cryptology Conference, Santa Barbara, California, USA, August 15-19, 1999 Proceedings
-
-
Kocher, P.1
Jaffe, J.2
Jun, B.3
-
25
-
-
84943632039
-
Timing attacks on implementations of diffie-hellman, RSA, DSS, and other systems
-
Koblitz, N, ed, CRYPTO 1996, Springer, Heidelberg
-
Kocher, P.C.: Timing attacks on implementations of diffie-hellman, RSA, DSS, and other systems. In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol. 1109, pp. 104-113. Springer, Heidelberg (1996)
-
(1996)
LNCS
, vol.1109
, pp. 104-113
-
-
Kocher, P.C.1
-
28
-
-
33845187887
-
-
Kulikowski, K.J., Karpovsky, M., Taubin, A.: Fault attack resistant cryptographic hardware with uniform error detection. In: Breveglieri, L., Koren, I., Naccache, D., Seifert, J.-P. (eds.) FDTC 2006. LNCS, 4236, pp. 185-195. Springer, Heidelberg (2006)
-
Kulikowski, K.J., Karpovsky, M., Taubin, A.: Fault attack resistant cryptographic hardware with uniform error detection. In: Breveglieri, L., Koren, I., Naccache, D., Seifert, J.-P. (eds.) FDTC 2006. LNCS, vol. 4236, pp. 185-195. Springer, Heidelberg (2006)
-
-
-
-
29
-
-
4544381402
-
A technique to build a secret key in integrated circuits for identification and authentication applications
-
Lee, J.W., Daihyun, L., Gassend, B., Suhamd, G.E., van Dijk, M., Devadas, S.: A technique to build a secret key in integrated circuits for identification and authentication applications. In: Symposium of VLSI Circuits, pp. 176-179 (2004)
-
(2004)
Symposium of VLSI Circuits
, pp. 176-179
-
-
Lee, J.W.1
Daihyun, L.2
Gassend, B.3
Suhamd, G.E.4
van Dijk, M.5
Devadas, S.6
-
30
-
-
31144476821
-
Extracting secret keys from integrated circuits
-
Lim, D., Lee, J.W., Gassend, B., Edward Suh, G., van Dijk, M., Devadas, S.: Extracting secret keys from integrated circuits. IEEE Trans. VLSI Syst. 13(10), 1200-1205 (2005)
-
(2005)
IEEE Trans. VLSI Syst
, vol.13
, Issue.10
, pp. 1200-1205
-
-
Lim, D.1
Lee, J.W.2
Gassend, B.3
Edward Suh, G.4
van Dijk, M.5
Devadas, S.6
-
33
-
-
0009553549
-
Protecting Devices by Active Coating
-
Posch, R.: Protecting Devices by Active Coating. Journal of Universal Computer Science 4(7), 652-668 (1998)
-
(1998)
Journal of Universal Computer Science
, vol.4
, Issue.7
, pp. 652-668
-
-
Posch, R.1
-
34
-
-
0037952426
-
-
PhD thesis, Massachusetts Institute Of Technology
-
Ravikanth, P.S.: Physical One-Way Functions. PhD thesis, Massachusetts Institute Of Technology (2001)
-
(2001)
Physical One-Way Functions
-
-
Ravikanth, P.S.1
-
35
-
-
84892218719
-
-
2nd edn. Springer, Heidelberg
-
Roos, C., Terlaky, T., Vial, J.-P.: Interior Point Methods for Linear Optimization, 2nd edn. Springer, Heidelberg (2005)
-
(2005)
Interior Point Methods for Linear Optimization
-
-
Roos, C.1
Terlaky, T.2
Vial, J.-P.3
-
37
-
-
49149114201
-
Information-theoretic Analysis of Coating PUFs. Cryptology ePrint Archive
-
Report 2006/101
-
Skoric, B., Maubach, S., Kevenaar, T., Tuyls, P.: Information-theoretic Analysis of Coating PUFs. Cryptology ePrint Archive, Report 2006/101 (2006)
-
(2006)
-
-
Skoric, B.1
Maubach, S.2
Kevenaar, T.3
Tuyls, P.4
-
38
-
-
23944443170
-
Optical Fault Induction Attacks
-
CA, USA, Revised Papers, August 13-15
-
Skorobogatov, S.P., Anderson, R.J.: Optical Fault Induction Attacks. In: Cryptographic Hardware and Embedded Systems-Ches 2002: 4th International Workshop, Redwood Shores, CA, USA, Revised Papers, August 13-15 (2002)
-
(2002)
Cryptographic Hardware and Embedded Systems-Ches 2002: 4th International Workshop, Redwood Shores
-
-
Skorobogatov, S.P.1
Anderson, R.J.2
-
39
-
-
17644364039
-
Design and Analysis of Dual- Rail Circuits for Security Applications
-
Sokolov, D., Murphy, J., Bystrov, A.V., Yakovlev, A.: Design and Analysis of Dual- Rail Circuits for Security Applications. IEEE Transactions on Computers 54(4), 449-460 (2005)
-
(2005)
IEEE Transactions on Computers
, vol.54
, Issue.4
, pp. 449-460
-
-
Sokolov, D.1
Murphy, J.2
Bystrov, A.V.3
Yakovlev, A.4
-
40
-
-
33750726983
-
-
Tuyls, P., Schrijen, G.-J., Skorkc, B., van Geloven, J., Verhaegh, N., Wolters, R.: Read-proof hardware from protective coatings. In: Goubin, L., Matsui, M. (eds.) CHES 2006. LNCS, 4249, pp. 369-383. Springer, Heidelberg (2006)
-
Tuyls, P., Schrijen, G.-J., Skorkc, B., van Geloven, J., Verhaegh, N., Wolters, R.: Read-proof hardware from protective coatings. In: Goubin, L., Matsui, M. (eds.) CHES 2006. LNCS, vol. 4249, pp. 369-383. Springer, Heidelberg (2006)
-
-
-
-
41
-
-
34547674038
-
Secret Key Generation from Classical Physics: Physical Un- cloneable Functions
-
Mukherjee, S, Aarts, E, Roovers, R, Widdershoven, F, Ouwerkerk, M, eds, AmIware: Hardware Technology Drivers of Ambient Intelligence, Springer, Heidelberg
-
Tuyls, P., Skoric, B.: Secret Key Generation from Classical Physics: Physical Un- cloneable Functions. In: Mukherjee, S., Aarts, E., Roovers, R., Widdershoven, F., Ouwerkerk, M. (eds.) AmIware: Hardware Technology Drivers of Ambient Intelligence. Philips Research Book Series, vol. 5. Springer, Heidelberg (2006)
-
(2006)
Philips Research Book Series
, vol.5
-
-
Tuyls, P.1
Skoric, B.2
-
42
-
-
33747584753
-
Fault Attacks on Dual-Rail Encoded Systems
-
ACSAC. IEEE Computer Society, Washington
-
Waddle, J., Wagner, D.: Fault Attacks on Dual-Rail Encoded Systems. In: Proceedings of the 21st Annual Computer Security Applications Conference, pp. 483-494. ACSAC. IEEE Computer Society, Washington (2005), http://dx.doi.org/10. 1109/CSAC.2005.25
-
(2005)
Proceedings of the 21st Annual Computer Security Applications Conference
, pp. 483-494
-
-
Waddle, J.1
Wagner, D.2
|