-
1
-
-
27244456338
-
Ways to enhance differential power analysis
-
Bevan, R., Knudsen, E.: Ways to enhance differential power analysis. In: Lee, P.J., Lim, C.H. (eds.) ICISC 2002. LNCS, vol. 2587, pp. 327-342. Springer, Heidelberg (2003) (Pubitemid 137629187)
-
(2003)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.2587
, pp. 327-342
-
-
Bevan, R.1
Knudsen, E.2
-
2
-
-
35048818034
-
Correlation power analysis with a leakage model
-
Joye, M., Quisquater, J.-J. (eds.), Springer, Heidelberg
-
BrieríE., Clavier, C., Olivier, F.: Correlation power analysis with a leakage model. In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, vol. 3156, pp. 16-29. Springer, Heidelberg (2004)
-
(2004)
CHES 2004. LNCS
, vol.3156
, pp. 16-29
-
-
Brieríe1
Clavier, C.2
Olivier, F.3
-
3
-
-
68549099548
-
Differential Power Analysis in the Presence of Hardware Countermeasures
-
Cryptographic Hardware and Embedded Systems - CHES 2000 Second International Workshop Worcester, MA, USA, August 17-18, 2000 Proceedings
-
Clavier, C., Coron, J.-S., Dabbous, N.: Differential power analysis in the presence of hardware countermeasures. In: Paar, C., Ko̧c, Ç .K. (eds.) CHES 2000. LNCS, vol. 1965, pp. 252-263. Springer, Heidelberg (2000) (Pubitemid 33213973)
-
(2000)
Lecture Notes in Computer Science
, Issue.1965
, pp. 252-263
-
-
Clavier, C.1
Coron, J.-S.2
Dabbous, N.3
-
4
-
-
0004116989
-
-
The MIT Press, Cambridge
-
Cormen, T., Leiserson, C., Rivest, R.: Introduction to Algorithms. The MIT Press, Cambridge (1990)
-
(1990)
Introduction to Algorithms
-
-
Cormen, T.1
Leiserson, C.2
Rivest, R.3
-
5
-
-
24044554454
-
Statistics and secret leakage
-
Coron, J.-S., Naccache, D., Kocher, P.C.: Statistics and secret leakage. ACM Trans. Embedded Comput. Syst. 3(3), 492-508 (2004)
-
(2004)
ACM Trans. Embedded Comput. Syst.
, vol.3
, Issue.3
, pp. 492-508
-
-
Coron, J.-S.1
Naccache, D.2
Kocher, P.C.3
-
6
-
-
0035271038
-
Euclidean distance as a similarity metric for principal component analysis
-
Elmore, K.L., Richman, M.B.: Euclidean distance as a similarity metric for principle component analysis. American Meteorological Society 129(3), 540-549 (2001) (Pubitemid 32418374)
-
(2001)
Monthly Weather Review
, vol.129
, Issue.3
, pp. 540-549
-
-
Elmore, K.L.1
Richman, M.B.2
-
7
-
-
51049117070
-
Mutual information analysis
-
Oswald, E., Rohatgi, P. (eds.), Springer, Heidelberg
-
Gierlichs, B., Batina, L., Tuyls, P., Preneel, B.: Mutual information analysis. In: Oswald, E., Rohatgi, P. (eds.) CHES 2008. LNCS, vol. 5154, pp. 426-442. Springer, Heidelberg (2008)
-
(2008)
CHES 2008. LNCS
, vol.5154
, pp. 426-442
-
-
Gierlichs, B.1
Batina, L.2
Tuyls, P.3
Preneel, B.4
-
8
-
-
84943632039
-
Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems
-
Advances in Cryptology - CRYPTO '96
-
Kocher, P.C.: Timing attacks on implementations of diffie-hellman, rsa, dss, and other systems. In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol. 1109, pp. 104-113. Springer, Heidelberg (1996) (Pubitemid 126106234)
-
(1996)
Lecture Notes in Computer Science
, Issue.1109
, pp. 104-113
-
-
Kocher, P.C.1
-
9
-
-
84939573910
-
Differential power analysis
-
Wiener, M. (ed.), Springer, Heidelberg
-
Kocher, P.C., Jaffe, J., Jun, B.: Differential power analysis. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 388-397. Springer, Heidelberg (1999)
-
(1999)
CRYPTO 1999. LNCS
