-
1
-
-
24744441044
-
Correlation power analysis with a leakage model
-
Joye, M., Quisquater, J.-J. eds., Springer, Heidelberg
-
Brier, E., Clavier, C., Benoit, O.: Correlation power analysis with a leakage model. In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, vol. 3156, pp. 135-152. Springer, Heidelberg (2004)
-
(2004)
CHES 2004. LNCS
, vol.3156
, pp. 135-152
-
-
Brier, E.1
Clavier, C.2
Benoit, O.3
-
2
-
-
68549099548
-
Differential power analysis in the presence of hardware countermeasures
-
Koç, Ç. K., Paar, C. eds., Springer, Heidelberg
-
Clavier, C., Coron, J.-S., Dabbous, N.: Differential power analysis in the presence of hardware countermeasures. In: Koç, Ç. K., Paar, C. (eds.) CHES 2000. LNCS, vol. 1965, pp. 252-263. Springer, Heidelberg (2000)
-
(2000)
CHES 2000. LNCS
, vol.1965
, pp. 252-263
-
-
Clavier, C.1
Coron, J.-S.2
Dabbous, N.3
-
3
-
-
70350589242
-
An efficient method for random delay generation in embedded software
-
Clavier, C., Gaj, K. eds., Springer, Heidelberg
-
Coron, J.-S., Kizhvatov, I.: An efficient method for random delay generation in embedded software. In: Clavier, C., Gaj, K. (eds.) CHES 2009. LNCS, vol. 5747, pp. 156-170. Springer, Heidelberg (2009)
-
(2009)
CHES 2009. LNCS
, vol.5747
, pp. 156-170
-
-
Coron, J.-S.1
Kizhvatov, I.2
-
4
-
-
77951292810
-
A high-resolution phase-based waveform matching and its application to side-channel attacks
-
Homma, N., Nagashima, S., Sugawara, T., Aoki, T., Satoh, A.: A high-resolution phase-based waveform matching and its application to side-channel attacks. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. E91-A (1), 193-202 (2008)
-
(2008)
IEICE Trans. Fundam. Electron. Commun. Comput. Sci.
, vol.E91-A
, Issue.1
, pp. 193-202
-
-
Homma, N.1
Nagashima, S.2
Sugawara, T.3
Aoki, T.4
Satoh, A.5
-
5
-
-
35048819488
-
Hardware countermeasures against DPA - A statistical analysis of their effectiveness
-
Okamoto, T. ed., Springer, Heidelberg
-
Mangard, S.: Hardware countermeasures against DPA - a statistical analysis of their effectiveness. In: Okamoto, T. (ed.) CT-RSA 2004. LNCS, vol. 2964, pp. 222-235. Springer, Heidelberg (2004)
-
(2004)
CT-RSA 2004. LNCS
, vol.2964
, pp. 222-235
-
-
Mangard, S.1
-
6
-
-
84890863577
-
-
Springer, Heidelberg
-
Mangard, S., Oswald, E., Popp, T.: Power Analysis Attacks: Revealing the Secrets of Smart Cards. Springer, Heidelberg (2007)
-
(2007)
Power Analysis Attacks: Revealing the Secrets of Smart Cards
-
-
Mangard, S.1
Oswald, E.2
Popp, T.3
-
8
-
-
37149030674
-
Efficient use of random delays in embedded software
-
Sauveron, D., Markantonakis, K., Bilas, A., Quisquater, J.-J. eds., Springer, Heidelberg
-
Tunstall, M., Benoit, O.: Efficient use of random delays in embedded software. In: Sauveron, D., Markantonakis, K., Bilas, A., Quisquater, J.-J. (eds.) WISTP 2007. LNCS, vol. 4462, pp. 27-38. Springer, Heidelberg (2007)
-
(2007)
WISTP 2007. LNCS
, vol.4462
, pp. 27-38
-
-
Tunstall, M.1
Benoit, O.2
|