-
1
-
-
3042547883
-
A Fast and Secure Implementation of Sflash
-
Desmedt, Y.G. (ed.) PKC 2003. Springer, Heidelberg
-
Akkar, M.-L., Courtois, N., Duteuil, R., Goubin, L.: A Fast and Secure Implementation of Sflash. In: Desmedt, Y.G. (ed.) PKC 2003. LNCS, vol. 2567, pp. 267-278. Springer, Heidelberg (2002)
-
(2002)
LNCS
, vol.2567
, pp. 267-278
-
-
Akkar, M.-L.1
Courtois, N.2
Duteuil, R.3
Goubin, L.4
-
2
-
-
84943615552
-
An Implementation of des and AES, Secure against Some Attacks
-
Koç, Ç.K., Naccache, D., Paar, C. (eds.) CHES 2001. Springer, Heidelberg
-
Akkar, M.-L., Giraud, C.: An Implementation of DES and AES, Secure against Some Attacks. In: Koç, Ç.K., Naccache, D., Paar, C. (eds.) CHES 2001. LNCS, vol. 2162, pp. 309-318. Springer, Heidelberg (2001)
-
(2001)
LNCS
, vol.2162
, pp. 309-318
-
-
Akkar, M.-L.1
Giraud, C.2
-
3
-
-
85062838317
-
Safeguarding cryptographic keys
-
AFIPS Press, New York
-
Blakley, G.: Safeguarding cryptographic keys. In: National Comp. Conf., June 1979, vol. 48, pp. 313-317. AFIPS Press, New York (1979)
-
(1979)
National Comp. Conf., June 1979
, vol.48
, pp. 313-317
-
-
Blakley, G.1
-
4
-
-
35048848490
-
Provably SecureMasking of AES
-
Handschuh, H., Hasan, M.A. (eds.) SAC 2004. Springer, Heidelberg
-
Blömer, J., Guajardo, J., Krummel, V.: Provably SecureMasking of AES. In: Handschuh, H., Hasan, M.A. (eds.) SAC 2004. LNCS, vol. 3357, pp. 69-83. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3357
, pp. 69-83
-
-
Blömer, J.1
Guajardo, J.2
Krummel, V.3
-
5
-
-
37149045263
-
PRESENT: An Ultra-Lightweight Block Cipher
-
Paillier, P., Verbauwhede, I. (eds.) CHES 2007. Springer, Heidelberg
-
Bogdanov, A., Knudsen, L.R., Leander, G., Paar, C., Poschmann, A., Robshaw, M.J.B., Seurin, Y., Vikkelsoe, C.: PRESENT: An Ultra-Lightweight Block Cipher. In: Paillier, P., Verbauwhede, I. (eds.) CHES 2007. LNCS, vol. 4727, pp. 450-466. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4727
, pp. 450-466
-
-
Bogdanov, A.1
Knudsen, L.R.2
Leander, G.3
Paar, C.4
Poschmann, A.5
Robshaw, M.J.B.6
Seurin, Y.7
Vikkelsoe, C.8
-
6
-
-
35048818034
-
Correlation Power Analysis with a Leakage Model
-
Joye, M., Quisquater, J.-J. (eds.) CHES 2004. Springer, Heidelberg
-
Brier, E., Clavier, C., Olivier, F.: Correlation Power Analysis with a Leakage Model. In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, vol. 3156, pp. 16-29. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3156
, pp. 16-29
-
-
Brier, E.1
Clavier, C.2
Olivier, F.3
-
7
-
-
84957079591
-
Towards Sound Approaches to Counteract Power-Analysis Attacks
-
Wiener, M. (ed.) CRYPTO 1999. Springer, Heidelberg
-
Chari, S., Jutla, C.S., Rao, J.R., Rohatgi, P.: Towards Sound Approaches to Counteract Power-Analysis Attacks. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 398-412. Springer, Heidelberg (1999)
-
(1999)
LNCS
, vol.1666
, pp. 398-412
-
-
Chari, S.1
