-
1
-
-
35248817849
-
The em side-channel(s)
-
Kaliski Jr., B.S., Koç, Ç.K., Paar, C. (eds.) Springer, Heidelberg
-
Agrawal, D., Archambeault, B., Rao, J.R., Rohatgi, P.: The EM side-channel(s). In: Kaliski Jr., B.S., Koç, Ç.K., Paar, C. (eds.) CHES 2002. LNCS, vol. 2523, pp. 29-45. Springer, Heidelberg (2003)
-
(2003)
CHES 2002. LNCS
, vol.2523
, pp. 29-45
-
-
Agrawal, D.1
Archambeault, B.2
Rao, J.R.3
Rohatgi, P.4
-
2
-
-
0002380073
-
-
Proceedings of the Second Usenix Workshop on Electronic Commerce November
-
Anderson, R., Kuhn, M.: Tamper Resistance-a Cautionary Note. In: Proceedings of the Second Usenix Workshop on Electronic Commerce, pp. 1-11 (November 1996)
-
(1996)
Tamper Resistance-a Cautionary Note
, pp. 1-11
-
-
Anderson, R.1
Kuhn, M.2
-
3
-
-
0000694402
-
Low cost attacks on tamper resistant devices
-
Lomas, M. (ed.) Springer, Heidelberg
-
Anderson, R., Kuhn, M.: Low cost attacks on tamper resistant devices. In: Lomas, M. (ed.) Security Protocols 1996. LNCS, vol. 1189. Springer, Heidelberg (1997)
-
(1997)
Security Protocols 1996. LNCS
, vol.1189
-
-
Anderson, R.1
Kuhn, M.2
-
4
-
-
79251578513
-
On the (im)possibility of obfuscating programs
-
Kilian, J. (ed.) Springer, Heidelberg
-
Barak, B., Goldreich, O., Impagliazzo, R., Rudich, S., Sahai, A., Vadhan, S.P., Yang, K.: On the (im)possibility of obfuscating programs. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 1-18. Springer, Heidelberg (2001)
-
(2001)
CRYPTO 2001. LNCS
, vol.2139
, pp. 1-18
-
-
Barak, B.1
Goldreich, O.2
Impagliazzo, R.3
Rudich, S.4
Sahai, A.5
Vadhan, S.P.6
Yang, K.7
-
5
-
-
84958641478
-
Differential fault analysis of secret key cryptosystems
-
Kaliski Jr., B.S. (ed.) Springer, Heidelberg
-
Biham, E., Shamir, A.: Differential fault analysis of secret key cryptosystems. In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 513-525. Springer, Heidelberg (1997)
-
(1997)
CRYPTO 1997. LNCS
, vol.1294
, pp. 513-525
-
-
Biham, E.1
Shamir, A.2
-
6
-
-
35248899532
-
Template attacks
-
Kaliski Jr., B.S., Koç, Ç.K., Paar, C. (eds.) Springer, Heidelberg
-
Chari, S., Rao, J.R., Rohatgi, P.: Template attacks. In: Kaliski Jr., B.S., Koç, Ç.K., Paar, C. (eds.) CHES 2002. LNCS, vol. 2523, pp. 13-28. Springer, Heidelberg (2003)
-
(2003)
CHES 2002. LNCS
, vol.2523
, pp. 13-28
-
-
Chari, S.1
Rao, J.R.2
Rohatgi, P.3
-
8
-
-
35048896529
-
Algorithmic tamper-proof (atp) security: Theoretical foundations for security against hardware tampering
-
Naor, M. (ed.) Springer, Heidelberg
-
Gennaro, R., Lysyanskaya, A., Malkin, T., Micali, S., Rabin, T.: Algorithmic tamper-proof (atp) security: Theoretical foundations for security against hardware tampering. In: Naor, M. (ed.) TCC 2004. LNCS, vol. 2951, pp. 258-277. Springer, Heidelberg (2004)
-
(2004)
TCC 2004. LNCS
, vol.2951
, pp. 258-277
-
-
Gennaro, R.1
Lysyanskaya, A.2
Malkin, T.3
Micali, S.4
Rabin, T.5
-
9
-
-
33746066725
-
Private circuits ii: Keeping secrets in tamperable circuits
-
Vaudenay, S. (ed.) Springer, Heidelberg
-
Ishai, Y., Prabhakaran, M., Sahai, A., Wagner, D.: Private circuits ii: Keeping secrets in tamperable circuits. In: Vaudenay, S. (ed.) EUROCRYPT 2006. LNCS, vol. 4004, pp. 308-327. Springer, Heidelberg (2006)
-
(2006)
EUROCRYPT 2006. LNCS
, vol.4004
, pp. 308-327
-
-
Ishai, Y.1
Prabhakaran, M.2
Sahai, A.3
Wagner, D.4
-
10
-
-
35248830337
-
Private circuits: Securing hardware against probing attacks
-
Boneh, D. (ed.) Springer, Heidelberg
-
Ishai, Y., Sahai, A., Wagner, D.: Private circuits: Securing hardware against probing attacks. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol. 2729, pp. 463-481. Springer, Heidelberg (2003)
-
(2003)
CRYPTO 2003. LNCS
, vol.2729
, pp. 463-481
-
-
Ishai, Y.1
Sahai, A.2
Wagner, D.3
-
11
-
-
84939573910
-
Differential power analysis
-
Wiener, M. J. (ed.) Springer, Heidelberg
-
Kocher, P.C., Jaffe, J., Jun, B.: Differential power analysis. In: Wiener, M. J. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 388-397. Springer, Heidelberg (1999)
-
(1999)
CRYPTO 1999. LNCS
, vol.1666
, pp. 388-397
-
-
Kocher, P.C.1
Jaffe, J.2
Jun, B.3
-
12
-
-
84943632039
-
Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems
-
Koblitz, N. (ed.) Springer, Heidelberg
-
Kocher, P.C.: Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems. In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol. 1109, pp. 104-113. Springer, Heidelberg (1996)
-
(1996)
CRYPTO 1996. LNCS
, vol.1109
, pp. 104-113
-
-
Kocher, P.C.1
-
13
-
-
35048852134
-
Physically observable cryptography
-
Naor, M. (ed.) Springer, Heidelberg
-
Micali, S., Reyzin, L.: Physically observable cryptography. In: Naor, M. (ed.) TCC 2004. LNCS, vol. 2951, pp. 278-296. Springer, Heidelberg (2004)
-
(2004)
TCC 2004. LNCS
, vol.2951
, pp. 278-296
-
-
Micali, S.1
Reyzin, L.2
-
14
-
-
35248813476
-
Optical fault induction attacks
-
Kaliski Jr., B.S., Koç, Ç.K., Paar, C. (eds.) Springer, Heidelberg
-
Skorobogatov, S.P., Anderson, R.J.: Optical fault induction attacks. In: Kaliski Jr., B.S., Koç, Ç.K., Paar, C. (eds.) CHES 2002. LNCS, vol. 2523, pp. 2-12. Springer, Heidelberg (2003)
-
(2003)
CHES 2002. LNCS
, vol.2523
, pp. 2-12
-
-
Skorobogatov, S.P.1
Anderson, R.J.2
|