-
1
-
-
84855460277
-
Probability in hashing
-
The Department of Computer Science at Chapter 18
-
The Department of Computer Science at Duke University, Discrete Mathematics for Computer Science lecture, Chapter 18: Probability in hashing (2009), http://www.cs.duke.edu/courses/cps102/spring09/Lectures/L-18.pdf
-
(2009)
Discrete Mathematics for Computer Science Lecture
-
-
-
2
-
-
0037624935
-
Error Analysis and Detection Procedures for a Hardware Implementation of the Advanced Encryption Standard
-
Bertoni, G., Breveglieri, L., Koren, I., Maistri, P., Piuri, V.: Error Analysis and Detection Procedures for a Hardware Implementation of the Advanced Encryption Standard. IEEE Trans. Computers 52(4), 492-505 (2003)
-
(2003)
IEEE Trans. Computers
, vol.52
, Issue.4
, pp. 492-505
-
-
Bertoni, G.1
Breveglieri, L.2
Koren, I.3
Maistri, P.4
Piuri, V.5
-
3
-
-
38549140491
-
Improved Side-Channel Collision Attacks on AES
-
Adams, C., Miri, A., Wiener, M. (eds.) SAC 2007. Springer, Heidelberg
-
Bogdanov, A.: Improved Side-Channel Collision Attacks on AES. In: Adams, C., Miri, A., Wiener, M. (eds.) SAC 2007. LNCS, vol. 4876, pp. 84-95. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4876
, pp. 84-95
-
-
Bogdanov, A.1
-
4
-
-
84957079591
-
Towards Sound Approaches to Counteract Power-Analysis Attacks
-
Wiener, M. (ed.) CRYPTO 1999. Springer, Heidelberg
-
Chari, S., Jutla, C.S., Rao, J.R., Rohatgi, P.: Towards Sound Approaches to Counteract Power-Analysis Attacks. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 398-412. Springer, Heidelberg (1999)
-
(1999)
LNCS
, vol.1666
, pp. 398-412
-
-
Chari, S.1
Jutla, C.S.2
Rao, J.R.3
Rohatgi, P.4
-
5
-
-
77956996186
-
Leakage-Resilient Pseudorandom Functions and Side-Channel Attacks on Feistel Networks
-
Rabin, T. (ed.) CRYPTO 2010. Springer, Heidelberg
-
Dodis, Y., Pietrzak, K.: Leakage-Resilient Pseudorandom Functions and Side-Channel Attacks on Feistel Networks. In: Rabin, T. (ed.) CRYPTO 2010. LNCS, vol. 6223, pp. 21-40. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.6223
, pp. 21-40
-
-
Dodis, Y.1
Pietrzak, K.2
-
6
-
-
57949107348
-
Leakage-Resilient Cryptography
-
IEEE Computer Society
-
Dziembowski, S., Pietrzak, K.: Leakage-Resilient Cryptography. In: FOCS, pp. 293-302. IEEE Computer Society (2008)
-
(2008)
FOCS
, pp. 293-302
-
-
Dziembowski, S.1
Pietrzak, K.2
-
7
-
-
77949749772
-
Power Analysis Resistant AES Implementation for Passive RFID Tags
-
Lackner, C., Ostermann, T., Sams, M., Spilka, R. (eds.) ISBN978-3-200-01330-8
-
Feldhofer, M., Popp, T.: Power Analysis Resistant AES Implementation for Passive RFID Tags. In: Lackner, C., Ostermann, T., Sams, M., Spilka, R. (eds.) Proceedings of Austrochip 2008, Linz, Austria, October 8, pp. 1-6 (2008) ISBN978-3-200-01330-8
-
(2008)
Proceedings of Austrochip 2008, Linz, Austria, October 8
, pp. 1-6
-
-
Feldhofer, M.1
Popp, T.2
-
8
-
-
79960091382
-
Montgomery's Trick and Fast Implementation of Masked AES
-
Nitaj, A., Pointcheval, D. (eds.) AFRICACRYPT 2011. Springer, Heidelberg
-
Genelle, L., Prouff, E., Quisquater, M.: Montgomery's Trick and Fast Implementation of Masked AES. In: Nitaj, A., Pointcheval, D. (eds.) AFRICACRYPT 2011. LNCS, vol. 6737, pp. 153-169. Springer, Heidelberg (2011)
-
(2011)
LNCS
, vol.6737
, pp. 153-169
-
-
Genelle, L.1
Prouff, E.2
Quisquater, M.3
-
9
-
-
35248830819
-
Multiplicative Masking and Power Analysis of AES
-
Kaliski Jr., B.S., Koç, Ç.K., Paar, C. (eds.) CHES 2002. Springer, Heidelberg
-
Golic, J.D., Tymen, C.: Multiplicative Masking and Power Analysis of AES. In: Kaliski Jr., B.S., Koç, Ç.K., Paar, C. (eds.) CHES 2002. LNCS, vol. 2523, pp. 198-212. Springer, Heidelberg (2003)
-
(2003)
