-
1
-
-
35248817849
-
-
The EM Side-Channel(s) Springer
-
Agrawal, D., Archambeault, B., Rao, J. R. and Rohatgi, P. The EM Side-Channel(s), Cryptographic Hardware and Embedded Systems - CHES 2002, Lecture Notes in Computer Science, Springer, 2003 pp. 29-45.
-
(2003)
Cryptographic Hardware and Embedded Systems - CHES 2002, Lecture Notes in Computer Science
, pp. 29-45
-
-
Agrawal, D.1
Archambeault, B.2
Rao, J.R.3
Rohatgi, P.4
-
2
-
-
84937438279
-
Power analysis, what is now possible
-
Proceedings of the 6th international Conference on the theory and Application of Cryptology and information Security: Advances in Cryptology (December 03 - 07, 2000). Okamoto, T. Ed. SpringerVerlag, London
-
Akkar, M., Bevan, R., Dischamp, P., and Moyart, D. Power Analysis, What Is Now Possible. In Proceedings of the 6th international Conference on the theory and Application of Cryptology and information Security: Advances in Cryptology (December 03 - 07, 2000). Okamoto, T. Ed. Lecture Notes In Computer Science, vol. 1976. SpringerVerlag, London, 489-502.
-
Lecture Notes in Computer Science
, vol.1976
, pp. 489-502
-
-
Akkar, M.1
Bevan, R.2
Dischamp, P.3
Moyart, D.4
-
3
-
-
35048818034
-
Correlation power analysis with a leakage model
-
6th International Workshop, (Cambridge, MA, USA) Springer-Verlag
-
Brier, E., Clavier, C., Olivier, F. Correlation power analysis with a leakage model. In Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2004. 6th International Workshop, (Cambridge, MA, USA, 2004), Springer-Verlag, 16-29.
-
(2004)
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2004
, pp. 16-29
-
-
Brier, E.1
Clavier, C.2
Olivier, F.3
-
4
-
-
78650164737
-
-
May 27 Retrieved from
-
DPA Contest: May 27, 2010. Retrieved from: http://www.dpacontest.org/v2/
-
(2010)
-
-
-
6
-
-
35248862449
-
Electromagnetic analysis: Concrete results
-
May 14-16
-
Gandolfi, K., Mourtel, C., and Olivier, F., Electromagnetic Analysis: Concrete Results, Proceedings of the Third International Workshop on Cryptographic Hardware and Embedded Systems, p.251-261, May 14-16, 2001.
-
(2001)
Proceedings of the Third International Workshop on Cryptographic Hardware and Embedded Systems
, pp. 251-261
-
-
Gandolfi, K.1
Mourtel, C.2
Olivier, F.3
-
7
-
-
27244449350
-
EM analysis of rijndael and ECC on a wireless java-based PDA
-
Springer Berlin / Heidelberg
-
Gebotys C.H., Ho, S., and Tiu C.C. EM Analysis of Rijndael and ECC on a Wireless Java-Based PDA. Cryptographic Hardware and Embedded Systems - CHES 2005, Springer Berlin / Heidelberg, 2005, 250-264.
-
(2005)
Cryptographic Hardware and Embedded Systems - CHES 2005
, pp. 250-264
-
-
Gebotys, C.H.1
Ho, S.2
Tiu, C.C.3
-
8
-
-
84943632039
-
Timing attacks on implementations of diffie-hellman, RSA, DSS, and other systems
-
Springer-Verlag
-
Kocher, P. Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems. Advances in Cryptology-CRYPTO'96, Springer-Verlag, 1996, pp 104-113.
-
(1996)
Advances in Cryptology-CRYPTO'96
, pp. 104-113
-
-
Kocher, P.1
-
9
-
-
84939573910
-
Differential power analysis
-
Springer-Verlag
-
Kocher, P. Jaffe, J.and Jun B. Differential Power Analysis, Proceedings of Advances in Cryptology-CRYPTO'99, Springer-Verlag, 1999, pp. 388-397.
-
(1999)
Proceedings of Advances in Cryptology-CRYPTO'99
, pp. 388-397
-
-
Kocher, P.1
Jaffe, J.2
Jun, B.3
-
10
-
-
84890863577
-
-
Springer, New York, N.Y.