Jutla, C.S.2
Rao, J.R.3
Rohatgi, P.4
-
8
-
-
38049064396
-
Side Channel Cryptanalysis of a Higher Order Masking Scheme
-
Paillier, P., Verbauwhede, I. (eds.) CHES 2007. Springer, Heidelberg
-
Coron, J.-S., Prouff, E., Rivain, M.: Side Channel Cryptanalysis of a Higher Order Masking Scheme. In: Paillier, P., Verbauwhede, I. (eds.) CHES 2007. LNCS, vol. 4727, pp. 28-44. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4727
, pp. 28-44
-
-
Coron, J.-S.1
Prouff, E.2
Rivain, M.3
-
9
-
-
30244458561
-
The evaluation of polynomials
-
Eve, J.: The evaluation of polynomials. Comm. ACM 6(1), 17-21 (1964)
-
(1964)
Comm. ACM
, vol.6
, Issue.1
, pp. 17-21
-
-
Eve, J.1
-
10
-
-
77954640094
-
Protecting Circuits from Leakage: The Computationally-Bounded and Noisy Cases
-
Gilbert, H. (ed.) EUROCRYPT 2010. Springer, Heidelberg
-
Faust, S., Rabin, T., Reyzin, L., Tromer, E., Vaikuntanathan, V.: Protecting Circuits from Leakage: the Computationally-Bounded and Noisy Cases. In: Gilbert, H. (ed.) EUROCRYPT 2010. LNCS, vol. 6110, pp. 135-156. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.6110
, pp. 135-156
-
-
Faust, S.1
Rabin, T.2
Reyzin, L.3
Tromer, E.4
Vaikuntanathan, V.5
-
11
-
-
0003508568
-
-
FIPS PUB 46. National Bureau of Standards January
-
FIPS PUB 46. The Data Encryption Standard. National Bureau of Standards (January 1977)
-
(1977)
The Data Encryption Standard
-
-
-
12
-
-
80053472888
-
Thwarting Higher-Order Side Channel Analysis with Additive and Multiplicative Maskings
-
Preneel, B., Takagi, T. (eds.) CHES 2011. Springer, Heidelberg
-
Genelle, L., Prouff, E., Quisquater, M.: Thwarting Higher-Order Side Channel Analysis with Additive and Multiplicative Maskings. In: Preneel, B., Takagi, T. (eds.) CHES 2011. LNCS, vol. 6917, pp. 240-255. Springer, Heidelberg (2011)
-
(2011)
LNCS
, vol.6917
, pp. 240-255
-
-
Genelle, L.1
Prouff, E.2
Quisquater, M.3
-
13
-
-
84949520149
-
DES and Differential Power Analysis
-
Koç, Ç.K., Paar, C. (eds.) CHES 1999. Springer, Heidelberg
-
Goubin, L., Patarin, J.: DES and Differential Power Analysis. In: Koç, Ç.K., Paar, C. (eds.) CHES 1999. LNCS, vol. 1717, pp. 158-172. Springer, Heidelberg (1999)
-
(1999)
LNCS
, vol.1717
, pp. 158-172
-
-
Goubin, L.1
Patarin, J.2
-
14
-
-
35248830337
-
Private Circuits: Securing Hardware against Probing Attacks
-
Boneh, D. (ed.) CRYPTO 2003. Springer, Heidelberg
-
Ishai, Y., Sahai, A.,Wagner, D.: Private Circuits: Securing Hardware against Probing Attacks. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol. 2729, pp. 463-481. Springer, Heidelberg (2003)
-
(2003)
LNCS
, vol.2729
, pp. 463-481
-
-
Ishai, Y.1
Sahai, A.2
Wagner, D.3
-
15
-
-
80053483211
-
A Fast and Provably Secure Higher-Order Masking of AES S-Box
-
Preneel, B., Takagi, T. (eds.) CHES 2011. Springer, Heidelberg
-