LNCS
, vol.2523
, pp. 198-212
-
-
Golic, J.D.1
Tymen, C.2
-
10
-
-
84949520149
-
DES and Differential Power Analysis (The "Duplication"Method)
-
Koç, Ç.K., Paar, C. (eds.) CHES 1999. Springer, Heidelberg
-
Goubin, L., Patarin, J.: DES and Differential Power Analysis (The "Duplication"Method). In: Koç, Ç.K., Paar, C. (eds.) CHES 1999. LNCS, vol. 1717, pp. 158-172. Springer, Heidelberg (1999)
-
(1999)
LNCS
, vol.1717
, pp. 158-172
-
-
Goubin, L.1
Patarin, J.2
-
11
-
-
33746589805
-
An AES smart card implementation resistant to power analysis attacks
-
DOI 10.1007/11767480-16, Applied Cryptography and Network Security - 4th International Conference, ACNS 2006, Proceedings
-
Herbst, C., Oswald, E., Mangard, S.: An AES Smart Card Implementation Resistant to Power Analysis Attacks. In: Zhou, J., Yung, M., Bao, F. (eds.) ACNS 2006. LNCS, vol. 3989, pp. 239-252. Springer, Heidelberg (2006) (Pubitemid 44152821)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.3989 LNCS
, pp. 239-252
-
-
Herbst, C.1
Oswald, E.2
Mangard, S.3
-
12
-
-
0036913523
-
Concurrent error detection schemes for fault-based side-channel cryptanalysis of symmetric block ciphers
-
Karri, R., Wu, K., Mishra, P., Kim, Y.: Concurrent error detection schemes for fault-based side-channel cryptanalysis of symmetric block ciphers. IEEE Trans. on CAD of Integrated Circuits and Systems 21(12), 1509-1517 (2002)
-
(2002)
IEEE Trans. on CAD of Integrated Circuits and Systems
, vol.21
, Issue.12
, pp. 1509-1517
-
-
Karri, R.1
Wu, K.2
Mishra, P.3
Kim, Y.4
-
13
-
-
77955201139
-
Experimental Security Analysis of a Modern Automobile
-
IEEE Computer Society
-
Koscher, K., Czeskis, A., Roesner, F., Patel, S., Kohno, T., Checkoway, S., McCoy, D., Kantor, B., Anderson, D., Shacham, H., Savage, S.: Experimental Security Analysis of a Modern Automobile. In: IEEE Symposium on Security and Privacy, pp. 447-462. IEEE Computer Society (2010)
-
(2010)
IEEE Symposium on Security and Privacy
, pp. 447-462
-
-
Koscher, K.1
Czeskis, A.2
Roesner, F.3
Patel, S.4
Kohno, T.5
Checkoway, S.6
McCoy, D.7
Kantor, B.8
Anderson, D.9
Shacham, H.10
Savage, S.11
-
14
-
-
35048824462
-
Enhancing Collision Attacks
-
Joye, M., Quisquater, J.-J. (eds.) CHES 2004. Springer, Heidelberg
-
Ledig, H., Muller, F., Valette, F.: Enhancing Collision Attacks. In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, vol. 3156, pp. 176-190. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3156
, pp. 176-190
-
-
Ledig, H.1
Muller, F.2
Valette, F.3
-
15
-
-
35248892041
-
A Simple Power-Analysis (SPA) Attackon Implementations of the AES Key Expansion
-
Lee, P.J., Lim, C.H. (eds.) ICISC 2002. Springer, Heidelberg
-
Mangard, S.: A Simple Power-Analysis (SPA) Attackon Implementations of the AES Key Expansion. In: Lee, P.J., Lim, C.H. (eds.) ICISC 2002. LNCS, vol. 2587, pp. 343-358. Springer, Heidelberg (2003)
-
(2003)
LNCS
, vol.2587
, pp. 343-358
-
-
Mangard, S.1
-
16
-
-
79960079027
-
-
CHES 2010. Springer, Heidelberg
-
Mangard, S., Standaert, F.-X. (eds.): CHES 2010. LNCS, vol. 6225. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.6225
-
-
Mangard, S.1
Standaert, F.-X.2
-
17
-
-
72249120150
-
All-or-Nothing Transforms as a Countermeasure to Differential Side-Channel Analysis
-
ePrint Archive, Report 2009/185
-
McEvoy, R.P., Tunstall, M., Whelan, C., Murphy, C.C., Marnane, W.P.: All-or-Nothing Transforms as a Countermeasure to Differential Side-Channel Analysis. Cryptology ePrint Archive, Report 2009/185 (2009), http://eprint.iacr.org/
-
(2009)
Cryptology
-
-
McEvoy, R.P.1
Tunstall, M.2
Whelan, C.3
Murphy, C.C.4
Marnane, W.P.5
-
18
-
-
80053533371
-
Extractors against Side-Channel Attacks: Weak or Strong?
