-
1
-
-
3042690263
-
The em side-channel(s)
-
In Ç. K. Koç and C. Paar, editors,Springer-Verlag
-
D. Agrawal, B. Archambeault, J. R. Rao, and P. Rohatgi. The EM Side-Channel(s). In Ç. K. Koç and C. Paar, editors, Cryptographic Hardware and Embedded Systems-CHES 2002. Springer-Verlag, 2002.
-
(2002)
Cryptographic Hardware and Embedded Systems-CHES 2002
-
-
Agrawal, D.1
Archambeault, B.2
Rao, J.R.3
Rohatgi, P.4
-
5
-
-
68549105908
-
On boolean and arithmetic masking against differential power analysis
-
In Ç. K. Koç and C. Paar, editors, Springer-Verlag
-
C. Clavier and J.-S. Coron. On Boolean and Arithmetic Masking against Differential Power Analysis. In Ç. K. Koç and C. Paar, editors, Cryptographic Hardware and Embedded Systems-CHES 2000, volume LNCS 1965, pages 231-237. Springer-Verlag, 2000.
-
(2000)
Cryptographic Hardware and Embedded Systems-CHES 2000, Volume LNCS 1965
, pp. 231-237
-
-
Clavier, C.1
Coron, J.-S.2
-
6
-
-
68549099548
-
Differential power analysis in the presence of hardware countermeasures
-
In Ç. K. Koç and C. Paar, editors,Springer-Verlag
-
C. Clavier, J.S. Coron, and N. Dabbous. Differential Power Analysis in the Presence of Hardware Countermeasures. In Ç. K. Koç and C. Paar, editors, Cryptographic Hardware and Embedded Systems-CHES 2000, volume LNCS 1965, pages 252-263. Springer-Verlag, 2000.
-
(2000)
Cryptographic Hardware and Embedded Systems-CHES 2000, Volume LNCS 1965
, pp. 252-263
-
-
Clavier, C.1
Coron, J.S.2
Dabbous, N.3
-
7
-
-
84957079591
-
Towards sound approaches to counteract power-analysis attacks
-
Springer-Verlag, August
-
S. Chari, C. S. Jutla, J. R. Rao, , and P. Rohatgi. Towards Sound Approaches to Counteract Power-Analysis Attacks. In Advances in Cryptology-CRYPTO '99, volume LNCS 1666, pages 398-412. Springer-Verlag, August 1999.
-
(1999)
Advances in Cryptology-CRYPTO '99, Volume LNCS 1666
, pp. 398-412
-
-
Chari, S.1
Jutla, C.S.2
Rao, J.R.3
Rohatgi, P.4
-
8
-
-
35248899532
-
Template attacks
-
In Ç. K. Koç and C. Paar, editors,Springer-Verlag
-
S. Chari, J.R. Rao, and P. Rohatgi. Template Attacks. In Ç. K. Koç and C. Paar, editors, Cryptographic Hardware and Embedded Systems-CHES 2002, pages 13-28. Springer-Verlag, 2002.
-
(2002)
Cryptographic Hardware and Embedded Systems-CHES 2002
, pp. 13-28
-
-
Chari, S.1
Rao, J.R.2
Rohatgi, P.3
-
9
-
-
35248883440
-
A new algorithm for switching from arithmetic to boolean masking
-
In Ç. K. Koç and C. Paar, editors,Springer-Verlag
-
J.-S. Coron and A. Tchulkine. A New Algorithm for Switching from Arithmetic to Boolean Masking. In Ç. K. Koç and C. Paar, editors, Cryptographic Hardware and Embedded Systems-CHES 2003, pages 89-97. Springer-Verlag, 2003.
-
(2003)
Cryptographic Hardware and Embedded Systems-CHES 2003
, pp. 89-97
-
-
Coron, J.-S.1
Tchulkine, A.2
-
11
-
-
27544466109
-
A practical implementation of the timing attack
-
Universiteé catholique de Louvain (UCL), Place du Levant, 3 B-1348 Louvain-la-Neuve, Belgium
-
J.-F. Dhem, F. Koene, P.-A. Leroux, P. Mestré, J.-J. Quisquater, and J.L. Willems. A practical implementation of the timing attack. UCL Crypto Group Technical Report Series CG-1998/1, Universiteé catholique de Louvain (UCL), Place du Levant, 3 B-1348 Louvain-la-Neuve, Belgium, 1998.
