-
1
-
-
84943615552
-
-
Akkar, M.-L., Giraud, C.: An Implementation of DES and AES, Secure against Some Attacks. In: Koç, Ç.K., Naccache, D., Paar, C. (eds.) CHES 2001. LNCS, 2162, pp. 309-318. Springer, Heidelberg (2001)
-
Akkar, M.-L., Giraud, C.: An Implementation of DES and AES, Secure against Some Attacks. In: Koç, Ç.K., Naccache, D., Paar, C. (eds.) CHES 2001. LNCS, vol. 2162, pp. 309-318. Springer, Heidelberg (2001)
-
-
-
-
2
-
-
84957079591
-
Towards Sound Approaches to Counteract Power-Analysis Attacks
-
Wiener, M, ed, CRYPTO 1999, Springer, Heidelberg
-
Chari, S., Jutla, C., Rao, J., Rohatgi, P.: Towards Sound Approaches to Counteract Power-Analysis Attacks. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 398-412. Springer, Heidelberg (1999)
-
(1999)
LNCS
, vol.1666
, pp. 398-412
-
-
Chari, S.1
Jutla, C.2
Rao, J.3
Rohatgi, P.4
-
3
-
-
85099425898
-
-
Clavier, C., Coron, J.-S., Dabbous, N.: Differential Power Analysis in the Presence of Hardware Countermeasures. In: Paar, C., Koç, Ç.K. (eds.) CHES 2000. LNCS, 1965, pp. 252-263. Springer, Heidelberg (2000)
-
Clavier, C., Coron, J.-S., Dabbous, N.: Differential Power Analysis in the Presence of Hardware Countermeasures. In: Paar, C., Koç, Ç.K. (eds.) CHES 2000. LNCS, vol. 1965, pp. 252-263. Springer, Heidelberg (2000)
-
-
-
-
4
-
-
52149083271
-
-
Coron, J.-S.: A New DPA Countermeasure Based on Permutation Tables. In: Ostrovsky, R., De Prisco, R., Visconti, I. (eds.) SCN 2008. LNCS, 5229, pp. 278-292. Springer, Heidelberg (2008)
-
Coron, J.-S.: A New DPA Countermeasure Based on Permutation Tables. In: Ostrovsky, R., De Prisco, R., Visconti, I. (eds.) SCN 2008. LNCS, vol. 5229, pp. 278-292. Springer, Heidelberg (2008)
-
-
-
-
5
-
-
38049064396
-
-
Coron, J.-S., Prouff, E., Rivain, M.: Side Channel Cryptanalysis of a Higher Order Masking Scheme. In: Paillier, P., Verbauwhede, I. (eds.) CHES 2007. LNCS, 4727, pp. 28-44. Springer, Heidelberg (2007)
-
Coron, J.-S., Prouff, E., Rivain, M.: Side Channel Cryptanalysis of a Higher Order Masking Scheme. In: Paillier, P., Verbauwhede, I. (eds.) CHES 2007. LNCS, vol. 4727, pp. 28-44. Springer, Heidelberg (2007)
-
-
-
-
6
-
-
70350603411
-
-
FIPS PUB 197. Advanced Encryption Standard. National Institute of Standards and Technology (November 2001)
-
FIPS PUB 197. Advanced Encryption Standard. National Institute of Standards and Technology (November 2001)
-
-
-
-
7
-
-
84949520149
-
-
Goubin, L., Patarin, J.: DES and Differential Power Analysis - The Duplication Method. In: Koç, Ç.K., Paar, C. (eds.) CHES 1999. LNCS, 1717, pp. 158-172. Springer, Heidelberg (1999)
-
Goubin, L., Patarin, J.: DES and Differential Power Analysis - The Duplication Method. In: Koç, Ç.K., Paar, C. (eds.) CHES 1999. LNCS, vol. 1717, pp. 158-172. Springer, Heidelberg (1999)
-
-
-
-
8
-
-
33746589805
-
-
Herbst, P., Oswald, E., Mangard, S.: An AES Smart Card Implementation Resistant to Power Analysis Attacks. In: Zhou, J., Yung, M., Bao, F. (eds.) ACNS 2006. LNCS, 3989, pp. 239-252. Springer, Heidelberg (2006)
-
Herbst, P., Oswald, E., Mangard, S.: An AES Smart Card Implementation Resistant to Power Analysis Attacks. In: Zhou, J., Yung, M., Bao, F. (eds.) ACNS 2006. LNCS, vol. 3989, pp. 239-252. Springer, Heidelberg (2006)
-
-
-
-
9
-
-
27244453895
-
-
