-
1
-
-
84939573910
-
Differential power analysis
-
M. Wiener (Ed.), Berlin: Springer, Lecture Notes in Computer Science
-
Kocher P., Jaffe J., Jun B.: Differential power analysis. In: Wiener, M. (eds) Advances in Cryptology-CRYPTO '99. Lecture Notes in Computer Science, vol. 1666, pp. 388-397. Springer, Berlin (1999).
-
(1999)
Advances in Cryptology-CRYPTO '99
, vol.1666
, pp. 388-397
-
-
Kocher, P.1
Jaffe, J.2
Jun, B.3
-
2
-
-
68549099555
-
Using second-order power analysis to attack DPA resistant software
-
Ç. Koç and C. Paar (Eds.), Berlin: Springer, Lecture Notes in Computer Science
-
Messerges T.: Using second-order power analysis to attack DPA resistant software. In: Koç, Ç., Paar, C. (eds) Cryptographic Hardware and Embedded Systems-CHES 2000. Lecture Notes in Computer Science, vol. 1965., pp. 238-251. Springer, Berlin (2000).
-
(2000)
Cryptographic Hardware and Embedded Systems-CHES 2000
, vol.1965
, pp. 238-251
-
-
Messerges, T.1
-
3
-
-
35048818034
-
Correlation power analysis with a leakage model
-
M. Joye and J. J. Quisquater (Eds.), Berlin: Springer, Lecture Notes in Computer Science
-
Brier E., Clavier C., Olivier F.: Correlation power analysis with a leakage model. In: Joye, M., Quisquater, J. J. (eds) Cryptographic Hardware and Embedded Systems-CHES 2004 Lecture Notes in Computer Science, vol 3156., pp. 16-29. Springer, Berlin (2004).
-
(2004)
Cryptographic Hardware and Embedded Systems-CHES 2004
, vol.3156
, pp. 16-29
-
-
Brier, E.1
Clavier, C.2
Olivier, F.3
-
4
-
-
33750688820
-
A proposition for correlation power analysis enhancement
-
L. Goubin and M. Matsui (Eds.), Berlin: Springer, Lecture Notes in Computer Science
-
Le T. H., Clédière J., Canovas C., Robisson B., Servière C., Lacoume J. L.: A proposition for correlation power analysis enhancement. In: Goubin, L., Matsui, M. (eds) Cryptographic Hardware and Embedded Systems-CHES 2006. Lecture Notes in Computer Science, vol. 4249, pp. 174-186. Springer, Berlin (2006).
-
(2006)
Cryptographic Hardware and Embedded Systems-CHES 2006
, vol.4249
, pp. 174-186
-
-
Le, T.H.1
Clédière, J.2
Canovas, C.3
Robisson, B.4
Servière, C.5
Lacoume, J.L.6
-
5
-
-
27244456338
-
Ways to enhance power analysis
-
P. Lee and C. Lim (Eds.), Berlin: Springer, Lecture Notes in Computer Science
-
Bévan R., Knudsen E.: Ways to enhance power analysis. In: Lee, P., Lim, C. (eds) Information Security and Cryptology-ICISC 2002. Lecture Notes in Computer Science, vol. 2587, pp. 327-342. Springer, Berlin (2002).
-
(2002)
Information Security and Cryptology-ICISC 2002
, vol.2587
, pp. 327-342
-
-
Bévan, R.1
Knudsen, E.2
-
6
-
-
77955912333
-
-
to appear in IET Information Security, Cryptology ePrint Archive, Report 2009/449
-
Mangard, S., Oswald, E., Standaert, F. X.: One for All-All for One: Unifying Standard DPA Attacks. Cryptology ePrint Archive, Report 2009/449 (2009). http://eprint. iacr. org/, to appear in IET Information Security.
-
(2009)
One for All-All for One: Unifying Standard DPA Attacks
-
-
Mangard, S.1
Oswald, E.2
Standaert, F.X.3
-
7
-
-
27244432445
-
A stochastic model for differential side channel cryptanalysis
-
J. Rao and B. Sunar (Eds.), Berlin: Springer, Lecture Notes in Computer Science
-
Schindler W., Lemke K., Paar C.: A stochastic model for differential side channel cryptanalysis. In: Rao, J., Sunar, B. (eds) Cryptographic hardware and embedded systems-CHES 2005. Lecture Notes in Computer Science, vol 3659., Springer, Berlin (2005).
-
(2005)
Cryptographic Hardware and Embedded Systems-CHES 2005
, vol.3659
-
-
Schindler, W.1
Lemke, K.2
Paar, C.3
-
10
-
-
84887214019
-
-
Coron, J. S., Giraud, C., Prouff, E., Rivain, M.: Attack and improvement of a secure s-box calculation based on the Fourier transform. [23] 1-14.
-
Attack and improvement of a secure s-box calculation based on the Fourier transform
, vol.23
, pp. 1-14
-
-
Coron, J.S.1
Giraud, C.2
Prouff, E.3
Rivain, M.4
-
11
-
-
35248830819
-
Multiplicative masking and power analysis of AES
-
B. KaliskiJr, Ç. Koç, and C. Paar (Eds.), Berlin: Springer, Lecture Notes in Computer Science
-
Golić J., Tymen C.: Multiplicative masking and power analysis of AES. In: Kaliski, B., Koç, Ç., Paar, C. (eds) Cryptographic Hardware and Embedded Systems-CHES 2002. Lecture Notes in Computer Science, vol. 2523, pp. 198-212. Springer, Berlin (2002).
