-
1
-
-
84939573910
-
Differential power analysis
-
Santa Barbara, CA, USA, August, (LNCS, 1666)
-
Kocher, P.C., Jaffe, J., and Jun, B.: ' Differential power analysis ', Proc. CHES 1999, Santa Barbara, CA, USA, August, 1999, p. 388-397, (LNCS, 1666)
-
(1999)
Proc. CHES 1999
, pp. 388-397
-
-
Kocher, P.C.1
Jaffe, J.2
Jun, B.3
-
2
-
-
84957079591
-
Towards sound approaches to counteract power analysis attacks
-
Santa Barbara, CA, USA, August, (LNCS, 1666)
-
Chari, S., Jutla, C.S., Rao, J.R., and Rohatgi, P.: ' Towards sound approaches to counteract power analysis attacks ', Proc. CRYPTO 1999, Santa Barbara, CA, USA, August, 1999, p. 398-412, (LNCS, 1666)
-
(1999)
Proc. CRYPTO 1999
, pp. 398-412
-
-
Chari, S.1
Jutla, C.S.2
Rao, J.R.3
Rohatgi, P.4
-
3
-
-
45749097439
-
Randomised representations
-
10.1049/iet-ifs:20070017
-
Smart, N.P., Page, D., and Oswald, E.: ' Randomised representations ', IET Inf. Secur., 2008, 2, (2), p. 19-27 10.1049/iet-ifs:20070017
-
(2008)
IET Inf. Secur.
, vol.2
, Issue.2
, pp. 19-27
-
-
Smart, N.P.1
Page, D.2
Oswald, E.3
-
4
-
-
35048852134
-
Physically Observable Cryptography
-
Theory of Cryptography First Theory of Cryptography Conference, TCC 2004 Cambridge, MA, USA, February 19-21, 2004 Proceedings
-
Micali, S., and Reyzin, L.: ' Physically observable cryptography ', Proc. TCC 2004, Cambridge, MA, USA, February, 2004, p. 278-296, (LNCS, 2951) (Pubitemid 38236631)
-
(2004)
LECTURE NOTES IN COMPUTER SCIENCE
, Issue.2951
, pp. 278-296
-
-
Micali, S.1
Reyzin, L.2
-
5
-
-
67650694228
-
A unified framework for the analysis of side-channel key recovery attacks
-
Cologne, Germany, April. (LNCS, 5479)
-
Standaert, F.-X., Malkin, T.G., and Yung, M.: ' A unified framework for the analysis of side-channel key recovery attacks ', Proc. Eurocrypt 2009, Cologne, Germany, April, 2009, p. 443-461, (LNCS, 5479)
-
(2009)
Proc. Eurocrypt 2009
, pp. 443-461
-
-
Standaert, F.-X.1
Malkin, T.G.2
Yung, M.3
-
6
-
-
35048818034
-
Correlation power analysis with a leakage model
-
Boston, MA, USA, August (LNCS, 3156)
-
Brier, E., Clavier, C., and Olivier, F.: ' Correlation power analysis with a leakage model ', Proc. CHES 2004, Boston, MA, USA, August, 2004, p. 16-29, (LNCS, 3156)
-
(2004)
Proc. CHES 2004
, pp. 16-29
-
-
Brier, E.1
Clavier, C.2
Olivier, F.3
-
7
-
-
51049117070
-
Mutual information analysis
-
Washington DC, USA, August. (LNCS, 5154)
-
Gierlichs, B., Batina, L., Tuyls, P., and Preneel, B.: ' Mutual information analysis ', Proc. CHES 2008, Washington DC, USA, August, 2008, p. 426-442, (LNCS, 5154)
-
(2008)
Proc. CHES 2008
, pp. 426-442
-
-
Gierlichs, B.1
Batina, L.2
Tuyls, P.3
Preneel, B.4
-
8
-
-
78650838653
-
The world is not enough: Another look on second-order DPA
-
et al. ' ', Singapore, December. (LNCS, 6477)
-
Standaert, F.X., Veyrat-Charvillon, N., and Oswald, E.: et al. ' The world is not enough: another look on second-order DPA ', Proc. Asiacrypt 2010, Singapore, December, 2010, p. 112-129, (LNCS, 6477)
-
(2010)
Proc. Asiacrypt 2010
, pp. 112-129
-
-
Standaert, F.X.1
Veyrat-Charvillon, N.2
Oswald, E.3
-
9
-
-
27244432445
-
A stochastic model for differential side channel cryptanalysis
-
Cryptographic Hardware and Embedded Systems - CHES 2005: 7th International Workshop. Proceedings
-
Schindler, W., Lemke, K., and Paar, C.: ' A stochastic model for differential side-channel cryptanalysis ', Proc. CHES 2005, Edinburgh, Scotland, September, 2005, p. 30-46, (LNCS, 3659) (Pubitemid 41520697)
-
(2005)
Lecture Notes in Computer Science
, vol.3659
, pp. 30-46
-
-
Schindler, W.1
Lemke, K.2
Paar, C.3
-
10
-
-
84890863577
-
-
(Springer)
-
Mangard, S., Oswald, E., and Popp, T.: ' Power analysis attacks ', (Springer, 2007)
-
(2007)
Power Analysis Attacks
-
-
Mangard, S.1
Oswald, E.2
Popp, T.3
-
11
-
-
35248899532
-
Template attacks
-
Redwood Shores, CA, USA, August. (LNCS, 2523)
-
Chari, S., Rao, J.R., and Rohatgi, P.: ' Template attacks ', Proc. CHES 2002, Redwood Shores, CA, USA, August, 2002, p. 13-28, (LNCS, 2523)
-
(2002)
Proc. CHES 2002
, pp. 13-28
-
-
Chari, S.1
Rao, J.R.2
Rohatgi, P.3
-
12
-
-
84937438279
-