-
Mangard, S., Oswald, E. and Popp, T. Power analysis attacks: revealing the secrets of smart cards. Springer, New York, N.Y. 2007.
-
(2007)
Power Analysis Attacks: Revealing the Secrets of Smart Cards
-
-
Mangard, S.1
Oswald, E.2
Popp, T.3
-
11
-
-
78650146494
-
-
Retrieved from April 2010
-
Mangard, S., Oswald, E. and Popp, T., Matlab Workspace3, 2010, Retrieved from: DPA Book, April 2010, http://www.dpabook.org/onlinematerial/matlabscripts/ index.htm.
-
(2010)
Matlab Workspace3
-
-
Mangard, S.1
Oswald, E.2
Popp, T.3
-
12
-
-
78650238574
-
ElectroMagnetic analysis (EMA): Measures and counter-measures for smart cards
-
September 19-21
-
Quisquater, J., and Samyde, D. ElectroMagnetic Analysis (EMA): Measures and Counter-Measures for Smart Cards, Proceedings of the International Conference on Research in Smart Cards: Smart Card Programming and Security, p.200-210, September 19-21, 2001.
-
(2001)
Proceedings of the International Conference on Research in Smart Cards: Smart Card Programming and Security
, pp. 200-210
-
-
Quisquater, J.1
Samyde, D.2
-
13
-
-
78650107346
-
Side-channel attacks
-
H. Bidgoli (Ed) Hoboken, NJ, John Wiley and Sons
-
Rohatgi, P. Side-Channel Attacks, In H. Bidgoli (Ed), Handbook of information security: Treats, vulnerabilities, prevention, detection and management, volume 3, Hoboken, NJ, John Wiley and Sons, (2006) pp. 241-259.
-
(2006)
Handbook of Information Security: Treats, Vulnerabilities, Prevention, Detection and Management
, vol.3
, pp. 241-259
-
-
Rohatgi, P.1
-
14
-
-
78650146955
-
Correlation power analysis in frequency domain
-
Schimmel, O., Duplys, P., Boehl, E., Hayek, J., Bosch, R and Rosenstiel, W. Correlation power analysis in frequency domain. In COSADE 2010 - First International Workshop on Constructive Side-Channel Analysis and Secure Design, 2010.
-
(2010)
COSADE 2010 - First International Workshop on Constructive Side-Channel Analysis and Secure Design
-
-
Schimmel, O.1
Duplys, P.2
Boehl, E.3
Hayek, J.4
Bosch, R.5
Rosenstiel, W.6
-
15
-
-
84870532103
-
-
Retrieved from
-
Side-channel Attack Standard Evaluation Board (SASEBO), 2010, Retrieved from: Research Center for Information Security: http://www.rcis.aist.go.jp/ special/SASEBO/SASEBO-GII-en.html.
-
(2010)
Side-Channel Attack Standard Evaluation Board (SASEBO)
-
-
-
16
-
-
67650694228
-
A unified framework for the analysis of side-channel key recovery attacks
-
Retrieved from: the
-
Standaert, F.-X., Malkin, T.G. and Yung, M. A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks. In proceedings of Eurocrypt 2009, Lecture Notes in Computer Science, 2009, pp 443-461. Retrieved from: the Cryptology ePrint archive http://eprint.iacr.org/2006/139.
-
(2009)
Proceedings of Eurocrypt 2009, Lecture Notes in Computer Science
, pp. 443-461
-
-
Standaert, F.-X.1
Malkin, T.G.2
Yung, M.3
-
18
-
-
77952784883
-
EM frequency domain correlation analysis on cipher chips
-
(December 26 - 28) ICISE. IEEE Computer Society, Washington, DC DOI= http://dx.doi.org/10.1109/ICISE.2009.542
-
Zhang, P., Deng, G., Zhao, Q., and Chen, K. EM Frequency Domain Correlation Analysis on Cipher Chips. In Proceedings of the 2009 First IEEE international Conference on information Science and Engineering (December 26 - 28, 2009). ICISE. IEEE Computer Society, Washington, DC, 1729-1732. DOI= http://dx.doi.org/10.1109/ICISE.2009.542.
-
(2009)
Proceedings of the 2009 First IEEE International Conference on Information Science and Engineering
, pp. 1729-1732
-
-
Zhang, P.1
Deng, G.2
Zhao, Q.3
Chen, K.4
|