-
(1998)
UCL Crypto Group Technical Report Series CG-1998/1
-
-
Dhem, J.-F.1
Koene, F.2
Leroux, P.-A.3
Mestré, P.4
Quisquater, J.-J.5
Willems, J.L.6
-
12
-
-
0348175848
-
RIPEMD with two-round compress function is not collision-free
-
H. Dobbertin. RIPEMD with two-round compress function is not collision-free. Journal of Cryptology, 1051-68, 1997.
-
(1997)
Journal of Cryptology
, vol.10
, pp. 51-68
-
-
Dobbertin, H.1
-
14
-
-
84944879586
-
A sound method for switching between boolean and arithmetic masking
-
In Ç. K. Koç and C. Paar, editors, Springer-Verlag
-
L. Goubin. A Sound Method for Switching between Boolean and Arithmetic Masking. In Ç. K. Koç and C. Paar, editors, Cryptographic Hardware and Embedded Systems-CHES 2001, pages 3-15. Springer-Verlag, 2001.
-
(2001)
Cryptographic Hardware and Embedded Systems-CHES 2001
, pp. 3-15
-
-
Goubin, L.1
-
15
-
-
84949520149
-
DES and differential power analysis the duplication method
-
In Ç. K. Koç and C. Paar, editors,Springer-Verlag
-
L. Goubin and J. Patarin. DES and differential power analysis the duplication method. In Ç. K. Koç and C. Paar, editors, Cryptographic Hardware and Embedded Systems-CHES 1999, volume LNCS 1717, pages 158-172. Springer-Verlag, 1999.
-
(1999)
Cryptographic Hardware and Embedded Systems-CHES 1999, Volume LNCS 1717
, pp. 158-172
-
-
Goubin, L.1
Patarin, J.2
-
16
-
-
84889770208
-
-
Technical Information-GSM System Security Study, 1998
-
Technical Information-GSM System Security Study, 1998. jya.com/ gsm061088.htm.
-
-
-
-
18
-
-
0003989443
-
-
Manuscript, Cryptography Research, Inc
-
P. Kocher, J. Jaffe, and B. Jun. Introduction to Differential Power Analysis and Related Attacks. www.cryptography.com/dpa/technical, 1998. Manuscript, Cryptography Research, Inc.
-
(1998)
Introduction to Differential Power Analysis and Related Attacks
-
-
Kocher, P.1
Jaffe, J.2
Jun, B.3
-
19
-
-
84939573910
-
Differential power analysis
-
Springer-Verlag
-
P. Kocher, J. Jaffe, and B. Jun. Differential Power Analysis. In Advances in Cryptology-CRYPTO '99, volume LNCS 1666, pages 388-397. Springer-Verlag, 1999.
-
(1999)
Advances in Cryptology-CRYPTO '99, Volume LNCS 1666
, pp. 388-397
-
-
Kocher, P.1
Jaffe, J.2
Jun, B.3
-
20
-
-
84943632039
-
Timing attacks on implementations of diffie-hellman, rsa, dss, and other systems
-
Springer-Verlag
-
P. Kocher. Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems. In Advances in Cryptology-CRYPTO '96, volume LNCS 1666, pages 104-113. Springer-Verlag, 1996.
-
(1996)
Advances in Cryptology-CRYPTO '96, Volume LNCS 1666
, pp. 104-113
-
-
Kocher, P.1
-
21
-
-
27244440754
-
DPA on n-bit sized Boolean and Arithmetic Operations and its Application to IDEA, RC6 and the HMACConstruction
-
Springer-Verlag, August
-
K. Lemke, K. Schramm, and C. Paar. DPA on n-bit sized Boolean and Arithmetic Operations and its Application to IDEA, RC6 and the HMACConstruction. In Cryptographic Hardware and Embedded Systems-CHES '04. Springer-Verlag, August 2004.
-
(2004)
Cryptographic Hardware and Embedded Systems-CHES '04
-
-
Lemke, K.1
Schramm, K.2
Paar, C.3
-
23
-
-
68549099555
-
Using second-order power analysis to attack dpa resistant software
-
In Ç. K. Koç and C. Paar, editors,Springer-Verlag
-
T. S. Messerges. Using Second-Order Power Analysis to Attack DPA Resistant Software. In Ç. K. Koç and C. Paar, editors, Cryptographic Hardware and Embedded Systems-CHES 2000, volume LNCS 1965, pages 238-251. Springer-Verlag, 2000.
