-
2
-
-
64249159739
-
Constructive and destructive use of compilers in elliptic curve cryptography
-
April
-
M. Barbosa, A. Moss, and D. Page. Constructive and destructive use of compilers in elliptic curve cryptography. Journal of Cryptology, 22(2):259-281, April 2009.
-
(2009)
Journal of Cryptology
, vol.22
, Issue.2
, pp. 259-281
-
-
Barbosa, M.1
Moss, A.2
Page, D.3
-
3
-
-
80052657961
-
-
Computer Aided Cryptography Engineering (CACE European Project). http://www.cace-project.eu.
-
-
-
-
4
-
-
68549105908
-
On Boolean and Arithmetic Masking against Differential Power Analysis
-
Cryptographic Hardware and Embedded Systems - CHES 2000 Second International Workshop Worcester, MA, USA, August 17-18, 2000 Proceedings
-
J.-S. Coron and L. Goubin. On Boolean and arithmetic masking against differential power analysis. In Cryptographic Hardware and Embedded Systems -CHES 2000, pages 231-237, 2000. (Pubitemid 33213971)
-
(2000)
LECTURE NOTES IN COMPUTER SCIENCE
, Issue.1965
, pp. 231-237
-
-
Coron, J.-S.1
Goubin, L.2
-
6
-
-
27244444584
-
The "backend duplication" method
-
August
-
S. Guilley, P. Hoogvorst, Y. Mathieu, and R. Pacalet. The "backend duplication" method. In Cryptographic Hardware and Embedded Systems -CHES 2005, pages 383-397, August 2005.
-
(2005)
Cryptographic Hardware and Embedded Systems -CHES 2005
, pp. 383-397
-
-
Guilley, S.1
Hoogvorst, P.2
Mathieu, Y.3
Pacalet, R.4
-
7
-
-
84948778220
-
Instruction stream mutation for non-deterministic processors
-
July
-
J. Irwin, D. Page, and N. P. Smart. Instruction stream mutation for non-deterministic processors. In 13th International Conference on Application-Specific Systems, Architectures and Processors, pages 286-295, July 2002.
-
(2002)
13th International Conference on Application-Specific Systems, Architectures and Processors
, pp. 286-295
-
-
Irwin, J.1
Page, D.2
Smart, N.P.3
-
8
-
-
84943632039
-
Timing attacks on implementations of Diffie-Hellman, RSA, DSS and other systems
-
September
-
P. Kocher. Timing attacks on implementations of Diffie-Hellman, RSA, DSS and other systems. In Advances in Cryptology -CRYPTO '96, pages 104-113, September 1996.
-
(1996)
Advances in Cryptology -CRYPTO '96
, pp. 104-113
-
-
Kocher, P.1
-
12
-
-
84944906595
-
Random Register Renaming to Foil DPA
-
Cryptographic Hardware and Embedded Systems - CHES 2001
-
D. May, H. L. Muller, and N. P. Smart. Random register renaming to foil DPA. In Cryptographic Hardware and Embedded Systems -CHES 2001, pages 28-38, May 2001. (Pubitemid 33329051)
-
(2001)
LECTURE NOTES IN COMPUTER SCIENCE
, Issue.2162
, pp. 28-38
-
-
May, D.1
Muller, H.L.2
Smart, N.P.3
-
13
-
-
77957948240
-
Improving smart card security using self-timed circuits
-
April
-
S. W. Moore, R. D. Mullins, P. A. Cunningham, R. J. Anderson, and G. S. Taylor. Improving smart card security using self-timed circuits. In 8th International Symposium on Advanced Research in Asynchronous Circuits and Systems - ASYNC 2002, pages 211-218, April 2002.
-
(2002)
8th International Symposium on Advanced Research in Asynchronous Circuits and Systems - ASYNC 2002
, pp. 211-218
-
-
Moore, S.W.1
Mullins, R.D.2
Cunningham, P.A.3
Anderson, R.J.4
Taylor, G.S.5
-
15
-
-
70350585060
-
A design flow and evaluation framework for DPA-resistant instruction set extensions
-
September
-
F. Regazzoni, A. Cevrero, F.-X. Standaert, S. Badel, T. Kluter, P. Brisk, Y. Leblebici, and P. Ienne. A design flow and evaluation framework for DPA-resistant instruction set extensions. In Cryptographic Hardware and Embedded Systems -CHES 2009, pages 205-219, September 2009.
-
(2009)
Cryptographic Hardware and Embedded Systems -CHES 2009
, pp. 205-219
-
-
Regazzoni, F.1
Cevrero, A.2
Standaert, F.-X.3
Badel, S.4
Kluter, T.5
Brisk, P.6
Leblebici, Y.7
Ienne, P.8
-
16
-
-
67650295998
-
Evaluating resistance of MCML technology to power analysis attacks using a simulation-based methodology
-
F. Regazzoni, T. Eisenbarth, A. Poschmann, J. Großschädl, F. K. Gürkaynak, M. Macchetti, Z. T. Deniz, L. Pozzi, C. Paar, Y. Leblebici, and P. Ienne. Evaluating resistance of MCML technology to power analysis attacks using a simulation-based methodology. Transactions on Computational Science, 5430:230-243, 2009.
-
(2009)
Transactions on Computational Science
, vol.5430
, pp. 230-243
-
-
Regazzoni, F.1
Eisenbarth, T.2
Poschmann, A.3
Großschädl, J.4
Gürkaynak, F.K.5
Macchetti, M.6
Deniz, Z.T.7
Pozzi, L.8
Paar, C.9
Leblebici, Y.10
Ienne, P.11
-
18
-
-
67650694228
-
A unified framework for the analysis of side-channel key recovery attacks
-
April
-
F.-X. Standaert, T. G. Malkin, and M. Yung. A unified framework for the analysis of side-channel key recovery attacks. In Advances in Cryptology -EUROCRYPT '09, pages 443-461, April 2009.
-
(2009)
Advances in Cryptology -EUROCRYPT '09
, pp. 443-461
-
-
Standaert, F.-X.1
Malkin, T.G.2
Yung, M.3
-
20
-
-
84893732023
-
A dynamic and differential CMOS logic with signal independent power consumption to withstand differential power analysis on smart cards
-
September
-
K. Tiri, M. Akmal, and I. Verbauwhede. A dynamic and differential CMOS logic with signal independent power consumption to withstand differential power analysis on smart cards. In 28th European Solid-State Circuits Conference, pages 403-406, September 2002.
-
(2002)
28th European Solid-State Circuits Conference
, pp. 403-406
-
-
Tiri, K.1
Akmal, M.2
Verbauwhede, I.3
|