-
1
-
-
84957079591
-
Towards Sound Approaches to Counteract Power-Analysis Attacks
-
Wiener, M.J. (ed.) CRYPTO 1999. Springer, Heidelberg
-
Chari, S., Jutla, C.S., Rao, J.R., Rohatgi, P.: Towards Sound Approaches to Counteract Power-Analysis Attacks. In: Wiener, M.J. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 398-412. Springer, Heidelberg (1999)
-
(1999)
LNCS
, vol.1666
, pp. 398-412
-
-
Chari, S.1
Jutla, C.S.2
Rao, J.R.3
Rohatgi, P.4
-
2
-
-
77956996186
-
Leakage-Resilient Pseudorandom Functions and Side- Channel Attacks on Feistel Networks
-
Rabin, T. (ed.) CRYPTO 2010. Springer, Heidelberg
-
Dodis, Y., Pietrzak, K.: Leakage-Resilient Pseudorandom Functions and Side- Channel Attacks on Feistel Networks. In: Rabin, T. (ed.) CRYPTO 2010. LNCS, vol. 6223, pp. 21-40. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.6223
, pp. 21-40
-
-
Dodis, Y.1
Pietrzak, K.2
-
3
-
-
57949107348
-
Leakage-Resilient Cryptography
-
IEEE Computer Society, Los Alamitos
-
Dziembowski, S., Pietrzak, K.: Leakage-Resilient Cryptography. In: FOCS, pp. 293-302. IEEE Computer Society, Los Alamitos (2008)
-
(2008)
FOCS
, pp. 293-302
-
-
Dziembowski, S.1
Pietrzak, K.2
-
4
-
-
77949631657
-
Leakage-resilient signatures
-
Micciancio, D. (ed.) TCC 2010. Springer, Heidelberg
-
Faust, S., Kiltz, E., Pietrzak, K., Rothblum, G.N.: Leakage-resilient signatures. In: Micciancio, D. (ed.) TCC 2010. LNCS, vol. 5978, pp. 343-360. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.5978
, pp. 343-360
-
-
Faust, S.1
Kiltz, E.2
Pietrzak, K.3
Rothblum, G.N.4
-
5
-
-
51049117070
-
Mutual Information Analysis
-
Oswald, E., Rohatgi, P. (eds.) CHES 2008. Springer, Heidelberg
-
Gierlichs, B., Batina, L., Tuyls, P., Preneel, B.: Mutual Information Analysis. In: Oswald, E., Rohatgi, P. (eds.) CHES 2008. LNCS, vol. 5154, pp. 426-442. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5154
, pp. 426-442
-
-
Gierlichs, B.1
Batina, L.2
Tuyls, P.3
Preneel, B.4
-
6
-
-
35248830819
-
Multiplicative Masking and Power Analysis of AES
-
Kaliski Jr., B.S., Koç, Ç.K., Paar, C. (eds.) CHES 2002. Springer, Heidelberg
-
Golic, J.D., Tymen, C.: Multiplicative Masking and Power Analysis of AES. In: Kaliski Jr., B.S., Koç, Ç.K., Paar, C. (eds.) CHES 2002. LNCS, vol. 2523, pp. 198-212. Springer, Heidelberg (2003)
-
(2003)
LNCS
, vol.2523
, pp. 198-212
-
-
Golic, J.D.1
Tymen, C.2
-
7
-
-
84949520149
-
DES and Differential Power Analysis (The "Duplication"Method)
-
Koç, Ç.K., Paar, C. (eds.) CHES 1999. Springer, Heidelberg
-
Goubin, L., Patarin, J.: DES and Differential Power Analysis (The "Duplication"Method). In: Koç, Ç.K., Paar, C. (eds.) CHES 1999. LNCS, vol. 1717, pp. 158-172. Springer, Heidelberg (1999)
-
(1999)
LNCS
, vol.1717
, pp. 158-172
-
-
Goubin, L.1
Patarin, J.2
-
8
-
-
84991939136
-
LFSR-Based Hashing and Authentication
-
Desmedt, Y. (ed.) CRYPTO 1994. Springer, Heidelberg
-
Krawczyk, H.: LFSR-Based Hashing and Authentication. In: Desmedt, Y. (ed.) CRYPTO 1994. LNCS, vol. 839, pp. 129-139. Springer, Heidelberg (1994)
-
(1994)
LNCS
, vol.839
, pp. 129-139
-
-
Krawczyk, H.1
-
9
-
-
84890863577
-
-
Springer, Heidelberg
-
Mangard, S., Oswald, E., Popp, T.: Power Analysis Attacks: Revealing the Secrets of Smart Cards. Springer, Heidelberg (2007)
-
(2007)
Power Analysis Attacks: Revealing the Secrets of Smart Cards
-
-
Mangard, S.1
Oswald, E.2
Popp, T.3
-
10
-
-
77955912333
-
One for All - All for One: Unifying Standard DPA Attacks
-
Report 2009/449
-
Mangard, S., Oswald, E., Standaert, F.-X.: One for All - All for One: Unifying Standard DPA Attacks. Cryptology ePrint Archive, Report 2009/449 (2009), http://eprint.iacr.org/ to appear in IET Information Security
-
(2009)
Cryptology
-
-
Mangard, S.1
Oswald, E.2
Standaert, F.-X.3
-
11
-
-
80053462411
-
Extractors Against Side-Channel Attacks: Weak or Strong?
