-
1
-
-
84958769993
-
-
Springer-Verlag, September
-
J. Kelsey, B. Schneier, D. Wagner, and C. Hall, “Side Channel Cryptanalysis of Product Ciphers,” in Proceedings of ESORICS ‘98, Springer-Verlag, September 1998, pp. 97-110.
-
(1998)
Side Channel Cryptanalysis of Product Ciphers, in Proceedings of ESORICS ‘98
, pp. 97-110
-
-
Kelsey, J.1
Schneier, B.2
Wagner, D.3
Hall, C.4
-
2
-
-
84939573910
-
Joshua Jaffe, and Benjamin Jun, “Differential Power Analysis,” in proceedings of Advances in Cryptology-CRYPTO ‘99
-
Paul Kocher
-
Paul Kocher, Joshua Jaffe, and Benjamin Jun, “Differential Power Analysis,” in proceedings of Advances in Cryptology-CRYPTO ‘99, Springer-Verlag, 1999, pp. 388-397.
-
(1999)
Springer-Verlag
, pp. 388-397
-
-
-
3
-
-
84904650499
-
-
Sloan, “Investigations of Power Analysis Attacks on Smartcards,” Proceedings of USENIX Workshop on Smartcard Technology, May
-
Thomas S. Messerges, Ezzy A. Dabbish, and Robert H. Sloan, “Investigations of Power Analysis Attacks on Smartcards,” Proceedings of USENIX Workshop on Smartcard Technology, May 1999, pp. 151-161.
-
(1999)
And Robert H
, pp. 151-161
-
-
Messerges, T.S.1
Dabbish, E.A.2
-
5
-
-
84944337068
-
-
S. Chari, C. Jutla, J.R. Rao, and P. Rohatgi, “A Cautionary Note Regarding Evaluation of AES Candidates on Smart-Cards,” Second Advanced Encryption Standard Candidate Conference, http://www.nist.gov/aes, March 1999
-
S. Chari, C. Jutla, J.R. Rao, and P. Rohatgi, “A Cautionary Note Regarding Evaluation of AES Candidates on Smart-Cards,” Second Advanced Encryption Standard Candidate Conference, http://www.nist.gov/aes, March 1999.
-
-
-
-
6
-
-
84949514743
-
-
Sloan, “Power Analysis Attacks of Modular Exponentiation in Smartcards,” in proceedings of Workshop on Cryptographic Hardware and Embedded Systems, Springer-Verlag
-
Thomas S. Messerges, Ezzy A. Dabbish, and Robert H. Sloan, “Power Analysis Attacks of Modular Exponentiation in Smartcards,” in proceedings of Workshop on Cryptographic Hardware and Embedded Systems, Springer-Verlag, August 1999, pp. 144-157.
-
(1999)
And Robert H
, pp. 144-157
-
-
Messerges, T.S.1
Dabbish, E.A.2
-
8
-
-
84949520149
-
-
Springer-Verlag, August
-
Louis Goubin and Jacques Patarin, “DES and Differential Power Analysis-The Duplication Method,” in proceedings of Workshop on Cryptographic Hardware and Embedded Systems, Springer-Verlag, August 1999, pp. 158-172.
-
(1999)
DES and Differential Power Analysis-The Duplication Method, in Proceedings of Workshop on Cryptographic Hardware and Embedded Systems
, pp. 158-172
-
-
Goubin, L.1
Patarin, J.2
-
9
-
-
23044523291
-
Securing the AES Finalists Against Power Analysis Attacks
-
Springer-Verlag, April
-
Thomas S. Messerges, “Securing the AES Finalists Against Power Analysis Attacks,” in proceedings of Fast Software Encryption Workshop 2000, Springer-Verlag, April 2000.
-
(2000)
In Proceedings of Fast Software Encryption Workshop
, vol.2000
-
-
Messerges, T.S.1
-
10
-
-
84957079591
-
Rohatgi, “Towards Sound Approaches to Counteract Power-Analysis Attacks,” in proceedings of Advances in Cryptology-CRYPTO ‘99
-
Suresh Chari, Charanjit S. Jutla, Josyula R. Rao and Pankaj J. Rohatgi, “Towards Sound Approaches to Counteract Power-Analysis Attacks,” in proceedings of Advances in Cryptology-CRYPTO ‘99, Springer-Verlag, 1999, pp. 398-412.
-
(1999)
Springer-Verlag
, pp. 398-412
-
-
Chari, S.1
Jutla, C.S.2
Rao, J.R.3
Pankaj, J.4
-
11
-
-
14344275781
-
Bitslice Ciphers and Power Analysis Attacks
-
Springer-Verlag, April
-
Joan Daemen, Michael Peeters and Gilles Van Assche, “Bitslice Ciphers and Power Analysis Attacks,” in proceedings of Fast Software Encryption Workshop 2000, Springer-Verlag, April 2000.
-
(2000)
In Proceedings of Fast Software Encryption Workshop
, vol.2000
-
-
Daemen, J.1
Peeters, M.2
Assche, G.V.3
-
12
-
-
84944337071
-
The Twofish Encryption Algorithm : A 128-Bit Block Cipher
-
Bruce Schneier, John Kelsey, Doug Whiting, David Wagner, Chris Hall and Niels Ferguson, The Twofish Encryption Algorithm : A 128-Bit Block Cipher, John Wiley & Sons, 1999, ISBN: 0471353817.
-
(1999)
John Wiley & Sons
-
-
Schneier, B.1
Kelsey, J.2
Whiting, D.3
Wagner, D.4
Hall, C.5
Ferguson, N.6
-
13
-
-
84944337072
-
-
Kuhn, “Self-timed Technology to Reduce Smartcard Fraud,” in proceedings of ACiD-WG Workshop, Grenoble
-
S. W. Moore, R. Anderson and M. Kuhn, “Self-timed Technology to Reduce Smartcard Fraud,” in proceedings of ACiD-WG Workshop, Grenoble, February 2000.
-
(2000)
R. Anderson and M
-
-
Moore, S.W.1
-
14
-
-
84944337073
-
Applying Asynchronous Circuits in Contactless Smartcards
-
Grenoble, February
-
Joep Kessels, “Applying Asynchronous Circuits in Contactless Smartcards,” in proceedings of ACiD-WG Workshop, Grenoble, February 2000.
-
Proceedings of Acid-Wg Workshop
, pp. 2000
-
-
Kessels, J.1
-
15
-
-
84944317218
-
-
Springer-Verlag, February
-
Jean-Sébastien Coron, Paul Kocher and David Naccache, “Statistics and Secret Leakage,” in proceedings of Financial Cryptography, Springer-Verlag, February 2000.
-
(2000)
Statistics and Secret Leakage, in Proceedings of Financial Cryptography
-
-
Coron, J.E.-S.1
Kocher, P.2
Naccache, D.3
|