Power analysis, what is now possible
-
Kyoto, Japan, December. (LNCS, 1976)
-
Akkar, M.-L., Bevan, R., Dischamp, P., and Moyart, D.: ' Power analysis, what is now possible ', Proc. Asiacrypt 2000, Kyoto, Japan, December, 2000, p. 489-502, (LNCS, 1976)
-
(2000)
Proc. Asiacrypt 2000
, pp. 489-502
-
-
Akkar, M.-L.1
Bevan, R.2
Dischamp, P.3
Moyart, D.4
-
13
-
-
26444525726
-
DPA attacks and S-boxes
-
Fast Software Encryption: 12th International Workshop, FSE 2005. Revised Selected Papers
-
Prouff, E.: ' DPA attacks and S-boxes ', Proc. FSE 2005, Paris, France, February, 2005, p. 424-441, (LNCS, 3557) (Pubitemid 41425180)
-
(2005)
Lecture Notes in Computer Science
, vol.3557
, pp. 424-441
-
-
Prouff, E.1
-
14
-
-
33750693916
-
Towards security limits in side-channel attacks
-
Yokohama, Japan, October. (LNCS, 4249)
-
Standaert, F.-X., Peeters, E., Archambeau, C., and Quisquater, J.-J.: ' Towards security limits in side-channel attacks ', Proc. CHES 2006, Yokohama, Japan, October, 2006, p. 30-45, (LNCS, 4249)
-
(2006)
Proc. CHES 2006
, pp. 30-45
-
-
Standaert, F.-X.1
Peeters, E.2
Archambeau, C.3
Quisquater, J.-J.4
-
15
-
-
0012022904
-
A note regarding evaluation of AES candidates on smart-cards
-
Rome, Italy, March
-
Chari, S., Jutla, C.S., Rao, J.R., and Rohatgi, P.: ' A note regarding evaluation of AES candidates on smart-cards ', Proc. Second AES Candidate Conf., Rome, Italy, March, 1999, p. 133-147
-
(1999)
Proc. Second AES Candidate Conf.
, pp. 133-147
-
-
Chari, S.1
Jutla, C.S.2
Rao, J.R.3
Rohatgi, P.4
-
16
-
-
0001884734
-
On the frequency function of xy
-
10.1214/aoms/1177732541
-
Craig, C.: ' On the frequency function of xy ', Ann. Math. Stat., 1936, 7, (1), p. 1-15 10.1214/aoms/1177732541
-
(1936)
Ann. Math. Stat.
, vol.7
, Issue.1
, pp. 1-15
-
-
Craig, C.1
-
17
-
-
67049146380
-
Partition vs. comparison side-channel distingsuishers: An empirical evaluation of statistical tests for univariate side-channel attacks
-
Seoul, Korea, December. (LNCS, 5461)
-
Standaert, F.-X., Gierlichs, B., and Verbauwhede, I.: ' Partition vs. comparison side-channel distingsuishers: an empirical evaluation of statistical tests for univariate side-channel attacks ', Proc. ICISC 2008, Seoul, Korea, December, 2008, p. 253-267, (LNCS, 5461)
-
(2008)
Proc. ICISC 2008
, pp. 253-267
-
-
Standaert, F.-X.1
Gierlichs, B.2
Verbauwhede, I.3
-
18
-
-
35248825993
-
Securing encryption algorithms against DPA at the logic level: Next generation smart card technology
-
Cologne, Germany, September. (LNCS, 2779)
-
Tiri, K., and Verbauwhede, I.: ' Securing encryption algorithms against DPA at the logic level: next generation smart card technology ', Proc. CHES 2003, Cologne, Germany, September, 2003, p. 125-136, (LNCS, 2779)
-
(2003)
Proc. CHES 2003
, pp. 125-136
-
-
Tiri, K.1
Verbauwhede, I.2
-
19
-
-
3042604811
-
A logic level design methodology for a secure DPA resistant ASIC or FPGA implementation
-
Paris, France, February
-
Tiri, K., and Verbauwhede, I.: ' A logic level design methodology for a secure DPA resistant ASIC or FPGA implementation ', Proc. DATE 2004 (IEEE), Paris, France, February, 2004, p. 246-251
-
(2004)
Proc. DATE 2004 (IEEE)
, pp. 246-251
-
-
Tiri, K.1
Verbauwhede, I.2
-
20
-
-
70350589228
-
Mutual information analysis: How, when and why?
-
Lausanne, Switzerland, Spetember. (LNCS, 5747)
-
Veyrat-Charvillon, N., and Standaert, F.-X.: ' Mutual information analysis: how, when and why? ', Proc. CHES 2009, Lausanne, Switzerland, Spetember, 2009, p. 429-443, (LNCS, 5747)
-
(2009)
Proc. CHES 2009
, pp. 429-443
-
-
Veyrat-Charvillon, N.1
Standaert, F.-X.2
-
21
-
-
79959451800
-
-
accessed December 2010
-
http://www.dpacontest.org, accessed December 2010
-
-
-
-
22
-
-
35048819488
-
Hardware countermeasures against DPA - A statistical analysis of their effectiveness
-
San Francisco, CA, USA, Feburary. (LNCS, 2964)
-
Mangard, S.: ' Hardware countermeasures against DPA - a statistical analysis of their effectiveness ', Proc. CT-RSA 2004, San Francisco, CA, USA, Feburary, 2004, p. 222-235, (LNCS, 2964)
-
(2004)
Proc. CT-RSA 2004
, pp. 222-235
-
-
Mangard, S.1
|