-
2
-
-
68549099548
-
Differential power analysis in the presence of hardware countermeasures
-
LNCS
-
C. Clavier, J.-S. Coron, and N. Dabbous Differential power analysis in the presence of hardware countermeasures CHES 2000 LNCS 1965 2000 252 263
-
(2000)
CHES 2000
, vol.1965
, pp. 252-263
-
-
Clavier, C.1
Coron, J.-S.2
Dabbous, N.3
-
3
-
-
38049074796
-
Power and em attacks on passive 13.56 MHz RFID devices
-
LNCS
-
M. Hutter, S. Mangard, and M. Feldhofer Power and EM attacks on passive 13.56 MHz RFID devices CHES 2007 LNCS 4727 2007 320 333
-
(2007)
CHES 2007
, vol.4727
, pp. 320-333
-
-
Hutter, M.1
Mangard, S.2
Feldhofer, M.3
-
4
-
-
84867332307
-
-
ISO/ICE 10373-6, 2001. International Organization for standardization: ISO/IEC 10373-6 Identification cards - test methods. Part 6. Proximity cards
-
ISO/ICE 10373-6, 2001. International Organization for standardization: ISO/IEC 10373-6 Identification cards - test methods. Part 6. Proximity cards.
-
-
-
-
5
-
-
84867333976
-
-
ISO/IEC 7816, 1999. International Organization for Standardization: ISO/IEC 7816 Identification cards - integrated circuit(s) with contacts
-
ISO/IEC 7816, 1999. International Organization for Standardization: ISO/IEC 7816 Identification cards - integrated circuit(s) with contacts.
-
-
-
-
6
-
-
84867332308
-
-
ISO/IEC 14443, 2001. International Organization for Standardization: ISO/IEC 14443 Identification cards - contactless integrated circuit(s) cards - proximity cards
-
ISO/IEC 14443, 2001. International Organization for Standardization: ISO/IEC 14443 Identification cards - contactless integrated circuit(s) cards - proximity cards.
-
-
-
-
7
-
-
84867336271
-
-
ISO/IEC 18033-3, 2005. Information technology - security techniques - encryption algorithms. Part 3. Block ciphers
-
ISO/IEC 18033-3, 2005. Information technology - security techniques - encryption algorithms. Part 3. Block ciphers.
-
-
-
-
8
-
-
76649098851
-
EM side-channel attacks on commercial contactless smartcards using low-cost equipment
-
LNCS
-
T. Kasper, D. Oswald, and C. Paar EM side-channel attacks on commercial contactless smartcards using low-cost equipment WISA 2009 LNCS 5932 2009 79 93
-
(2009)
WISA 2009
, vol.5932
, pp. 79-93
-
-
Kasper, T.1
Oswald, D.2
Paar, C.3
-
9
-
-
84856099707
-
Side-channel analysis of cryptographic RFIDs with analog demodulation
-
LNCS
-
T. Kasper, D. Oswald, and C. Paar Side-channel analysis of cryptographic RFIDs with analog demodulation RFIDSec 2011 LNCS 7055 2012 61 77
-
(2012)
RFIDSec 2011
, vol.7055
, pp. 61-77
-
-
Kasper, T.1
Oswald, D.2
Paar, C.3
-
11
-
-
79957539694
-
Enhancement of simple electro-magnetic attacks by pre-characterization in frequency domain and demodulation techniques
-
O. Meynard, D. Réal, F. Flament, S. Guilley, N. Homma, and J.-L. Danger Enhancement of simple electro-magnetic attacks by pre-characterization in frequency domain and demodulation techniques DATE 2011 2011 1004 1009
-
(2011)
DATE 2011
, pp. 1004-1009
-
-
Meynard, O.1
Réal, D.2
Flament, F.3
Guilley, S.4
Homma, N.5
Danger, J.-L.6
-
13
-
-
84867336272
-
-
NIST, 2009. FIPS PUB 140-3 (revised draft), Security Requirements for Cryptographic Module
-
NIST, 2009. FIPS PUB 140-3 (revised draft), Security Requirements for Cryptographic Module.
-
-
-
-
14
-
-
80053475909
-
Breaking Mifare DESFire MF3ICD40: Power analysis and templates in the real world
-
LNCS
-
D. Oswald, and C. Paar Breaking Mifare DESFire MF3ICD40: power analysis and templates in the real world CHES 2011 LNCS 6917 2011 207 222
-
(2011)
CHES 2011
, vol.6917
, pp. 207-222
-
-
Oswald, D.1
Paar, C.2
-
15
-
-
76649083925
-
On comparing side-channel preprocessing techniques for attacking RFID devices
-
LNCS
-
T. Plos, M. Hutter, and M. Feldhofer On comparing side-channel preprocessing techniques for attacking RFID devices WISA 2009 LNCS 5932 2009 163 177
-
(2009)
WISA 2009
, vol.5932
, pp. 163-177
-
-
Plos, T.1
Hutter, M.2
Feldhofer, M.3
-
16
-
-
67650119031
-
Evaluation of the detached power supply as side-channel analysis countermeasure for passive UHF RFID tags
-
LNCS
-
T. Plos Evaluation of the detached power supply as side-channel analysis countermeasure for passive UHF RFID tags CT-RSA LNCS 5473 2009 444 458
-
(2009)
CT-RSA
, vol.5473
, pp. 444-458
-
-
Plos, T.1
-
17
-
-
49749140694
-
Defeating classical hardware countermeasures: A new processing for side channel analysis
-
D. Réal, C. Canovas, J. Clédière, M. Drissi, and F. Valette Defeating classical hardware countermeasures: a new processing for side channel analysis DATE 2008 2008 1274 1279
-
(2008)
DATE 2008
, pp. 1274-1279
-
-
Réal, D.1
Canovas, C.2
Clédière, J.3
Drissi, M.4
Valette, F.5
-
18
-
-
68549107606
-
Protecting smart cards from passive power analysis with detached power supplies
-
LNCS
-
A. Shamir protecting smart cards from passive power analysis with detached power supplies CHES 2000 LNCS 1965 2000 71 77
-
(2000)
CHES 2000
, vol.1965
, pp. 71-77
-
-
Shamir, A.1
-
19
-
-
23944505198
-
Side channel cryptanalysis on SEED
-
LNCS 2004
-
H. Yoo, C. Kim, J. Ha, S.-J. Moon, and I. Park Side channel cryptanalysis on SEED WISA 2004 LNCS 3325 2004 411 424 2004
-
(2004)
WISA 2004
, vol.3325
, pp. 411-424
-
-
Yoo, H.1
Kim, C.2
Ha, J.3
Moon, S.-J.4
Park, I.5
|