-
2
-
-
80053551953
-
-
Atmel Corporation: Datasheet: ATmega128(L), http://www.atmel.com/ products/avr/
-
Datasheet: ATmega128(L)
-
-
-
3
-
-
84943615552
-
An Implementation of des and AES, Secure against Some Attacks
-
Koç, Ç.K., Naccache, D., Paar, C. (eds.) CHES 2001. Springer, Heidelberg
-
Akkar, M.-L., Giraud, C.: An Implementation of DES and AES, Secure against Some Attacks. In: Koç, Ç.K., Naccache, D., Paar, C. (eds.) CHES 2001. LNCS, vol. 2162, pp. 309-318. Springer, Heidelberg (2001)
-
(2001)
LNCS
, vol.2162
, pp. 309-318
-
-
Akkar, M.-L.1
Giraud, C.2
-
4
-
-
0025530315
-
The Structured Design of Cryptographically Good SBoxes
-
Adams, C., Tavares, S.: The Structured Design of Cryptographically Good SBoxes. Journal of Cryptology 3(1), 27-42 (1990)
-
(1990)
Journal of Cryptology
, vol.3
, Issue.1
, pp. 27-42
-
-
Adams, C.1
Tavares, S.2
-
5
-
-
35048848490
-
Provably SecureMasking of AES
-
Handschuh, H., Hasan, M.A. (eds.) SAC 2004. Springer, Heidelberg
-
Blömer, J., Guajardo, J., Krummel, V.: Provably SecureMasking of AES. In: Handschuh, H., Hasan, M.A. (eds.) SAC 2004. LNCS, vol. 3357, pp. 69-83. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3357
, pp. 69-83
-
-
Blömer, J.1
Guajardo, J.2
Krummel, V.3
-
6
-
-
84949023413
-
On the Distribution of Characteristics in Bijective Mappings
-
Helleseth, T. (ed.) EUROCRYPT 1993. Springer, Heidelberg
-
O'Connor, L.: On the Distribution of Characteristics in Bijective Mappings. In: Helleseth, T. (ed.) EUROCRYPT 1993. LNCS, vol. 765, pp. 360-370. Springer, Heidelberg (1994)
-
(1994)
LNCS
, vol.765
, pp. 360-370
-
-
O'Connor, L.1
-
7
-
-
38049064396
-
Side Channel Cryptanalysis of a Higher Order Masking Scheme
-
Paillier, P., Verbauwhede, I. (eds.) CHES 2007. Springer, Heidelberg
-
Coron, J.-S., Prouff, E., Rivain, M.: Side Channel Cryptanalysis of a Higher Order Masking Scheme. In: Paillier, P., Verbauwhede, I. (eds.) CHES 2007. LNCS, vol. 4727, pp. 28-44. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4727
, pp. 28-44
-
-
Coron, J.-S.1
Prouff, E.2
Rivain, M.3
-
8
-
-
38149026169
-
Blind Differential Cryptanalysis for Enhanced Power Attacks
-
Biham, E., Youssef, A.M. (eds.) SAC 2006. Springer, Heidelberg
-
Handschuh, H., Preneel, B.: Blind Differential Cryptanalysis for Enhanced Power Attacks. In: Biham, E., Youssef, A.M. (eds.) SAC 2006. LNCS, vol. 4356, pp. 163-173. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4356
, pp. 163-173
-
-
Handschuh, H.1
Preneel, B.2
-
9
-
-
33746589805
-
An AES smart card implementation resistant to power analysis attacks
-
DOI 10.1007/11767480-16, Applied Cryptography and Network Security - 4th International Conference, ACNS 2006, Proceedings
-
Herbst, C., Oswald, E., Mangard, S.: An AES Smart Card Implementation Resistant to Power Analysis Attacks. In: Zhou, J., Yung, M., Bao, F. (eds.) ACNS 2006. LNCS, vol. 3989, pp. 239-252. Springer, Heidelberg (2006) (Pubitemid 44152821)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.3989 LNCS
, pp. 239-252
-
-
Herbst, C.1
Oswald, E.2
Mangard, S.3
-
10
-
-
35248830337
-
Private circuits: Securing hardware against probing attacks
-
Ishai, Y., Sahai, A.,Wagner, D.: Private Circuits: Securing Hardware against Probing Attacks. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol. 2729, pp. 463-481. Springer, Heidelberg (2003) (Pubitemid 137636958)
-
(2003)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.2729
, pp. 463-481
-
-
Ishai, Y.1
Sahai, A.2
Wagner, D.3
-
11
-
-
77953385519
-
Efficient Masking Methods Appropriate for the Block Ciphers ARIA and AES
-
Kim, H., Kim, T., Han, D., Hong, S.: Efficient Masking Methods Appropriate for the Block Ciphers ARIA and AES. ETRI Journal 32(3), 370-379 (2010)
-
(2010)
ETRI Journal
, vol.32
, Issue.3
, pp. 370-379
-
-
Kim, H.1
Kim, T.2
Han, D.3
Hong, S.4
-
12
-
-
70350148515
-
Improved Side-Channel Attack on des with the First Four Rounds Masked
-
Kim, J., Hong, S., Han, D., Lee, S.: Improved Side-Channel Attack on DES with the First Four Rounds Masked. ETRI Journal 31(5), 625-627 (2009)
-
(2009)
ETRI Journal
, vol.31
, Issue.5
, pp. 625-627
-
-
Kim, J.1
Hong, S.2
Han, D.3
Lee, S.4
-
13
-
-
84939573910
-
Differential Power Analysis
