-
1
-
-
0003508558
-
-
Available Accessed on 02 March 2010
-
Advanced Encryption Standard, Wikipedia, Available: http://en.wikipedia. org/wiki/Advanced-Encryption-Standard, Accessed on 02 March 2010.
-
Advanced Encryption Standard
-
-
-
4
-
-
84943632039
-
Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems
-
Advances in Cryptology - CRYPTO '96
-
th Annual International Cryptology Conference on Advances in Cryptology (CRYPTO 1996), p 104-113, Springer-Verlag London, UK, 1996. (Pubitemid 126106234)
-
(1996)
LECTURE NOTES IN COMPUTER SCIENCE
, Issue.1109
, pp. 104-113
-
-
Kocher, P.C.1
-
5
-
-
85032541897
-
Remote timing attacks are practical
-
August
-
D. Brumley and D. Boneh. Remote Timing Attacks are Practical, in USENIX, August 2003.
-
(2003)
USENIX
-
-
Brumley, D.1
Boneh, D.2
-
6
-
-
78650238574
-
ElectroMagnetic Analysis (EMA): Measures and Counter-Measures for Smart Cards
-
Smart Card Programming and Security
-
J.-J. Quisquater and D. Samyde. Electromagnetic Analysis (EMA): Measures and counter-measures for smart cards. In E-smart, pages 200-210, 2001. (Pubitemid 33340056)
-
(2001)
LECTURE NOTES IN COMPUTER SCIENCE
, Issue.2140
, pp. 200-210
-
-
Quisquater, J.-J.1
Samyde, D.2
-
7
-
-
35248892041
-
A simple power-analysis (SPA) attack on implementations of the AES key expansion
-
S. Mangard. A Simple Power-Analysis (SPA) Attack on Implementations of the AES Key Expansion. In ICISC 2002, volume 2587, pages 343-358.
-
ICISC 2002
, vol.2587
, pp. 343-358
-
-
Mangard, S.1
-
8
-
-
33745640963
-
Cache attacks an countermeasures: The case of AES
-
December
-
Dag Arne Osvik Adi Shamir and Eran Tromer Cache attacks an countermeasures: The Case of AES, Lecture Notes in Computer Science, Volume 3860/2006, pages 1-20 December 2005
-
(2005)
Lecture Notes in Computer Science
, vol.3860
, pp. 1-20
-
-
Osvik, D.A.1
Shamir, A.2
Tromer, E.3
-
10
-
-
84958769993
-
Side Channel Cryptanalysis of Product Ciphers
-
Computer Security - ESORICS 98
-
th European Symposium on Research in Computer Security. Lecture Notes in Computer Science, vol. 1485 (Springer, Berlin, 1998), pp. 97-110. (Pubitemid 128135767)
-
(1998)
LECTURE NOTES IN COMPUTER SCIENCE
, Issue.1485
, pp. 97-110
-
-
Kelsey, J.1
Schneier, B.2
Wagner, D.3
Hall, C.4
-
13
-
-
24744459871
-
AES power attack based on induced cache miss and countermeasure
-
Proceedings ITCC 2005 - International Conference on Information Technology: Coding and Computing
-
G. Bertoni, V. Zaccaria, L. Breveglieri, M. Monchiero, G. Palermo, AES power attack based on induced cache miss and countermeasure, in Proc. International Conference on Information Technology: Coding and Computing (ITCC'05) (IEEE, New York, 2005), pp. 586-591 (Pubitemid 41290159)
-
(2005)
International Conference on Information Technology: Coding and Computing, ITCC
, vol.1
, pp. 586-591
-
-
Bertoni, G.1
Zaccaria, V.2
Breveglieri, L.3
Monchiero, M.4
Palermo, G.5
-
14
-
-
84896824646
-
Collision attacks on processors with cache and countermeasures
-
Western European Workshop on Research in Cryptology (WEWoRC) 2005 Available
-
C. Lauradoux, Collision attacks on processors with cache and countermeasures, in Western European Workshop on Research in Cryptology (WEWoRC) 2005. Lectures Notes in Informatics, vol. P-74 (2005), pp. 76-85. Available: http://www.cosic.esat.kuleuven.ac.be/WeWorc/allAbstracts.pdf
-
(2005)
Lectures Notes in Informatics
, vol.P-74
, pp. 76-85
-
-
Lauradoux, C.1
-
15
-
-
79960321311
-
Trace driven cache attack on AES (short paper)
-
Proc. International Conference on Information and Communications Security (ICICS) 2006 Springer, Berlin
-
O. Aciiçmez, Ç.K. Koç, Trace driven cache attack on AES (short paper), in Proc. International Conference on Information and Communications Security (ICICS) 2006. Lecture Notes in Computer Science, vol. 4296 (Springer, Berlin, 2006), pp. 112-121
-
(2006)
Lecture Notes in Computer Science
, vol.4296
, pp. 112-121
-
-
Aciiçmez, O.1
Koç, Ç.K.2
-
16
-
-
35248855964
-
Cryptanalysis of DES implemented on computers with cache
-
Proc. Cryptographic Hardware and Embedded Systems (CHES) 2003 Springer, Berlin
-
Y. Tsunoo, T. Saito, T. Suzaki, M. Shigeri, H. Miyauchi, Cryptanalysis of DES implemented on computers with cache, in Proc. Cryptographic Hardware and Embedded Systems (CHES) 2003. Lecture Notes in Computer Science, vol. 2779 (Springer, Berlin, 2003), pp. 62-76
-
(2003)
Lecture Notes in Computer Science
, vol.2779
, pp. 62-76
-
-
Tsunoo, Y.1
Saito, T.2
Suzaki, T.3
Shigeri, M.4
Miyauchi, H.5
-
17
-
-
33750814106
-
Cache-collision timing attacks against AES
-
Cryptographic Hardware and Embedded Systems, CHES 2006 - 8th International Workshop, Proceedings
-
J. Bonneau, I. Mironov, Cache-collision timing attacks against AES, in Proc. Cryptographic Hardware and Embedded Systems (CHES) 2006. Lecture Notes in Computer Science, vol. 4249 (Springer, Berlin, 2006), pp. 201-215. (Pubitemid 44710731)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.4249
, pp. 201-215
-
-
Bonneau, J.1
Mironov, I.2
|