-
(2002)
Cryptographic Hardware and Embedded Systems-CHES 2002
, vol.2523
, pp. 198-212
-
-
Golić, J.1
Tymen, C.2
-
12
-
-
67049146380
-
Partition vs. comparison side-channel distinguishers: an empirical evaluation of statistical tests for univariate side-channel attacks against two unprotected CMOS devices
-
P. J. Lee and J. H. Cheon (Eds.), Berlin: Springer, Lecture Notes in Computer Science
-
Standaert F. X., Gierlichs B., Verbauwhede I.: Partition vs. comparison side-channel distinguishers: an empirical evaluation of statistical tests for univariate side-channel attacks against two unprotected CMOS devices. In: Lee, P. J., Cheon, J. H. (eds) Information Security and Cryptology-ICISC 2008 Lecture Notes in Computer Science, vol 5461., pp. 253-267. Springer, Berlin (2008).
-
(2008)
Information Security and Cryptology-ICISC 2008
, vol.5461
, pp. 253-267
-
-
Standaert, F.X.1
Gierlichs, B.2
Verbauwhede, I.3
-
13
-
-
66049085129
-
Statistical analysis of second order differential power analysis
-
Prouff E., Rivain M., Bévan R.: Statistical analysis of second order differential power analysis. IEEE Trans. Comput. 58(6), 799-811 (2009).
-
(2009)
IEEE Trans. Comput.
, vol.58
, Issue.6
, pp. 799-811
-
-
Prouff, E.1
Rivain, M.2
Bévan, R.3
-
16
-
-
79958014266
-
A Formal Study of Power Variability Issues and Side-Channel Attacks for Nanoscale Devices
-
Renauld, M., Standaert, F. X., Veyrat-Charvillon, N., Kamel, D., Flandre, D.: A Formal Study of Power Variability Issues and Side-Channel Attacks for Nanoscale Devices. Advances in Cryptology-EUROCRYPT 2011 (2011).
-
(2011)
Advances in Cryptology-EUROCRYPT 2011
-
-
Renauld, M.1
Standaert, F.X.2
Veyrat-Charvillon, N.3
Kamel, D.4
Flandre, D.5
-
17
-
-
62949217527
-
Efficient on-chip crosstalk avoidance CODEC design
-
Duan C., Calle V. H. C., Khatri S. P.: Efficient on-chip crosstalk avoidance CODEC design. IEEE Trans. VLSI Syst. 17(4), 551-560 (2009).
-
(2009)
IEEE Trans. VLSI Syst.
, vol.17
, Issue.4
, pp. 551-560
-
-
Duan, C.1
Calle, V.H.C.2
Khatri, S.P.3
-
18
-
-
0038148273
-
Analysis of dissipation energy of switching digital CMOS gates with coupled outputs
-
Moll F., Roca M., Isern E.: Analysis of dissipation energy of switching digital CMOS gates with coupled outputs. Microelectr. J. 34(9), 833-842 (2003).
-
(2003)
Microelectr. J.
, vol.34
, Issue.9
, pp. 833-842
-
-
Moll, F.1
Roca, M.2
Isern, E.3
-
19
-
-
35248896294
-
Multi-channel attacks
-
C. Walter, Ç. Koç, and C. Paar (Eds.), Berlin: Springer, Lecture Notes in Computer Science
-
Agrawal D., Rao J., Rohatgi P.: Multi-channel attacks. In: Walter, C., Koç, Ç., Paar, C. (eds) Cryptographic Hardware and Embedded Systems-CHES 2003. Lecture Notes in Computer Science, vol 2779, pp. 2-16. Springer, Berlin (2003).
-
(2003)
Cryptographic Hardware and Embedded Systems-CHES 2003
, vol.2779
, pp. 2-16
-
-
Agrawal, D.1
Rao, J.2
Rohatgi, P.3
-
21
-
-
35048819488
-
Hardware countermeasures against DPA-a statistical analysis of their effectiveness
-
T. Okamoto (Ed.), Berlin: Springer, Lecture Notes in Computer Science
-
Mangard S.: Hardware countermeasures against DPA-a statistical analysis of their effectiveness. In: Okamoto, T. (eds) Topics in Cryptology-CT-RSA 2004. Lecture Notes in Computer Science, vol. 2964, pp. 222-235. Springer, Berlin (2004).
-
(2004)
Topics in Cryptology-CT-RSA 2004
, vol.2964
, pp. 222-235
-
-
Mangard, S.1
-
23
-
-
84887213500
-
Cryptographic Hardware and Embedded Systems-CHES 2008
-
In: Oswald, E., Rohatgi, P. (eds.), Washington, DC, USA, August 10-13, 2008. Lecture Notes in Computer Science. Springer, Berlin
-
Oswald, E., Rohatgi, P. (eds.) Cryptographic Hardware and Embedded Systems-CHES 2008. In: Oswald, E., Rohatgi, P. (eds.) Proceedings of 10th International Workshop, Washington, DC, USA, August 10-13, 2008. Lecture Notes in Computer Science, vol. 5154. Springer, Berlin (2008).
-
(2008)
Proceedings of 10th International Workshop
, vol.5154
-
-
Oswald, E.1
Rohatgi, P.2
|