Kim, H., Hong, S., Lim, J.: A Fast and Provably Secure Higher-Order Masking of AES S-Box. In: Preneel, B., Takagi, T. (eds.) CHES 2011. LNCS, vol. 6917, pp. 95-107. Springer, Heidelberg (2011)
-
(2011)
LNCS
, vol.6917
, pp. 95-107
-
-
Kim, H.1
Hong, S.2
Lim, J.3
-
17
-
-
0012096216
-
Evaluation of polynomials by computers
-
Knuth, D.E.: Evaluation of polynomials by computers. Comm. ACM 5(12), 595-599 (1962)
-
(1962)
Comm. ACM
, vol.5
, Issue.12
, pp. 595-599
-
-
Knuth, D.E.1
-
18
-
-
84939573910
-
Differential Power Analysis
-
Wiener, M. (ed.) CRYPTO 1999. Springer, Heidelberg
-
Kocher, P.C., Jaffe, J., Jun, B.: Differential Power Analysis. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 388-397. Springer, Heidelberg (1999)
-
(1999)
LNCS
, vol.1666
, pp. 388-397
-
-
Kocher, P.C.1
Jaffe, J.2
Jun, B.3
-
19
-
-
24144459808
-
Side-Channel Leakage of Masked CMOS Gates
-
Menezes, A. (ed.) CT-RSA 2005. Springer, Heidelberg
-
Mangard, S., Popp, T., Gammel, B.M.: Side-Channel Leakage of Masked CMOS Gates. In: Menezes, A. (ed.) CT-RSA 2005. LNCS, vol. 3376, pp. 351-365. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3376
, pp. 351-365
-
-
Mangard, S.1
Popp, T.2
Gammel, B.M.3
-
20
-
-
27244451021
-
Successfully Attacking Masked AES Hardware Implementations
-
Rao, J.R., Sunar, B. (eds.) CHES 2005. Springer, Heidelberg
-
Mangard, S., Pramstaller, N., Oswald, E.: Successfully Attacking Masked AES Hardware Implementations. In: Rao, J.R., Sunar, B. (eds.) CHES 2005. LNCS, vol. 3659, pp. 157-171. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3659
, pp. 157-171
-
-
Mangard, S.1
Pramstaller, N.2
Oswald, E.3
-
21
-
-
84974679353
-
Securing the AES Finalists Against Power Analysis Attacks
-
Schneier, B. (ed.) FSE 2000. Springer, Heidelberg
-
Messerges, T.S.: Securing the AES Finalists Against Power Analysis Attacks. In: Schneier, B. (ed.) FSE 2000. LNCS, vol. 1978, pp. 150-164. Springer, Heidelberg (2001)
-
(2001)
LNCS
, vol.1978
, pp. 150-164
-
-
Messerges, T.S.1
-
22
-
-
68549099555
-
Using Second-Order Power Analysis to Attack DPA Resistant Software
-
Paar, C., Koç, Ç.K. (eds.) CHES 2000. Springer, Heidelberg
-
Messerges, T.S.: Using Second-Order Power Analysis to Attack DPA Resistant Software. In: Paar, C., Koç, Ç.K. (eds.) CHES 2000. LNCS, vol. 1965, pp. 238-251. Springer, Heidelberg (2000)
-
(2000)
LNCS
, vol.1965
, pp. 238-251
-
-
Messerges, T.S.1
-
23
-
-
67049132511
-
Secure Hardware Implementation of Nonlinear Functions in the Presence of Glitches
-
Lee, P.J., Cheon, J.H. (eds.) ICISC 2008. Springer, Heidelberg
-
Nikova, S., Rijmen, V., Schläffer, M.: Secure Hardware Implementation of Nonlinear Functions in the Presence of Glitches. In: Lee, P.J., Cheon, J.H. (eds.) ICISC 2008. LNCS, vol. 5461, pp. 218-234. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5461
, pp. 218-234
-
-
Nikova, S.1
Rijmen, V.2
Schläffer, M.3
-
24
-
-
38049043381
-
Evaluation of the Masked Logic Style MDPL on a Prototype Chip
-