Joye, M., Paillier, P., Schoenmakers, B.: On Second-order Differential Power Analysis. In: Rao, J.R., Sunar, B. (eds.) CHES 2005. LNCS, 3659, pp. 293-308. Springer, Heidelberg (2005)
-
Joye, M., Paillier, P., Schoenmakers, B.: On Second-order Differential Power Analysis. In: Rao, J.R., Sunar, B. (eds.) CHES 2005. LNCS, vol. 3659, pp. 293-308. Springer, Heidelberg (2005)
-
-
-
-
11
-
-
84939573910
-
Differential Power Analysis
-
Wiener, M, ed, CRYPTO 1999, Springer, Heidelberg
-
Kocher, P., Jaffe, J., Jun, B.: Differential Power Analysis. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 388-397. Springer, Heidelberg (1999)
-
(1999)
LNCS
, vol.1666
, pp. 388-397
-
-
Kocher, P.1
Jaffe, J.2
Jun, B.3
-
12
-
-
35048819488
-
-
Mangard, S.: Hardware Countermeasures against DPA - A Statistical Analysis of Their Effectiveness. In: Okamoto, T. (ed.) CT-RSA 2004. LNCS, 2964, pp. 222-235. Springer, Heidelberg (2004)
-
Mangard, S.: Hardware Countermeasures against DPA - A Statistical Analysis of Their Effectiveness. In: Okamoto, T. (ed.) CT-RSA 2004. LNCS, vol. 2964, pp. 222-235. Springer, Heidelberg (2004)
-
-
-
-
13
-
-
84890863577
-
-
Springer, Heidelberg
-
Mangard, S., Oswald, E., Popp, T.: Power Analysis Attacks - Revealing the Secrets of Smartcards. Springer, Heidelberg (2007)
-
(2007)
Power Analysis Attacks - Revealing the Secrets of Smartcards
-
-
Mangard, S.1
Oswald, E.2
Popp, T.3
-
14
-
-
84974679353
-
-
Messerges, T.: Securing the AES Finalists against Power Analysis Attacks. In: Schneier, B. (ed.) FSE 2000. LNCS, 1978, pp. 150-164. Springer, Heidelberg (2001)
-
Messerges, T.: Securing the AES Finalists against Power Analysis Attacks. In: Schneier, B. (ed.) FSE 2000. LNCS, vol. 1978, pp. 150-164. Springer, Heidelberg (2001)
-
-
-
-
15
-
-
85099425965
-
-
Messerges, T.: Using Second-order Power Analysis to Attack DPA Resistant Software. In: Paar, C., Koç, Ç.K. (eds.) CHES 2000. LNCS, 1965, pp. 238-251. Springer, Heidelberg (2000)
-
Messerges, T.: Using Second-order Power Analysis to Attack DPA Resistant Software. In: Paar, C., Koç, Ç.K. (eds.) CHES 2000. LNCS, vol. 1965, pp. 238-251. Springer, Heidelberg (2000)
-
-
-
-
16
-
-
84979240258
-
-
Oswald, E., Mangard, S.: Template Attacks on Masking - Resistance is Futile. In: Abe, M. (ed.) CT-RSA 2007. LNCS, 4377, pp. 243-256. Springer, Heidelberg (2006)
-
Oswald, E., Mangard, S.: Template Attacks on Masking - Resistance is Futile. In: Abe, M. (ed.) CT-RSA 2007. LNCS, vol. 4377, pp. 243-256. Springer, Heidelberg (2006)
-
-
-
-
17
-
-
33745679179
-
-
Oswald, E., Mangard, S., Herbst, C., Tillich, S.: Practical Second-order DPA Attacks for Masked Smart Card Implementations of Block Ciphers. In: Pointcheval, D. (ed.) CT-RSA 2006. LNCS, 3860, pp. 192-207. Springer, Heidelberg (2006)
-
Oswald, E., Mangard, S., Herbst, C., Tillich, S.: Practical Second-order DPA Attacks for Masked Smart Card Implementations of Block Ciphers. In: Pointcheval, D. (ed.) CT-RSA 2006. LNCS, vol. 3860, pp. 192-207. Springer, Heidelberg (2006)
-
-
-
-
18
-
-
85034496745
-
How to Construct Pseudorandom and Super Pseudorandom Permutation from one Single Pseudorandom Function
-
Rueppel, R.A, ed, EUROCRYPT 1992, Springer, Heidelberg
-
Patarin, J.: How to Construct Pseudorandom and Super Pseudorandom Permutation from one Single Pseudorandom Function. In: Rueppel, R.A. (ed.) EUROCRYPT 1992. LNCS, vol. 658, pp. 256-266. Springer, Heidelberg (1993)