-
Report 2011/348
-
Medwed, M., Standaert, F.-X.: Extractors Against Side-Channel Attacks: Weak or Strong? Cryptology ePrint Archive, Report 2011/348 (2011), http://eprint.iacr.org/
-
(2011)
Cryptology
-
-
Medwed, M.1
Standaert, F.-X.2
-
12
-
-
70350303869
-
Public-Key Cryptosystems Resilient to Key Leakage
-
Halevi, S. (ed.) CRYPTO 2009. Springer, Heidelberg
-
Naor, M., Segev, G.: Public-Key Cryptosystems Resilient to Key Leakage. In: Halevi, S. (ed.) CRYPTO 2009. LNCS, vol. 5677, pp. 18-35. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5677
, pp. 18-35
-
-
Naor, M.1
Segev, G.2
-
13
-
-
66049085129
-
Statistical Analysis of Second Order Differential Power Analysis. IEEE Trans
-
Prouff, E., Rivain, M., Bevan, R.: Statistical Analysis of Second Order Differential Power Analysis. IEEE Trans. Computers 58(6), 799-811 (2009)
-
(2009)
Computers
, vol.58
, Issue.6
, pp. 799-811
-
-
Prouff, E.1
Rivain, M.2
Bevan, R.3
-
14
-
-
77955866745
-
How Leaky Is an Extractor?
-
Abdalla, M., Barreto, P.S.L.M. (eds.) LATINCRYPT 2010. Springer, Heidelberg
-
Standaert, F.-X.: How Leaky Is an Extractor? In: Abdalla, M., Barreto, P.S.L.M. (eds.) LATINCRYPT 2010. LNCS, vol. 6212, pp. 294-304. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.6212
, pp. 294-304
-
-
Standaert, F.-X.1
-
15
-
-
67650694228
-
A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks
-
Joux, A. (ed.) EUROCRYPT 2009. Springer, Heidelberg
-
Standaert, F.-X., Malkin, T., Yung, M.: A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks. In: Joux, A. (ed.) EUROCRYPT 2009. LNCS, vol. 5479, pp. 443-461. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5479
, pp. 443-461
-
-
Standaert, F.-X.1
Malkin, T.2
Yung, M.3
-
16
-
-
84998557355
-
Leakage Resilient Cryptography in Practice
-
Basin, D., Maurer, U., Sadeghi, A.- R., Naccache, D. (eds.) Springer, Heidelberg
-
Standaert, F.-X., Pereira, O., Yu, Y., Quisquater, J.-J., Yung, M., Oswald, E.: Leakage Resilient Cryptography in Practice. In: Basin, D., Maurer, U., Sadeghi, A.- R., Naccache, D. (eds.) Towards Hardware-Intrinsic Security, Information Security and Cryptography, pp. 99-134. Springer, Heidelberg (2010)
-
(2010)
Towards Hardware-Intrinsic Security, Information Security and Cryptography
, pp. 99-134
-
-
Standaert, F.-X.1
Pereira, O.2
Yu, Y.3
Quisquater, J.-J.4
Yung, M.5
Oswald, E.6
-
17
-
-
78650838653
-
The World Is Not Enough: Another Look on Second- Order DPA
-
Abe, M. (ed.) ASIACRYPT 2010. Springer, Heidelberg
-
Standaert, F.-X., Veyrat-Charvillon, N., Oswald, E., Gierlichs, B., Medwed, M., Kasper, M., Mangard, S.: The World Is Not Enough: Another Look on Second- Order DPA. In: Abe, M. (ed.) ASIACRYPT 2010. LNCS, vol. 6477, pp. 112-129. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.6477
, pp. 112-129
-
-
Standaert, F.-X.1
Veyrat-Charvillon, N.2
Oswald, E.3
Gierlichs, B.4
Medwed, M.5
Kasper, M.6
Mangard, S.7
-
18
-
-
79956308378
-
Adaptive Chosen-Message Side-Channel Attacks
-
Zhou, J., Yung, M. (eds.) ACNS 2010. Springer, Heidelberg
-
Veyrat-Charvillon, N., Standaert, F.-X.: Adaptive Chosen-Message Side-Channel Attacks. In: Zhou, J., Yung, M. (eds.) ACNS 2010. LNCS, vol. 6123, pp. 186-199. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.6123
, pp. 186-199
-
-
Veyrat-Charvillon, N.1
Standaert, F.-X.2
-
19
-
-
78650013814
-
Practical leakage-resilient pseudorandom generators
-
Al-Shaer, E., Keromytis, A.D., Shmatikov, V. (eds.) ACM, New York
-
Yu, Y., Standaert, F.-X., Pereira, O., Yung, M.: Practical leakage-resilient pseudorandom generators. In: Al-Shaer, E., Keromytis, A.D., Shmatikov, V. (eds.) ACM Conference on Computer and Communications Security, pp. 141-151. ACM, New York (2010)
-
(2010)
ACM Conference on Computer and Communications Security
, pp. 141-151
-
-
Yu, Y.1
Standaert, F.-X.2
Pereira, O.3
Yung, M.4
|