Paillier, P., Verbauwhede, I. (eds.) CHES 2007. Springer, Heidelberg
-
Popp, T., Kirschbaum, M., Zefferer, T., Mangard, S.: Evaluation of the Masked Logic Style MDPL on a Prototype Chip. In: Paillier, P., Verbauwhede, I. (eds.) CHES 2007. LNCS, vol. 4727, pp. 81-94. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4727
, pp. 81-94
-
-
Popp, T.1
Kirschbaum, M.2
Zefferer, T.3
Mangard, S.4
-
25
-
-
38549120276
-
A Generic Method for Secure SBox Implementation
-
Kim, S., Yung, M., Lee, H.-W. (eds.) WISA 2007. Springer, Heidelberg
-
Prouff, E., Rivain, M.: A Generic Method for Secure SBox Implementation. In: Kim, S., Yung, M., Lee, H.-W. (eds.) WISA 2007. LNCS, vol. 4867, pp. 227-244. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.4867
, pp. 227-244
-
-
Prouff, E.1
Rivain, M.2
-
26
-
-
50249140648
-
Block Ciphers Implementations Provably Secure Against Second Order Side Channel Analysis
-
Nyberg, K. (ed.) FSE 2008. Springer, Heidelberg
-
Rivain, M., Dottax, E., Prouff, E.: Block Ciphers Implementations Provably Secure Against Second Order Side Channel Analysis. In: Nyberg, K. (ed.) FSE 2008. LNCS, vol. 5086, pp. 127-143. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5086
, pp. 127-143
-
-
Rivain, M.1
Dottax, E.2
Prouff, E.3
-
27
-
-
78049343104
-
Provably Secure Higher-Order Masking of AES
-
Mangard, S., Standaert, F.-X. (eds.) CHES 2010. Springer, Heidelberg
-
Rivain, M., Prouff, E.: Provably Secure Higher-Order Masking of AES. In: Mangard, S., Standaert, F.-X. (eds.) CHES 2010. LNCS, vol. 6225, pp. 413-427. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.6225
, pp. 413-427
-
-
Rivain, M.1
Prouff, E.2
-
28
-
-
84946832086
-
A Compact Rijndael Hardware Architecture with S-Box Optimization
-
Boyd, C. (ed.) ASIACRYPT 2001. Springer, Heidelberg
-
Satoh, A., Morioka, S., Takano, K., Munetoh, S.: A Compact Rijndael Hardware Architecture with S-Box Optimization. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol. 2248, pp. 239-254. Springer, Heidelberg (2001)
-
(2001)
LNCS
, vol.2248
, pp. 239-254
-
-
Satoh, A.1
Morioka, S.2
Takano, K.3
Munetoh, S.4
-
29
-
-
33745652931
-
Higher Order Masking of the AES
-
Pointcheval, D. (ed.) CT-RSA 2006. Springer, Heidelberg
-
Schramm, K., Paar, C.: Higher Order Masking of the AES. In: Pointcheval, D. (ed.) CT-RSA 2006. LNCS, vol. 3860, pp. 208-225. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.3860
, pp. 208-225
-
-
Schramm, K.1
Paar, C.2
-
30
-
-
0018545449
-
How to Share a Secret
-
Shamir, A.: How to Share a Secret. Commun. ACM 22(11), 612-613 (1979)
-
(1979)
Commun. ACM
, vol.22
, Issue.11
, pp. 612-613
-
-
Shamir, A.1
-
31
-
-
0003555072
-
Efficient and Optimal Exponentiation in Finite Fields
-
von zur Gathen, J.: Efficient and Optimal Exponentiation in Finite Fields. Computational Complexity 1, 360-394 (1991)
-
(1991)
Computational Complexity
, vol.1
, pp. 360-394
-
-
Von Zur Gathen, J.1
|