-
(1993)
LNCS
, vol.658
, pp. 256-266
-
-
Patarin, J.1
-
19
-
-
85028843848
-
How to Construct Pseudorandom Permutations from Single Pseudorandom Functions Advances
-
Damgård, I.B, ed, EUROCRYPT 1990, Springer, Heidelberg
-
Pieprzyk, J.: How to Construct Pseudorandom Permutations from Single Pseudorandom Functions Advances. In: Damgård, I.B. (ed.) EUROCRYPT 1990. LNCS, vol. 473, pp. 140-150. Springer, Heidelberg (1991)
-
(1991)
LNCS
, vol.473
, pp. 140-150
-
-
Pieprzyk, J.1
-
20
-
-
66049085129
-
Statistical Analysis of Second Order Differential Power Analysis
-
Prouff, E., Rivain, M., Bévan, R.: Statistical Analysis of Second Order Differential Power Analysis. IEEE Trans. Comput. 58(6), 799-811 (2009)
-
(2009)
IEEE Trans. Comput
, vol.58
, Issue.6
, pp. 799-811
-
-
Prouff, E.1
Rivain, M.2
Bévan, R.3
-
21
-
-
50249140648
-
-
Rivain, M., Dottax, E., Prouff, E.: Block Ciphers Implementations Provably Secure Against Second Order Side Channel Analysis. In: Nyberg, K. (ed.) FSE 2008. LNCS, 5086, pp. 127-143. Springer, Heidelberg (2008)
-
Rivain, M., Dottax, E., Prouff, E.: Block Ciphers Implementations Provably Secure Against Second Order Side Channel Analysis. In: Nyberg, K. (ed.) FSE 2008. LNCS, vol. 5086, pp. 127-143. Springer, Heidelberg (2008)
-
-
-
-
22
-
-
70350597152
-
Higher-order Masking and Shuffling for Software Implementations of Block Ciphers
-
Rivain, M., Prouff, E., Doget, J.: Higher-order Masking and Shuffling for Software Implementations of Block Ciphers. Cryptology ePrint Archive (2009), http://eprint.iacr.org/
-
(2009)
Cryptology ePrint Archive
-
-
Rivain, M.1
Prouff, E.2
Doget, J.3
-
23
-
-
33745652931
-
-
Schramm, K., Paar, C.: Higher Order Masking of the AES. In: Pointcheval, D. (ed.) CT-RSA 2006. LNCS, 3860, pp. 208-225. Springer, Heidelberg (2006)
-
Schramm, K., Paar, C.: Higher Order Masking of the AES. In: Pointcheval, D. (ed.) CT-RSA 2006. LNCS, vol. 3860, pp. 208-225. Springer, Heidelberg (2006)
-
-
-
-
24
-
-
31344461368
-
An Overview of Power Analysis Attacks Against Field Programmable Gate Arrays
-
Standaert, F.-X., Peeters, E., Rouvroy, G., Quisquater, J.-J.: An Overview of Power Analysis Attacks Against Field Programmable Gate Arrays. IEEE 94(2), 383-394 (2006)
-
(2006)
IEEE
, vol.94
, Issue.2
, pp. 383-394
-
-
Standaert, F.-X.1
Peeters, E.2
Rouvroy, G.3
Quisquater, J.-J.4
-
25
-
-
51049110311
-
-
Tillich, S., Herbst, C.: Attacking State-of-the-Art Software Countermeasures-A Case Study for AES. In: Oswald, E., Rohatgi, P. (eds.) CHES 2008. LNCS, 5154, pp. 228-243. Springer, Heidelberg (2008)
-
Tillich, S., Herbst, C.: Attacking State-of-the-Art Software Countermeasures-A Case Study for AES. In: Oswald, E., Rohatgi, P. (eds.) CHES 2008. LNCS, vol. 5154, pp. 228-243. Springer, Heidelberg (2008)
-
-
-
-
26
-
-
38049073937
-
-
Tillich, S., Herbst, C., Mangard, S.: Protecting AES Software Implementations on 32-Bit Processors Against Power Analysis. In: Katz, J., Yung, M. (eds.) ACNS 2007. LNCS, 4521, pp. 141-157. Springer, Heidelberg (2007)
-
Tillich, S., Herbst, C., Mangard, S.: Protecting AES Software Implementations on 32-Bit Processors Against Power Analysis. In: Katz, J., Yung, M. (eds.) ACNS 2007. LNCS, vol. 4521, pp. 141-157. Springer, Heidelberg (2007)
-
-
-
|