, vol.1666
, pp. 388-397
-
-
Kocher, P.C.1
Jaffe, J.2
Jun, B.3
-
10
-
-
35048819488
-
Hardware countermeasures against dpa - A statistical analysis of their effectiveness
-
Okamoto, T. (ed.), Springer, Heidelberg
-
Mangard, S.: Hardware countermeasures against dpa - a statistical analysis of their effectiveness. In: Okamoto, T. (ed.) CT-RSA 2004. LNCS, vol. 2964, pp. 222-235. Springer, Heidelberg (2004)
-
(2004)
CT-RSA 2004. LNCS
, vol.2964
, pp. 222-235
-
-
Mangard, S.1
-
11
-
-
84890863577
-
Power analysis attacks: Revealing the secrets of smart cards
-
Springer, Heidelberg
-
Mangard, S., Oswald, E., Popp, T.: Power Analysis Attacks: Revealing the Secrets of Smart Cards. In: Advances in Information Security. Springer, Heidelberg (2007)
-
(2007)
Advances in Information Security
-
-
Mangard, S.1
Oswald, E.2
Popp, T.3
-
12
-
-
0036566408
-
Examining smart-card security under the threat of power analysis attacks
-
DOI 10.1109/TC.2002.1004593
-
Messerges, T.S., Dabbish, E.A., Sloan, R.H.: Examining smart-card security under the threat of power analysis attacks. IEEE Trans. Computers 51(5), 541-552 (2002) (Pubitemid 34550462)
-
(2002)
IEEE Transactions on Computers
, vol.51
, Issue.5
, pp. 541-552
-
-
Messerges, T.S.1
Dabbish, E.A.2
Sloan, R.H.3
-
14
-
-
48249139801
-
An operation-based metric on cpa resistance
-
Jajodia, S., Samarati, P., Cimato, S. (eds.), Springer, Boston
-
Pan, J., den Hartog, J.I., de Vink, E.P.: An operation-based metric on cpa resistance. In: Jajodia, S., Samarati, P., Cimato, S. (eds.) SEC, International Federation for Information Processing, pp. 429-443. Springer, Boston (2008)
-
(2008)
SEC, International Federation for Information Processing
, pp. 429-443
-
-
Pan, J.1
Den Hartog, J.I.2
De Vink, E.P.3
-
15
-
-
78650238574
-
ElectroMagnetic Analysis (EMA): Measures and Counter-Measures for Smart Cards
-
Smart Card Programming and Security
-
Quisquater, J.-J., Samyde, D.: Electromagnetic analysis (ema): Measures and counter-measures for smart cards. In: Attali, I., Jensen, T.P. (eds.) E-smart 2001. LNCS, vol. 2140, pp. 200-210. Springer, Heidelberg (2001) (Pubitemid 33340056)
-
(2001)
Lecture Notes in Computer Science
, Issue.2140
, pp. 200-210
-
-
Quisquater, J.-J.1
Samyde, D.2
-
16
-
-
67049146380
-
Partition vs. comparison sidechannel distinguishers: An empirical evaluation of statistical tests for univariate side-channel attacks against two unprotected cmos devices
-
Lee, P.J., Cheon, J.H. (eds.), Springer, Heidelberg
-
Standaert, F.-X., Gierlichs, B., Verbauwhede, I.: Partition vs. comparison sidechannel distinguishers: An empirical evaluation of statistical tests for univariate side-channel attacks against two unprotected cmos devices. In: Lee, P.J., Cheon, J.H. (eds.) ICISC 2008. LNCS, vol. 5461, pp. 253-267. Springer, Heidelberg (2009)
-
(2009)
ICISC 2008. LNCS
, vol.5461
, pp. 253-267
-
-
Standaert, F.-X.1
Gierlichs, B.2
Verbauwhede, I.3
-
17
-
-
67650694228
-
A unified framework for the analysis of side-channel key recovery attacks
-
Joux, A. (ed.), Springer, Heidelberg
-
Standaert, F.-X., Malkin, T., Yung, M.: A unified framework for the analysis of side-channel key recovery attacks. In: Joux, A. (ed.) EUROCRYPT 2009. LNCS, vol. 5479, pp. 443-461. Springer, Heidelberg (2009)
-
(2009)
EUROCRYPT 2009. LNCS
, vol.5479
, pp. 443-461
-
-
Standaert, F.-X.1
Malkin, T.2
Yung, M.3
|