-
1
-
-
35048818034
-
Correlation Power Analysis with a Leakage Model
-
Joye, M., Quisquater, J.-J. (eds.) CHES 2004. Springer, Heidelberg
-
Brier, É., Clavier, C., Olivier, F.: Correlation Power Analysis with a Leakage Model. In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, vol. 3156, pp. 16-29. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3156
, pp. 16-29
-
-
Brier, É.1
Clavier, C.2
Olivier, F.3
-
2
-
-
68549099548
-
Differential power analysis in the presence of hardware countermeasures
-
Paar, C., Koç, Ç.K. (eds.) CHES 2000. Springer, Heidelberg
-
Clavier, C., Coron, J.-S., Dabbous, N.: Differential power analysis in the presence of hardware countermeasures. In: Paar, C., Koç, Ç.K. (eds.) CHES 2000. LNCS, vol. 1965, pp. 252-263. Springer, Heidelberg (2000)
-
(2000)
LNCS
, vol.1965
, pp. 252-263
-
-
Clavier, C.1
Coron, J.-S.2
Dabbous, N.3
-
3
-
-
78049335572
-
Analysis and improvement of the random delay counter-measure of CHES 2009
-
Mangard, S., Standaert, F.-X. (eds.) CHES 2010. Springer, Heidelberg
-
Coron, J.-S., Kizhvatov, I.: Analysis and improvement of the random delay counter-measure of CHES 2009. In: Mangard, S., Standaert, F.-X. (eds.) CHES 2010. LNCS, vol. 6225, pp. 95-109. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.6225
, pp. 95-109
-
-
Coron, J.-S.1
Kizhvatov, I.2
-
4
-
-
20744449792
-
The design and implementation of FFTW3
-
Frigo, M., Johnson, S.G.: The design and implementation of FFTW3. Proceedings of the IEEE 93(2), 216-231 (2005)
-
(2005)
Proceedings of the IEEE
, vol.93
, Issue.2
, pp. 216-231
-
-
Frigo, M.1
Johnson, S.G.2
-
5
-
-
27244449350
-
EM Analysis of Rijndael and ECC on a Wireless Java-Based PDA
-
Rao, J.R., Sunar, B. (eds.) CHES 2005. Springer, Heidelberg
-
Gebotys, C.H., Ho, S., Tiu, C.C.: EM Analysis of Rijndael and ECC on a Wireless Java-Based PDA. In: Rao, J.R., Sunar, B. (eds.) CHES 2005. LNCS, vol. 3659, pp. 250-264. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3659
, pp. 250-264
-
-
Gebotys, C.H.1
Ho, S.2
Tiu, C.C.3
-
6
-
-
33750688161
-
High-resolution sidechannel attack using phase-based waveform matching
-
Goubin, L., Matsui, M. (eds.) CHES 2006. Springer, Heidelberg
-
Homma, N., Nagashima, S., Imai, Y., Aoki, T., Satoh, A.: High-resolution sidechannel attack using phase-based waveform matching. In: Goubin, L., Matsui, M. (eds.) CHES 2006. LNCS, vol. 4249, pp. 187-200. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4249
, pp. 187-200
-
-
Homma, N.1
Nagashima, S.2
Imai, Y.3
Aoki, T.4
Satoh, A.5
-
7
-
-
77951292810
-
A High-Resolution Phase-Based Waveform Matching and Its Application to Side-Channel Attacks
-
Homma, N., Nagashima, S., Sugawara, T., Aoki, T., Satoh, A.: A High-Resolution Phase-Based Waveform Matching and Its Application to Side-Channel Attacks. IEICE Transactions 91-A(1), 193-202 (2008)
-
(2008)
IEICE Transactions
, vol.91 A
, Issue.1
, pp. 193-202
-
-
Homma, N.1
Nagashima, S.2
Sugawara, T.3
Aoki, T.4
Satoh, A.5
-
8
-
-
70349665363
-
