-
2
-
-
84939573910
-
Differnetial power analysis
-
P. Kocher, J. Jaffe, and B. Jun, "Differnetial power analysis," Advances in Cryptology, CRYPTO'99 Proceedings, pp. 388-397, 1999.
-
(1999)
Advances in Cryptology, CRYPTO'99 Proceedings
, pp. 388-397
-
-
Kocher, P.1
Jaffe, J.2
Jun, B.3
-
3
-
-
35048818034
-
Correlation power analysis with a leakage model
-
E. Brier, C. Clavier, and F. Olivier, "Correlation power analysis with a leakage model," Proceeding of CHES 2004, pp. 16-29, 2004.
-
(2004)
Proceeding of CHES
, pp. 16-29
-
-
Brier, E.1
Clavier, C.2
Olivier, F.3
-
6
-
-
77649315848
-
Essentials of error-control coding techniques
-
H. Imai, "Essentials of error-control coding techniques," Academic Press 1990.
-
(1990)
Academic Press
-
-
Imai, H.1
-
7
-
-
0003133883
-
Probabilistic Logic and the Synthesis of Reliable Organismsfrom Unreliable Components
-
J. von Neumann, "Probabilistic Logic and the Synthesis of Reliable Organismsfrom Unreliable Components," ser. Automata Studies. Princeton University Press, 1956.
-
(1956)
ser. Automata Studies. Princeton University Press
-
-
von Neumann, J.1
-
8
-
-
42649146134
-
Soft error reduction in combinational logic using gate resizing and flipflop selection
-
Rajeev R. Rao, MI David Blaauw, and Dennis Sylvester, "Soft error reduction in combinational logic using gate resizing and flipflop selection," International Conference on Computer Aided Design, pp. 502-509, 2006.
-
(2006)
International Conference on Computer Aided Design
, pp. 502-509
-
-
Rao, R.R.1
David Blaauw, M.I.2
Sylvester, D.3
-
9
-
-
52649132879
-
General methodology for soft-error-aware power optimization using gate sizing
-
F. Dabiri, A. Nahapetian, T. Massey, M. Potkonjak, and M. Sarrafzadeh, "General methodology for soft-error-aware power optimization using gate sizing," IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, pp. 1788-1797, 2008.
-
(2008)
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems
, pp. 1788-1797
-
-
Dabiri, F.1
Nahapetian, A.2
Massey, T.3
Potkonjak, M.4
Sarrafzadeh, M.5
-
10
-
-
27944475547
-
Simulation models for side channel information leaks
-
K. Tiri and I. Verbauwhede, "Simulation models for side channel information leaks," Proc. of DAC, pp. 228-233, 2005.
-
(2005)
Proc. of DAC
, pp. 228-233
-
-
Tiri, K.1
Verbauwhede, I.2
-
11
-
-
84940644968
-
-
C. E. Shannon, A mathematical theory of communication , Bell Syst. Tech. J. pt. I, 27, pp. 379-423, part II, pp. 623-656, 1948.
-
C. E. Shannon, "A mathematical theory of communication ," Bell Syst. Tech. J. pt. I, vol. 27, pp. 379-423, part II, pp. 623-656, 1948.
-
-
-
-
12
-
-
33750693916
-
Towards security limits in side-channel attacks
-
F. X. Standaert, E. Peeters, C. Archambeau, and J. J. Quisquater "Towards security limits in side-channel attacks" CHES, pp. 30-45, 2006.
-
(2006)
CHES
, pp. 30-45
-
-
Standaert, F.X.1
Peeters, E.2
Archambeau, C.3
Quisquater, J.J.4
-
13
-
-
84937438279
-
Power analysis, what is now possible.
-
M. L. Akkar, R. Bevan, P. Dischamp, and D. Moyart, "Power analysis, what is now possible...," ASIACRYPT 2000, pp.489-502, 2000.
-
(2000)
ASIACRYPT 2000
, pp. 489-502
-
-
Akkar, M.L.1
Bevan, R.2
Dischamp, P.3
Moyart, D.4
-
14
-
-
27944469202
-
Statistical validation of mutual information calculations: Comparisons of alternative numerical algorithms
-
C. J. Celluci, A. M. Albano, and P. E. Rapp, "Statistical validation of mutual information calculations: Comparisons of alternative numerical algorithms," Phys. Rev. E, 2005.
-
(2005)
Phys. Rev. E
-
-
Celluci, C.J.1
Albano, A.M.2
Rapp, P.E.3
-
15
-
-
77649286610
-
Elements of statistical computing: Numerical computation
-
R. A. Thisted, "Elements of statistical computing: numerical computation," CRC Press, 1988.
-
(1988)
CRC Press
-
-
Thisted, R.A.1
-
17
-
-
62949232038
-
Analysis of defect tolerance in molecular crossbar electronics
-
J. Dai, L. Wang, and F. Jain, "Analysis of defect tolerance in molecular crossbar electronics," IEEE Trans. on VLSI Systems, pp. 529-540, 2009.
-
(2009)
IEEE Trans. on VLSI Systems
, pp. 529-540
-
-
Dai, J.1
Wang, L.2
Jain, F.3
-
18
-
-
0036566408
-
Examing smart card security under the threat of power analysis attacks
-
T. S. Messerges, E. A. Dabbish, and R. H. Sloan, "Examing smart card security under the threat of power analysis attacks," IEEE Trans. on Computers, pp. 541-552, 2002.
-
(2002)
IEEE Trans. on Computers
, pp. 541-552
-
-
Messerges, T.S.1
Dabbish, E.A.2
Sloan, R.H.3
-
19
-
-
28144451556
-
The multi-threaded, parity protected, 128 word register files on a dual-core Itanium Family Processor
-
ISSCC, pp
-
E. Fetzer, L. Wang, and J. Jones, "The multi-threaded, parity protected, 128 word register files on a dual-core Itanium Family Processor," Proc. IEEE International Solid-State Circuits Conference (ISSCC), pp. 382-383, 2005.
-
(2005)
Proc. IEEE International Solid-State Circuits Conference
, pp. 382-383
-
-
Fetzer, E.1
Wang, L.2
Jones, J.3
-
20
-
-
0004013982
-
Entropy Measures and Unconditional Security in Cryptography,
-
PhD thesis, ETH Zurich
-
C. Cachin, "Entropy Measures and Unconditional Security in Cryptography," PhD thesis, ETH Zurich, 1997.
-
(1997)
-
-
Cachin, C.1
|