-
(2000)
Cryptographic Hardware and Embedded Systems-CHES 2000, Volume LNCS 1965
, pp. 238-251
-
-
Messerges, T.S.1
-
24
-
-
68549126765
-
Smartly analyzing the simplicity and the power of simple power analysis on smart cards
-
In Ç. K. Koç and C. Paar, editors, Springer-Verlag
-
R. Mayer-Sommer. Smartly Analyzing the Simplicity and the Power of Simple Power Analysis on Smart Cards. In Ç. K. Koç and C. Paar, editors, Cryptographic Hardware and Embedded Systems-CHES 2000, volume LNCS 1965, pages 78-92. Springer-Verlag, 2000.
-
(2000)
Cryptographic Hardware and Embedded Systems-CHES 2000, Volume LNCS 1965
, pp. 78-92
-
-
Mayer-Sommer, R.1
-
25
-
-
0003629991
-
-
NIST FIPS PUB 180-1.National Bureau of Standards, U.S. Department of Commerce, Washington D.C., April
-
NIST FIPS PUB 180-1. Secure Hash Standard. Federal Information Processing Standards, National Bureau of Standards, U.S. Department of Commerce, Washington D.C., April 1995.
-
(1995)
Secure Hash Standard. Federal Information Processing Standards
-
-
-
27
-
-
68549092451
-
A timing attack against rsa with the chinese remainder theorem
-
In C.K. Koç and C. Paar, editors,Springer-Verlag
-
Werner Schindler. A timing attack against rsa with the chinese remainder theorem. In C.K. Koç and C. Paar, editors, Cryptographic Hardware and Embedded Systems-CHES 2000, volume 1965 of LNCS, pages 109-124. Springer-Verlag, 2000.
-
(2000)
Cryptographic Hardware and Embedded Systems-CHES 2000, Volume 1965 of LNCS
, pp. 109-124
-
-
Schindler, W.1
-
28
-
-
84958960266
-
A combined timing and power attack
-
In Pascal Paillier David Naccache, editor,Springer-Verlag
-
Werner Schindler. A combined timing and power attack. In Pascal Paillier David Naccache, editor, Public Key Cryptography, 5th International Workshop on Practice and Theory in Public Key Cryptosystems, PKC 2002, volume 2274 of LNCS, pages 263-279. Springer-Verlag, 2002.
-
(2002)
Public Key Cryptography, 5th International Workshop on Practice and Theory in Public Key Cryptosystems, PKC 2002, Volume 2274 of LNCS
, pp. 263-279
-
-
Schindler, W.1
-
30
-
-
18844409918
-
-
UCL Crypto Group Technical Report Series CG-2001/3, Universiteé catholique de Louvain (UCL), Place du Levant, 3 B-1348 Louvain-la-Neuve, Belgium
-
Werner Schindler, Francois Koene, and Jean-Jacques Quisquater. Unleashing the full power of timing attack. UCL Crypto Group Technical Report Series CG-2001/3, Universiteé catholique de Louvain (UCL), Place du Levant, 3 B-1348 Louvain-la-Neuve, Belgium, 2001.
-
(2001)
Unleashing the Full Power of Timing Attack
-
-
Schindler, W.1
Koene, F.2
Quisquater, J.-J.3
-
32
-
-
33645591077
-
More detail for a combined timing and power attack against implementations of rsa
-
In K. G. Paterson, editor,Springer-Verlag
-
Werner Schindler and Colin D. Walter. More detail for a combined timing and power attack against implementations of rsa. In K. G. Paterson, editor, Cryptography and Coding 2003, volume 2898 of LNCS, pages 245-263. Springer-Verlag, 2003.
-
(2003)
Cryptography and Coding 2003, Volume 2898 of LNCS
, pp. 245-263
-
-
Schindler, W.1
Walter, C.D.2
-
33
-
-
0242571732
-
A new class of collision attacks and its application to des
-
Springer-Verlag, February
-
K. Schramm, T. Wollinger, and C. Paar. A New Class of Collision Attacks and its Application to DES. In Thomas Johansson, editor, Fast Software Encryption-FSE '03, volume LNCS 2887, pages 206-222. Springer-Verlag, February 2003.
-
(2003)
Thomas Johansson, Editor, Fast Software Encryption-FSE '03, Volume LNCS 2887
, pp. 206-222
-
-
Schramm, K.1
Wollinger, T.2
Paar, C.3
-
37
-
-
35048894566
-
Partial collision search by side channel analysis
-
January. Horst Görtz Institute, Bochum, Germany
-
A. Wiemers. Partial Collision Search by Side Channel Analysis. Presentation at the Workshop Smartcards and Side Channel Attacks, January 2003. Horst Görtz Institute, Bochum, Germany.
-
(2003)
Workshop Smartcards and Side Channel Attacks
-
-
Wiemers, A.1
|