-
1
-
-
84939573910
-
-
18, pp
-
Kocher, P., Jaffe, J., Jun, B.: Differential Power Analysis. In: [18], pp. 388-397
-
Differential Power Analysis
, pp. 388-397
-
-
Kocher, P.1
Jaffe, J.2
Jun, B.3
-
2
-
-
35048818034
-
-
Brier, E., Clavier, C., Olivier, F.: Correlation Power Analysis with a Leakage Model. In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, 3156, pp. 16-29. Springer, Heidelberg (2004)
-
Brier, E., Clavier, C., Olivier, F.: Correlation Power Analysis with a Leakage Model. In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, vol. 3156, pp. 16-29. Springer, Heidelberg (2004)
-
-
-
-
3
-
-
35248899532
-
-
Chari, S., Rao, J., Rohatgi, P.: Template Attacks. In: Kaliski Jr., B.S., Koç, Ç.K., Paar, C. (eds.) CHES 2002. LNCS, 2523, pp. 13-29. Springer, Heidelberg (2003)
-
Chari, S., Rao, J., Rohatgi, P.: Template Attacks. In: Kaliski Jr., B.S., Koç, Ç.K., Paar, C. (eds.) CHES 2002. LNCS, vol. 2523, pp. 13-29. Springer, Heidelberg (2003)
-
-
-
-
4
-
-
51049117070
-
-
Gierlichs, B., Batina, L., Tuyls, P., Preneel, B.: Mutual information analysis. In: Oswald, E., Rohatgi, P. (eds.) CHES 2008. LNCS, 5154, pp. 426-442. Springer, Heidelberg (2008)
-
Gierlichs, B., Batina, L., Tuyls, P., Preneel, B.: Mutual information analysis. In: Oswald, E., Rohatgi, P. (eds.) CHES 2008. LNCS, vol. 5154, pp. 426-442. Springer, Heidelberg (2008)
-
-
-
-
7
-
-
38049028094
-
A Formal Practice-Oriented Model For The Analysis of Side-Channel Attacks. Cryptology ePrint Archive
-
Report 2006/139
-
Standaert, F.X., Malkin, T.G., Yung, M.: A Formal Practice-Oriented Model For The Analysis of Side-Channel Attacks. Cryptology ePrint Archive, Report 2006/139 (2006)
-
(2006)
-
-
Standaert, F.X.1
Malkin, T.G.2
Yung, M.3
-
8
-
-
84957079591
-
-
18, pp
-
Chari, S., Jutla, C., Rao, J., Rohatgi, P.: Towards Sound Approaches to Counteract Power-Analysis Attacks. In: [18], pp. 398-412
-
Towards Sound Approaches to Counteract Power-Analysis Attacks
, pp. 398-412
-
-
Chari, S.1
Jutla, C.2
Rao, J.3
Rohatgi, P.4
-
10
-
-
84948963512
-
-
Canteaut, A., Trabbia, M.: Improved Fast Correlation Attacks Using Parity-Check Equations of Weight 4 and 5. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, 1807, pp. 573-588. Springer, Heidelberg (2000)
-
Canteaut, A., Trabbia, M.: Improved Fast Correlation Attacks Using Parity-Check Equations of Weight 4 and 5. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol. 1807, pp. 573-588. Springer, Heidelberg (2000)
-
-
-
-
11
-
-
68849117465
-
Bandwidth selection in kernel density estimation: A review
-
Turlach, B.A.: Bandwidth selection in kernel density estimation: A review. In: CORE and Institut de Statistique, pp. 23-493 (1993)
-
(1993)
CORE and Institut de Statistique
, pp. 23-493
-
-
Turlach, B.A.1
-
12
-
-
0031479641
-
Data-based choice of histogram bin width
-
Wand, M.P.: Data-based choice of histogram bin width. The American Statistician 51, 59-64 (1997)
-
(1997)
The American Statistician
, vol.51
, pp. 59-64
-
-
Wand, M.P.1
-
15
-
-
0001787422
-
Nonparametric entropy estimation: An overview
-
Beirlant, J., Dudewicz, E.J., Györfi, L., Meulen, E.C.: Nonparametric entropy estimation: An overview. International Journal of the Mathematical Statistics Sciences 6, 17-39 (1997)
-
(1997)
International Journal of the Mathematical Statistics Sciences
, vol.6
, pp. 17-39
-
-
Beirlant, J.1
Dudewicz, E.J.2
Györfi, L.3
Meulen, E.C.4
-
17
-
-
54049144710
-
Security evaluation of wddl and seclib countermeasures against power attacks
-
Guilley, S., Sauvage, L., Hoogvorst, P., Pacalet, R., Bertoni, G.M., Chaudhuri, S.: Security evaluation of wddl and seclib countermeasures against power attacks. IEEE Transactions on Computers 57(11), 1482-1497 (2008)
-
(2008)
IEEE Transactions on Computers
, vol.57
, Issue.11
, pp. 1482-1497
-
-
Guilley, S.1
Sauvage, L.2
Hoogvorst, P.3
Pacalet, R.4
Bertoni, G.M.5
Chaudhuri, S.6
-
18
-
-
84863445388
-
CRYPTO 1999
-
Wiener, M, ed, Springer, Heidelberg
-
Wiener, M. (ed.): CRYPTO 1999. LNCS, vol. 1666. Springer, Heidelberg (1999)
-
(1999)
LNCS
, vol.1666
-
-
|