-
Preneel, B., Takagi, T. (eds.) CHES 2011. Springer, Heidelberg
-
Medwed, M., Standaert, F.-X.: Extractors against Side-Channel Attacks: Weak or Strong? In: Preneel, B., Takagi, T. (eds.) CHES 2011. LNCS, vol. 6917, pp. 256-272. Springer, Heidelberg (2011)
-
(2011)
LNCS
, vol.6917
, pp. 256-272
-
-
Medwed, M.1
Standaert, F.-X.2
-
19
-
-
77953509171
-
Fresh Re-keying: Security against Side-Channel and Fault Attacks for Low-Cost Devices
-
Bernstein, D.J., Lange, T. (eds.) AFRICACRYPT 2010. Springer, Heidelberg
-
Medwed, M., Standaert, F.-X., Großschädl, J., Regazzoni, F.: Fresh Re-keying: Security against Side-Channel and Fault Attacks for Low-Cost Devices. In: Bernstein, D.J., Lange, T. (eds.) AFRICACRYPT 2010. LNCS, vol. 6055, pp. 279-296. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.6055
, pp. 279-296
-
-
Medwed, M.1
Standaert, F.-X.2
Großschädl, J.3
Regazzoni, F.4
-
20
-
-
78049331666
-
Algebraic Side-Channel Analysis in the Presence of Errors
-
Mangard, Standaert (eds.) [16]
-
Oren, Y., Kirschbaum, M., Popp, T., Wool, A.: Algebraic Side-Channel Analysis in the Presence of Errors. In: Mangard, Standaert (eds.) [16], pp. 428-442
-
LNCS
, pp. 428-442
-
-
Oren, Y.1
Kirschbaum, M.2
Popp, T.3
Wool, A.4
-
21
-
-
67650675583
-
A Leakage-Resilient Mode of Operation
-
Joux, A. (ed.) EUROCRYPT 2009. Springer, Heidelberg
-
Pietrzak, K.: A Leakage-Resilient Mode of Operation. In: Joux, A. (ed.) EUROCRYPT 2009. LNCS, vol. 5479, pp. 462-482. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5479
, pp. 462-482
-
-
Pietrzak, K.1
-
22
-
-
80055006043
-
Hardware Implementation of a Flexible Tag Platform for Passive RFID Devices
-
IEEE Computer Society
-
Plos, T., Feldhofer, M.: Hardware Implementation of a Flexible Tag Platform for Passive RFID Devices. In: Proceedings of the 14th Euromicro Conference on Digital System Design Architectures, Methods and Tools (DSD 2011), Oulu, Finland, August 2010, pp. xxx-xxx. IEEE Computer Society (2011)
-
(2011)
Proceedings of the 14th Euromicro Conference on Digital System Design Architectures, Methods and Tools (DSD 2011), Oulu, Finland, August 2010
-
-
Plos, T.1
Feldhofer, M.2
-
23
-
-
70350576829
-
Algebraic Side-Channel Attacks on the AES: Why Time also Matters in DPA
-
Clavier, C., Gaj, K. (eds.) CHES 2009. Springer, Heidelberg
-
Renauld, M., Standaert, F.-X., Veyrat-Charvillon, N.: Algebraic Side-Channel Attacks on the AES: Why Time also Matters in DPA. In: Clavier, C., Gaj, K. (eds.) CHES 2009. LNCS, vol. 5747, pp. 97-111. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5747
, pp. 97-111
-
-
Renauld, M.1
Standaert, F.-X.2
Veyrat-Charvillon, N.3
-
24
-
-
78049343104
-
Provably Secure Higher-Order Masking of AES
-
Mangard, Standaert (eds.) [16]
-
Rivain, M., Prouff, E.: Provably Secure Higher-Order Masking of AES. In: Mangard, Standaert (eds.) [16], pp. 413-427
-
LNCS
, pp. 413-427
-
-
Rivain, M.1