Deconvolving Protected Signals
-
IEEE Computer Society Press, Fukuoka
-
Kafi, M., Guilley, S., Marcello, S., Naccache, D.: Deconvolving Protected Signals. In: ARES/CISIS, March 16-19, pp. 687-694. IEEE Computer Society Press, Fukuoka (2009)
-
(2009)
ARES/CISIS, March 16-19
, pp. 687-694
-
-
Kafi, M.1
Guilley, S.2
Marcello, S.3
Naccache, D.4
-
9
-
-
76649098851
-
EM Side-Channel Attacks on Commercial Contactless Smartcards Using Low-Cost Equipment
-
Youm, H.Y., Yung, M. (eds.) WISA 2009. Springer, Heidelberg
-
Kasper, T., Oswald, D., Paar, C.: EM Side-Channel Attacks on Commercial Contactless Smartcards Using Low-Cost Equipment. In: Youm, H.Y., Yung, M. (eds.) WISA 2009. LNCS, vol. 5932, pp. 79-93. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5932
, pp. 79-93
-
-
Kasper, T.1
Oswald, D.2
Paar, C.3
-
10
-
-
34247278256
-
Power Attacks on Secure Hardware Based on Early Propagation of Data
-
IEEE Computer Society, Los Alamitos
-
Kulikowski, K.J., Karpovsky,M.G., Taubin, A.: Power Attacks on Secure Hardware Based on Early Propagation of Data. In: IOLTS Como, Italy, pp. 131-138. IEEE Computer Society, Los Alamitos (2006)
-
(2006)
IOLTS Como, Italy
, pp. 131-138
-
-
Kulikowski, K.J.1
Karpovsky, M.G.2
Taubin, A.3
-
11
-
-
33750688820
-
A Proposition for Correlation Power Analysis Enhancement
-
Goubin, L., Matsui, M. (eds.) CHES 2006. Springer, Heidelberg
-
Le, T.-H., Clédière, J., Canovas, C., Robisson, B., Servière, C., Lacoume, J.-L.: A Proposition for Correlation Power Analysis Enhancement. In: Goubin, L., Matsui, M. (eds.) CHES 2006. LNCS, vol. 4249, pp. 174-186. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4249
, pp. 174-186
-
-
Clédière, J.1
Canovas, C.2
Robisson, B.3
Servière, C.4
Lacoume, J.-L.5
-
12
-
-
35048819488
-
Hardware countermeasures against DPA - A statistical analysis of their effectiveness
-
Okamoto, T. (ed.) CT-RSA 2004. Springer, Heidelberg
-
Mangard, S.: Hardware countermeasures against DPA - A statistical analysis of their effectiveness. In: Okamoto, T. (ed.) CT-RSA 2004. LNCS, vol. 2964, pp. 222-235. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.2964
, pp. 222-235
-
-
Mangard, S.1
-
13
-
-
84890863577
-
-
Springer, Heidelberg
-
Mangard, S., Oswald, E., Popp, T.: Power Analysis Attacks: Revealing the Secrets of Smart Cards. Springer, Heidelberg (2006), http://www.dpabook.org/ ISBN0-387-30857-1
-
(2006)
Power Analysis Attacks: Revealing the Secrets of Smart Cards
-
-
Mangard, S.1
Oswald, E.2
Popp, T.3
-
14
-
-
78650088307
-
A new correlation frequency analysis of the side channel
-
ACM, New York
-
Mateos, E., Gebotys, C.H.: A new correlation frequency analysis of the side channel. In: Proceedings of the 5th Workshop on Embedded Systems Security, WESS 2010, pp. 4:1-4:8. ACM, New York (2010)
-
(2010)
Proceedings of the 5th Workshop on Embedded Systems Security, WESS 2010
-
-
Mateos, E.1
Gebotys, C.H.2
-
15
-
-
34548823012
-
DPA Using Phase-Based Waveform Matching against Random-Delay Countermeasure
-