-
Wiener, M. (ed.) CRYPTO 1999. Springer, Heidelberg
-
Kocher, P.C., Jaffe, J., Jun, B.: Differential Power Analysis. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 388-397. Springer, Heidelberg (1999)
-
(1999)
LNCS
, vol.1666
, pp. 388-397
-
-
Kocher, P.C.1
Jaffe, J.2
Jun, B.3
-
14
-
-
68549099555
-
Using Second-Order Power Analysis to Attack DPA Resistant Software
-
Paar, C., Koç, Ç.K. (eds.) CHES 2000. Springer, Heidelberg
-
Messerges, T.S.: Using Second-Order Power Analysis to Attack DPA Resistant Software. In: Paar, C., Koç, Ç.K. (eds.) CHES 2000. LNCS, vol. 1965, pp. 238-251. Springer, Heidelberg (2000)
-
(2000)
LNCS
, vol.1965
, pp. 238-251
-
-
Messerges, T.S.1
-
15
-
-
26444465110
-
A side-channel analysis resistant description of the AES S-box
-
Fast Software Encryption: 12th International Workshop, FSE 2005. Revised Selected Papers
-
Oswald, E., Mangard, S., Pramstaller, N., Rijmen, V.: A Side-Channel Analysis Resistant Description of the AES S-Box. In: Gilbert, H., Handschuh, H. (eds.) FSE 2005. LNCS, vol. 3557, pp. 413-423. Springer, Heidelberg (2005) (Pubitemid 41425179)
-
(2005)
Lecture Notes in Computer Science
, vol.3557
, pp. 413-423
-
-
Oswald, E.1
Mangard, S.2
Pramstaller, N.3
Rijmen, V.4
-
16
-
-
33744946821
-
An Efficient Masking Scheme for AES Software Implementations
-
Song, J.-S., Kwon, T., Yung, M. (eds.) WISA 2005. Springer, Heidelberg
-
Oswald, E., Schramm, K.: An Efficient Masking Scheme for AES Software Implementations. In: Song, J.-S., Kwon, T., Yung, M. (eds.) WISA 2005. LNCS, vol. 3786, pp. 292-305. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.3786
, pp. 292-305
-
-
Oswald, E.1
Schramm, K.2
-
17
-
-
50249140648
-
Block Ciphers Implementations Provably Secure Against Second Order Side Channel Analysis
-
Nyberg, K. (ed.) FSE 2008. Springer, Heidelberg
-
Rivain, M., Dottax, E., Prouff, E.: Block Ciphers Implementations Provably Secure Against Second Order Side Channel Analysis. In: Nyberg, K. (ed.) FSE 2008. LNCS, vol. 5086, pp. 127-143. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5086
, pp. 127-143
-
-
Rivain, M.1
Dottax, E.2
Prouff, E.3
-
18
-
-
78049343104
-
Provably Secure Higher-Order Masking of AES
-
Mangard, S., Standaert, F.-X. (eds.) CHES 2010. Springer, Heidelberg
-
Rivain, M., Prouff, E.: Provably Secure Higher-Order Masking of AES. In: Mangard, S., Standaert, F.-X. (eds.) CHES 2010. LNCS, vol. 6225, pp. 413-427. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.6225
, pp. 413-427
-
-
Rivain, M.1
Prouff, E.2
-
19
-
-
84942466169
-
Provably Secure Higher-Order Masking of AES
-
Rivain, M., Prouff, E.: Provably Secure Higher-Order Masking of AES, Cryptology ePrint Archive (2010), http://eprint.iacr.org/
-
(2010)
Cryptology ePrint Archive
-
-
Rivain, M.1
Prouff, E.2
-
20
-
-
84944877872
-
Efficient Rijndael Encryption Implementation with Composite Field Arithmetic
-
Koç, Ç.K., Naccache, D., Paar, C. (eds.) CHES 2001. Springer, Heidelberg
-
Rudra, A., Dubey, P.K., Jutla, C.S., Kumar, V., Rao, J.R., Rohatgi, P.: Efficient Rijndael Encryption Implementation with Composite Field Arithmetic. In: Koç, Ç.K., Naccache, D., Paar, C. (eds.) CHES 2001. LNCS, vol. 2162, pp. 171-188. Springer, Heidelberg (2001)
-
(2001)
LNCS
, vol.2162
, pp. 171-188
-
-
Rudra, A.1
Dubey, P.K.2
Jutla, C.S.3
Kumar, V.4
Rao, J.R.5
Rohatgi, P.6
-
21
-
-
84946832086
-
A Compact Rijndael Hardware Architecture with S-Box Optimization
-
Advances in Cryptology - ASIACRYPT 2001
-
Satoh, A., Morioka, S., Takano, K., Munetoh, S.: A Compact Rijndael Hardware Architecture with S-Box Optimization. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol. 2248, pp. 239-254. Springer, Heidelberg (2001) (Pubitemid 33371189)
-
(2002)
LECTURE NOTES IN COMPUTER SCIENCE
, Issue.2248
, pp. 239-254
-
-
Satoh, A.1
Morioka, S.2
Takano, K.3
Munetoh, S.4
-
22
-
-
33745652931
-
Higher Order Masking of the AES
-
Pointcheval, D. (ed.) CT-RSA 2006. Springer, Heidelberg
-
Schramm, K., Paar, C.: Higher Order Masking of the AES. In: Pointcheval, D. (ed.) CT-RSA 2006. LNCS, vol. 3860, pp. 208-225. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.3860
, pp. 208-225
-
-
Schramm, K.1
Paar, C.2
|