-
1
-
-
84875112494
-
-
http://point-at-infinity.org/avraes/
-
-
-
-
2
-
-
35048818034
-
Correlation Power Analysis with a Leakage Model
-
Joye, M., Quisquater, J.-J. (eds.) CHES 2004. Springer, Heidelberg
-
Brier, E., Clavier, C., Olivier, F.: Correlation Power Analysis with a Leakage Model. In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, vol. 3156, pp. 16-29. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3156
, pp. 16-29
-
-
Brier, E.1
Clavier, C.2
Olivier, F.3
-
3
-
-
84957079591
-
Towards Sound Approaches to Counteract Power-Analysis Attacks
-
Wiener, M. (ed.) CRYPTO 1999. Springer, Heidelberg
-
Chari, S., Jutla, C.S., Rao, J.R., Rohatgi, P.: Towards Sound Approaches to Counteract Power-Analysis Attacks. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 398-412. Springer, Heidelberg (1999)
-
(1999)
LNCS
, vol.1666
, pp. 398-412
-
-
Chari, S.1
Jutla, C.S.2
Rao, J.R.3
Rohatgi, P.4
-
4
-
-
35248899532
-
Template Attacks
-
Kaliski Jr., B.S., Koç, Ç.K., Paar, C. (eds.) CHES 2002. Springer, Heidelberg
-
Chari, S., Rao, J.R., Rohatgi, P.: Template Attacks. In: Kaliski Jr., B.S., Koç, Ç.K., Paar, C. (eds.) CHES 2002. LNCS, vol. 2523, pp. 13-28. Springer, Heidelberg (2003)
-
(2003)
LNCS
, vol.2523
, pp. 13-28
-
-
Chari, S.1
Rao, J.R.2
Rohatgi, P.3
-
5
-
-
68549099548
-
Differential Power Analysis in the Presence of Hardware Countermeasures
-
Cryptographic Hardware and Embedded Systems - CHES 2000 Second International Workshop Worcester, MA, USA, August 17-18, 2000 Proceedings
-
Clavier, C., Coron, J.-S., Dabbous, N.: Differential Power Analysis in the Presence of Hardware Countermeasures. In: Koç, Ç.K., Paar, C. (eds.) CHES 2000. LNCS, vol. 1965, pp. 252-263. Springer, Heidelberg (2000) (Pubitemid 33213973)
-
(2000)
LECTURE NOTES in COMPUTER SCIENCE
, Issue.1965
, pp. 252-263
-
-
Clavier, C.1
Coron, J.-S.2
Dabbous, N.3
-
6
-
-
70350589242
-
An Efficient Method for Random Delay Generation in Embedded Software
-
Clavier, C., Gaj, K. (eds.) CHES 2009. Springer, Heidelberg
-
Coron, J.-S., Kizhvatov, I.: An Efficient Method for Random Delay Generation in Embedded Software. In: Clavier, C., Gaj, K. (eds.) CHES 2009. LNCS, vol. 5747, pp. 156-170. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5747
, pp. 156-170
-
-
Coron, J.-S.1
Kizhvatov, I.2
-
7
-
-
78049335572
-
Analysis and Improvement of the Random Delay Countermeasure of CHES 2009
-
Mangard, S., Standaert, F.-X. (eds.) CHES 2010. Springer, Heidelberg
-
Coron, J.-S., Kizhvatov, I.: Analysis and Improvement of the Random Delay Countermeasure of CHES 2009. In: Mangard, S., Standaert, F.-X. (eds.) CHES 2010. LNCS, vol. 6225, pp. 95-109. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.6225
, pp. 95-109
-
-
Coron, J.-S.1
Kizhvatov, I.2
-
8
-
-
26444614207
-
SCARE of the DES
-
Ioannidis, J., Keromytis, A.D., Yung, M. (eds.) ACNS 2005. Springer, Heidelberg
-
Daudigny, R., Ledig, H., Muller, F., Valette, F.: SCARE of the DES. In: Ioannidis, J., Keromytis, A.D., Yung, M. (eds.) ACNS 2005. LNCS, vol. 3531, pp. 393-406. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3531
, pp. 393-406
-
-
Daudigny, R.1
Ledig, H.2
Muller, F.3
Valette, F.4
-
9
-
-
83755165071
-
