-
1
-
-
0033702592
-
Transforming out timing leaks
-
ACM
-
J. Agat. Transforming out Timing Leaks. In Proc. POPL '00, pages 40-53. ACM.
-
Proc. POPL '00
, pp. 40-53
-
-
Agat, J.1
-
2
-
-
33646392466
-
Preventing timing leaks through transactional branching instructions
-
ENTCS, Elsevier
-
G. Barthe, T. Rezk, and M. Warnier. Preventing Timing Leaks Through Transactional Branching Instructions. In Proc. QAPL '05, ENTCS, pages 33-55. Elsevier.
-
Proc. QAPL '05
, pp. 33-55
-
-
Barthe, G.1
Rezk, T.2
Warnier, M.3
-
3
-
-
0001388569
-
On a statistical estimate for the entropy of a sequence of independent random variables
-
G. Basharin. On a Statistical Estimate for the Entropy of a Sequence of Independent Random Variables. Theory Probab. Appl., 47:333-336, 1959.
-
(1959)
Theory Probab. Appl.
, vol.47
, pp. 333-336
-
-
Basharin, G.1
-
4
-
-
0036037637
-
The complexity of approximating entropy
-
ACM
-
T. Batu, S. Dasgupta, R. Kumar, and R. Rubinfeld. The complexity of approximating entropy. In Proc. STOC '02, pages 678-687. ACM, 2002.
-
(2002)
Proc. STOC '02
, pp. 678-687
-
-
Batu, T.1
Dasgupta, S.2
Kumar, R.3
Rubinfeld, R.4
-
8
-
-
35248843124
-
A new type of timing attack: Application to GPS
-
LNCS 2779, Springer
-
J. Cathalo, F. Koeune, and J.-J. Quisquater. A New Type of Timing Attack: Application to GPS. In Proc. CARDIS '03, LNCS 2779, pages 291-303. Springer.
-
Proc. CARDIS '03
, pp. 291-303
-
-
Cathalo, J.1
Koeune, F.2
Quisquater, J.-J.3
-
9
-
-
84957079591
-
Towards sound approaches to counteract power-analysis attacks
-
LNCS 1666, Springer
-
S. Chari, C. S. Jutla, J. R. Rao, and P. Rohatgi. Towards Sound Approaches to Counteract Power-Analysis Attacks. In Proc. CRYPTO '99, LNCS 1666, pages 398-412. Springer.
-
Proc. CRYPTO '99
, pp. 398-412
-
-
Chari, S.1
Jutla, C.S.2
Rao, J.R.3
Rohatgi, P.4
-
11
-
-
20844445346
-
Quantitative information flow, relations and polymorphic types
-
D. Clark, S. Hunt, and P. Malacaria. Quantitative Information Flow, Relations and Polymorphic Types. J. Log. Comput., 18 (2):181-199, 2005.
-
(2005)
J. Log. Comput.
, vol.18
, Issue.2
, pp. 181-199
-
-
Clark, D.1
Hunt, S.2
Malacaria, P.3
-
13
-
-
0004116989
-
-
McGraw-Hill Higher Education, second edition
-
T. H. Cormen, C. Stein, R. L. Rivest, and C. E. Leiserson. Introduction to Algorithms. McGraw-Hill Higher Education, second edition, 2001.
-
(2001)
Introduction to algorithms
-
-
Cormen, T.H.1
Stein, C.2
Rivest, R.L.3
Leiserson, C.E.4
-
15
-
-
35248862449
-
Electromagnetic analysis: Concrete results
-
LNCS 2162, Springer
-
K. Gandolfi, C. Mourtel, and F. Olivier. Electromagnetic analysis: Concrete results. In Proc. CHES '01, LNCS 2162, pages 251-261. Springer.
