메뉴 건너뛰기




Volumn , Issue , 2011, Pages 230-235

A first step towards automatic application of power analysis countermeasures

Author keywords

Automation; AVR; Power Analysis Attacks; Software Countermeasure

Indexed keywords

APPLICATION PROGRAMS; AUTOMATION; COMPUTER AIDED DESIGN; INFORMATION THEORY;

EID: 80052670809     PISSN: 0738100X     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2024724.2024778     Document Type: Conference Paper
Times cited : (78)

References (22)
  • 2
    • 64249159739 scopus 로고    scopus 로고
    • Constructive and destructive use of compilers in elliptic curve cryptography
    • April
    • M. Barbosa, A. Moss, and D. Page. Constructive and destructive use of compilers in elliptic curve cryptography. Journal of Cryptology, 22(2):259-281, April 2009.
    • (2009) Journal of Cryptology , vol.22 , Issue.2 , pp. 259-281
    • Barbosa, M.1    Moss, A.2    Page, D.3
  • 3
    • 80052657961 scopus 로고    scopus 로고
    • Computer Aided Cryptography Engineering (CACE European Project). http://www.cace-project.eu.
  • 4
    • 68549105908 scopus 로고    scopus 로고
    • On Boolean and Arithmetic Masking against Differential Power Analysis
    • Cryptographic Hardware and Embedded Systems - CHES 2000 Second International Workshop Worcester, MA, USA, August 17-18, 2000 Proceedings
    • J.-S. Coron and L. Goubin. On Boolean and arithmetic masking against differential power analysis. In Cryptographic Hardware and Embedded Systems -CHES 2000, pages 231-237, 2000. (Pubitemid 33213971)
    • (2000) LECTURE NOTES IN COMPUTER SCIENCE , Issue.1965 , pp. 231-237
    • Coron, J.-S.1    Goubin, L.2
  • 8
    • 84943632039 scopus 로고    scopus 로고
    • Timing attacks on implementations of Diffie-Hellman, RSA, DSS and other systems
    • September
    • P. Kocher. Timing attacks on implementations of Diffie-Hellman, RSA, DSS and other systems. In Advances in Cryptology -CRYPTO '96, pages 104-113, September 1996.
    • (1996) Advances in Cryptology -CRYPTO '96 , pp. 104-113
    • Kocher, P.1
  • 12
    • 84944906595 scopus 로고    scopus 로고
    • Random Register Renaming to Foil DPA
    • Cryptographic Hardware and Embedded Systems - CHES 2001
    • D. May, H. L. Muller, and N. P. Smart. Random register renaming to foil DPA. In Cryptographic Hardware and Embedded Systems -CHES 2001, pages 28-38, May 2001. (Pubitemid 33329051)
    • (2001) LECTURE NOTES IN COMPUTER SCIENCE , Issue.2162 , pp. 28-38
    • May, D.1    Muller, H.L.2    Smart, N.P.3
  • 18
    • 67650694228 scopus 로고    scopus 로고
    • A unified framework for the analysis of side-channel key recovery attacks
    • April
    • F.-X. Standaert, T. G. Malkin, and M. Yung. A unified framework for the analysis of side-channel key recovery attacks. In Advances in Cryptology -EUROCRYPT '09, pages 443-461, April 2009.
    • (2009) Advances in Cryptology -EUROCRYPT '09 , pp. 443-461
    • Standaert, F.-X.1    Malkin, T.G.2    Yung, M.3
  • 20
    • 84893732023 scopus 로고    scopus 로고
    • A dynamic and differential CMOS logic with signal independent power consumption to withstand differential power analysis on smart cards
    • September
    • K. Tiri, M. Akmal, and I. Verbauwhede. A dynamic and differential CMOS logic with signal independent power consumption to withstand differential power analysis on smart cards. In 28th European Solid-State Circuits Conference, pages 403-406, September 2002.
    • (2002) 28th European Solid-State Circuits Conference , pp. 403-406
    • Tiri, K.1    Akmal, M.2    Verbauwhede, I.3
  • 22


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.