IEEE Computer Society, Los Alamitos doi:10.1109/ISCAS.2007.378024
-
Nagashima, S., Homma, N., Imai, Y., Aoki, T., Satoh, A.: DPA Using Phase-Based Waveform Matching against Random-Delay Countermeasure. In: ISCAS, May 27-20, pp. 1807-1810. IEEE Computer Society, Los Alamitos (2007), doi:10.1109/ISCAS.2007.378024
-
(2007)
ISCAS, May 27-20
, pp. 1807-1810
-
-
Nagashima, S.1
Homma, N.2
Imai, Y.3
Aoki, T.4
Satoh, A.5
-
16
-
-
49749140694
-
Defeating classical Hardware Countermeasures: A new processing for Side Channel Analysis
-
IEEE Computer Society, Los Alamitos
-
Réal, D., Canovas, C., Clédière, J., Drissi, M., Valette, F.: Defeating classical Hardware Countermeasures: a new processing for Side Channel Analysis. In: DATE, Munich, Germany, March 10-14, pp. 1274-1279. IEEE Computer Society, Los Alamitos (2008)
-
(2008)
DATE, Munich, Germany, March 10-14
, pp. 1274-1279
-
-
Réal, D.1
Canovas, C.2
Clédière, J.3
Drissi, M.4
Valette, F.5
-
17
-
-
70350578892
-
Higher-order masking and shuffling for software implementations of block ciphers
-
Clavier, C., Gaj, K. (eds.) CHES 2009. Springer, Heidelberg
-
Rivain, M., Prouff, E., Doget, J.: Higher-order masking and shuffling for software implementations of block ciphers. In: Clavier, C., Gaj, K. (eds.) CHES 2009. LNCS, vol. 5747, pp. 171-188. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5747
, pp. 171-188
-
-
Rivain, M.1
Prouff, E.2
Doget, J.3
-
18
-
-
67650694228
-
A unified framework for the analysis of side-channel key recovery attacks
-
Joux, A. (ed.) EUROCRYPT 2009. Springer, Heidelberg
-
Standaert, F.-X., Malkin, T.G., Yung, M.: A unified framework for the analysis of side-channel key recovery attacks. In: Joux, A. (ed.) EUROCRYPT 2009. LNCS, vol. 5479, pp. 443-461. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5479
, pp. 443-461
-
-
Standaert, F.-X.1
Malkin, T.G.2
Yung, M.3
-
19
-
-
37149055946
-
Security evaluation of DPA countermeasures using dualrail pre-charge logic style
-
Goubin, L., Matsui, M. (eds.) CHES 2006. Springer, Heidelberg
-
Suzuki, D., Saeki, M.: Security evaluation of DPA countermeasures using dualrail pre-charge logic style. In: Goubin, L., Matsui, M. (eds.) CHES 2006. LNCS, vol. 4249, pp. 255-269. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4249
, pp. 255-269
-
-
Suzuki, D.1
Saeki, M.2
-
20
-
-
77950477941
-
-
TELECOM ParisTech SEN research group 1st. edn.
-
TELECOM ParisTech SEN research group. DPA Contest, 1st. edn. (2008-2009), http://www.DPAcontest.org/
-
(2008)
DPA Contest
-
-
-
21
-
-
37149030674
-
Efficient Use of Random Delays in Embedded Software
-
Sauveron, D., Markantonakis, K., Bilas, A., Quisquater, J.-J. (eds.) WISTP 2007. Springer, Heidelberg
-
Tunstall, M., Benoit, O.: Efficient Use of Random Delays in Embedded Software. In: Sauveron, D., Markantonakis, K., Bilas, A., Quisquater, J.-J. (eds.) WISTP 2007. LNCS, vol. 4462, pp. 27-38. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4462
, pp. 27-38
-
-
Tunstall, M.1
Benoit, O.2
|