-
Proc. CHES '01
, pp. 251-261
-
-
Gandolfi, K.1
Mourtel, C.2
Olivier, F.3
-
16
-
-
84974759639
-
Toward a mathematical foundation for information flow security
-
J. W. Gray. Toward a Mathematical Foundation for Information Flow Security. JCS, 1 (3-4): 255-294, 1992.
-
(1992)
JCS
, vol.1
, Issue.3-4
, pp. 255-294
-
-
Gray, J.W.1
-
17
-
-
77952376941
-
Timing aware information flow security for a javacard-like bytecode
-
ENTCS. Elsevier
-
D. Hedin and D. Sands. Timing Aware Information Flow Security for a JavaCard-like Bytecode. In BYTECODE '05, ENTCS. Elsevier.
-
BYTECODE '05
-
-
Hedin, D.1
Sands, D.2
-
18
-
-
84943632039
-
Timing attacks on implementations of diffie-hellman, RSA, DSS, and other systems
-
LNCS 1109, Springer
-
P. Kocher. Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems. In Proc. CRYPTO '96, LNCS 1109, pages 104-113. Springer.
-
Proc. CRYPTO '96
, pp. 104-113
-
-
Kocher, P.1
-
19
-
-
84939573910
-
Differential power analysis
-
LNCS 1666, Springer
-
P. Kocher, J. Jaffe, and B. Jun. Differential Power Analysis. In Proc. CRYPTO '99, LNCS 1666, pages 388-397. Springer.
-
Proc. CRYPTO '99
, pp. 388-397
-
-
Kocher, P.1
Jaffe, J.2
Jun, B.3
-
20
-
-
33750279149
-
Timing-sensitive information flow analysis for synchronous systems
-
LNCS 4189, Springer
-
B. Köpf and D. Basin. Timing-Sensitive Information Flow Analysis for Synchronous Systems. In Proc. ESORICS '06, LNCS 4189, pages 243-262. Springer.
-
Proc. ESORICS '06
, pp. 243-262
-
-
Köpf, B.1
Basin, D.2
-
21
-
-
84948775168
-
Quantifying information flow
-
IEEE
-
G. Lowe. Quantifying Information Flow. In Proc. CSFW '02, pages 18-31. IEEE.
-
Proc. CSFW '02
, pp. 18-31
-
-
Lowe, G.1
-
24
-
-
84949514743
-
Power analysis attacks of modular exponentiation in smartcards
-
LNCS 1717, Springer
-
T. S. Messerges, E. A. Dabbish, and R. H. Sloan. Power Analysis Attacks of Modular Exponentiation in Smartcards. In Proc. CHES '99, LNCS 1717, pages 144-157. Springer.
-
Proc. CHES '99
, pp. 144-157
-
-
Messerges, T.S.1
Dabbish, E.A.2
Sloan, R.H.3
-
25
-
-
35048852134
-
Physically observable cryptography (extended abstract)
-
LNCS 2951, Springer
-
S. Micali and L. Reyzin. Physically Observable Cryptography (Extended Abstract). In Proc. TCC '04, LNCS 2951, pages 278-296. Springer.
-
Proc. TCC '04
, pp. 278-296
-
-
Micali, S.1
Reyzin, L.2
-
27
-
-
0028711580
-
A survey of power estimation techniques in VLSI circuits
-
F. N. Najm. A Survey of Power Estimation Techniques in VLSI Circuits. IEEE Transactions on VLSI Systems, 2 (4):446-455, 1994.
-
(1994)
IEEE Transactions on VLSI Systems
, vol.2
, Issue.4
, pp. 446-455
-
-
Najm, F.N.1
-
28
-
-
33745640963
-
Cache attacks and countermeasures: The case of aes
-
LNCS 3860, Springer
-
D. A. Osvik, A. Shamir, and E. Tromer. Cache Attacks and Countermeasures: the Case of AES. In Proc. CT-RSA '06, LNCS 3860, pages 1-20. Springer.