Prouff, E.2
-
25
-
-
0242571732
-
A New Class of Collision Attacks and Its Application to des
-
Johansson, T. (ed.) FSE 2003. Springer, Heidelberg
-
Schramm, K., Wollinger, T., Paar, C.: A New Class of Collision Attacks and Its Application to DES. In: Johansson, T. (ed.) FSE 2003. LNCS, vol. 2887, pp. 206-222. Springer, Heidelberg (2003)
-
(2003)
LNCS
, vol.2887
, pp. 206-222
-
-
Schramm, K.1
Wollinger, T.2
Paar, C.3
-
27
-
-
84998557355
-
Leakage Resilient Cryptography in Practice
-
(book chapter), Springer, Heidelberg
-
Standaert, F.-X., Pereira, O., Yu, Y., Quisquater, J.-J., Yung, M., Oswald, E.: Leakage Resilient Cryptography in Practice. In: Towards Hardware Intrinsic Security: Foundation and Practice (book chapter), pp. 105-139. Springer, Heidelberg (2010)
-
(2010)
Towards Hardware Intrinsic Security: Foundation and Practice
, pp. 105-139
-
-
Standaert, F.-X.1
Pereira, O.2
Yu, Y.3
Quisquater, J.-J.4
Yung, M.5
Oswald, E.6
-
28
-
-
35248825993
-
Securing Encryption Algorithms against DPA at the Logic Level: Next Generation Smart Card Technology
-
Walter, C.D., Koç, Ç.K., Paar, C. (eds.) CHES 2003. Springer, Heidelberg
-
Tiri, K., Verbauwhede, I.: Securing Encryption Algorithms against DPA at the Logic Level: Next Generation Smart Card Technology. In:Walter, C.D., Koç, Ç.K., Paar, C. (eds.) CHES 2003. LNCS, vol. 2779, pp. 125-136. Springer, Heidelberg (2003)
-
(2003)
LNCS
, vol.2779
, pp. 125-136
-
-
Tiri, K.1
Verbauwhede, I.2
-
29
-
-
3042604811
-
A Logic Level Design Methodology for a Secure DPA Resistant ASIC or FPGA Implementation
-
IEEE Computer Society
-
Tiri, K., Verbauwhede, I.: A Logic Level Design Methodology for a Secure DPA Resistant ASIC or FPGA Implementation. In: DATE, pp. 246-251. IEEE Computer Society (2004)
-
(2004)
DATE
, pp. 246-251
-
-
Tiri, K.1
Verbauwhede, I.2
-
30
-
-
84885047110
-
Side Channel Analysis, Fault Injection and Applications - A Computationally Feasible SPA Attack on AES via Optimized Search
-
Sasaki, R., Qing, S., Okamoto, E., Yoshiura, H. (eds.) Springer, Heidelberg
-
VanLaven, J., Brehob, M., Compton, K.J.: Side Channel Analysis, Fault Injection and Applications - A Computationally Feasible SPA Attack on AES via Optimized Search. In: Sasaki, R., Qing, S., Okamoto, E., Yoshiura, H. (eds.) SEC, pp. 577-588. Springer, Heidelberg (2005)
-
(2005)
SEC
, pp. 577-588
-
-
VanLaven, J.1
Brehob, M.2
Compton, K.J.3
-
31
-
-
78650013814
-
Practical leakage-resilient pseudorandom generators
-
Al-Shaer, E., Keromytis, A.D., Shmatikov, V. (eds.) ACM
-
Yu, Y., Standaert, F.-X., Pereira, O., Yung, M.: Practical leakage-resilient pseudorandom generators. In: Al-Shaer, E., Keromytis, A.D., Shmatikov, V. (eds.) ACM Conference on Computer and Communications Security, pp. 141-151. ACM (2010)
-
(2010)
ACM Conference on Computer and Communications Security
, pp. 141-151
-
-
Yu, Y.1
Standaert, F.-X.2
Pereira, O.3
Yung, M.4
|