-
Proc. CT-RSA '06
, pp. 1-20
-
-
Osvik, D.A.1
Shamir, A.2
Tromer, E.3
-
30
-
-
84947756322
-
On the incomparability of entropy and marginal guesswork in brute-force attacks
-
LNCS 1977, Springer
-
J. O. Pliam. On the Incomparability of Entropy and Marginal Guesswork in Brute-Force Attacks. In Proc. INDOCRYPT '00, LNCS 1977, pages 67-79. Springer.
-
Proc. INDOCRYPT '00
, pp. 67-79
-
-
Pliam, J.O.1
-
31
-
-
78650238574
-
Electromagnetic analysis (EMA): Measures and couter-measures for smard cards
-
LNCS 2140, Springer
-
J.-J. Quisquater and D. Samyde. ElectroMagnetic Analysis (EMA): Measures and Couter-Measures for Smard Cards. In Proc. E-smart '01, LNCS 2140, pages 200-210. Springer.
-
Proc. E-smart '01
, pp. 200-210
-
-
Quisquater, J.-J.1
Samyde, D.2
-
32
-
-
0033700286
-
Probabilistic noninterference for multi-threaded programs
-
IEEE
-
A. Sabelfeld and D. Sands. Probabilistic Noninterference for Multi-threaded Programs. In Proc. CSFW '00, pages 200-215. IEEE.
-
Proc. CSFW '00
, pp. 200-215
-
-
Sabelfeld, A.1
Sands, D.2
-
33
-
-
33745183293
-
An interactive codesign environment for domain-specific coprocessors
-
P. Schaumont, D. Ching, and I. Verbauwhede. An Interactive Codesign Environment for Domain-Specific Coprocessors. ACM Transactions on Design Automation for Electronic Systems, 11 (1):70-87, 2006.
-
(2006)
ACM Transactions on Design Automation for Electronic Systems
, vol.11
, Issue.1
, pp. 70-87
-
-
Schaumont, P.1
Ching, D.2
Verbauwhede, I.3
-
34
-
-
27244432445
-
A stochastic model for differential side-channel cryptanalysis
-
LNCS 3659, Springer
-
W. Schindler, K. Lemke, and C. Paar. A Stochastic Model for Differential Side-Channel Cryptanalysis. In Proc. CHES '05, LNCS 3659, pages 30-46. Springer.
-
Proc. CHES '05
, pp. 30-46
-
-
Schindler, W.1
Lemke, K.2
Paar, C.3
-
35
-
-
84856043672
-
A mathematical theory of communication
-
623-656, July and October
-
C. Shannon. A Mathematical Theory of Communication. Bell System Technical Journal, 27:379-423 and 623-656, July and October 1948.
-
(1948)
Bell System Technical Journal
, vol.27
, pp. 379-423
-
-
Shannon, C.1
-
36
-
-
0031648455
-
Secure information flow in a multi-threaded imperative language
-
ACM
-
G. Smith and D. Volpano. Secure Information Flow in a Multi-Threaded Imperative Language. In Proc. POPL '98, pages 355-364. ACM.
-
Proc. POPL '98
, pp. 355-364
-
-
Smith, G.1
Volpano, D.2
-
37
-
-
33750693916
-
Towards security limits in side-channel attacks
-
LNCS 4249, Springer
-
F.-X. Standaert, E. Peeters, C. Archambeau, and J.-J. Quisquater. Towards Security Limits in Side-Channel Attacks. In Proc. CHES '06, LNCS 4249, pages 30-45. Springer.
-
Proc. CHES '06
, pp. 30-45
-
-
Standaert, F.-X.1
Peeters, E.2
Archambeau, C.3
Quisquater, J.-J.4
-
40
-
-
16244410461
-
Power estimation techniques for cycle-accurate functional descriptions of hardware
-
ACM
-
L. Zhong, S. Ravi, A. Raghunathan, and N. Jha. Power Estimation Techniques for Cycle-Accurate Functional Descriptions of Hardware. In Proc. ICCAD '04, pages 668-675. ACM.
-
Proc. ICCAD '04
, pp. 668-675
-
-
Zhong, L.1
Ravi, S.2
Raghunathan, A.3
Jha, N.4
|