Univariate side channel attacks and leakage modeling
-
Doget, J., Prouff, E., Rivain, M., Standaert, F.-X.: Univariate side channel attacks and leakage modeling. J. Cryptographic Engineering 1(2), 123-144 (2011)
-
(2011)
J. Cryptographic Engineering
, vol.1
, Issue.2
, pp. 123-144
-
-
Doget, J.1
Prouff, E.2
Rivain, M.3
Standaert, F.-X.4
-
10
-
-
78650663547
-
Building a Side Channel Based Disassembler
-
Eisenbarth, T., Paar, C., Weghenkel, B.: Building a Side Channel Based Disassembler. Transactions on Computational Science 10, 78-99 (2010)
-
(2010)
Transactions on Computational Science
, vol.10
, pp. 78-99
-
-
Eisenbarth, T.1
Paar, C.2
Weghenkel, B.3
-
11
-
-
79958785692
-
Formal Framework for the Evaluation of Waveform Resynchronization Algorithms
-
Ardagna, C.A., Zhou, J. (eds.) WISTP 2011. Springer, Heidelberg
-
Guilley, S., Khalfallah, K., Lomne, V., Danger, J.-L.: Formal Framework for the Evaluation of Waveform Resynchronization Algorithms. In: Ardagna, C.A., Zhou, J. (eds.) WISTP 2011. LNCS, vol. 6633, pp. 100-115. Springer, Heidelberg (2011)
-
(2011)
LNCS
, vol.6633
, pp. 100-115
-
-
Guilley, S.1
Khalfallah, K.2
Lomne, V.3
Danger, J.-L.4
-
12
-
-
77955916818
-
Defeating Any Secret Cryptography with SCARE Attacks
-
Abdalla, M., Barreto, P.S.L.M. (eds.) LATINCRYPT 2010. Springer, Heidelberg
-
Guilley, S., Sauvage, L., Micolod, J., Rȩal, D., Valette, F.: Defeating Any Secret Cryptography with SCARE Attacks. In: Abdalla, M., Barreto, P.S.L.M. (eds.) LATINCRYPT 2010. LNCS, vol. 6212, pp. 273-293. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.6212
, pp. 273-293
-
-
Guilley, S.1
Sauvage, L.2
Micolod, J.3
Rȩal, D.4
Valette, F.5
-
13
-
-
33746589805
-
An AES smart card implementation resistant to power analysis attacks
-
DOI 10.1007/11767480-16, Applied Cryptography and Network Security - 4th International Conference, ACNS 2006, Proceedings
-
Herbst, C., Oswald, E., Mangard, S.: An AES Smart Card Implementation Resistant to Power Analysis Attacks. In: Zhou, J., Yung, M., Bao, F. (eds.) ACNS 2006. LNCS, vol. 3989, pp. 239-252. Springer, Heidelberg (2006) (Pubitemid 44152821)
-
(2006)
Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.3989 LNCS
, pp. 239-252
-
-
Herbst, C.1
Oswald, E.2
Mangard, S.3
-
14
-
-
84948778220
-
Instruction Stream Mutation for Non- Deterministic Processors
-
IEEE
-
Irwin, J., Page, D., Smart, N.P.: Instruction Stream Mutation for Non- Deterministic Processors. In: ASAP, pp. 286-295. IEEE (2002)
-
(2002)
ASAP
, pp. 286-295
-
-
Irwin, J.1
Page, D.2
Smart, N.P.3
-
16
-
-
35048819488
-
Hardware Countermeasures against DPA - A Statistical Analysis of Their Effectiveness
-
Okamoto, T. (ed.) CT-RSA 2004. Springer, Heidelberg
-
Mangard, S.: Hardware Countermeasures against DPA - A Statistical Analysis of Their Effectiveness. In: Okamoto, T. (ed.) CT-RSA 2004. LNCS, vol. 2964, pp. 222-235. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.2964
, pp. 222-235
-
-
Mangard, S.1
-
18
-
-
79959430513
-
One for All - All for One: Unifying Standard DPA Attacks
-
Mangard, S., Oswald, E., Standaert, F.-X.: One for All - All for One: Unifying Standard DPA Attacks. IET Information Security 5(2), 100-110 (2011)
-
(2011)
IET Information Security
, vol.5
, Issue.2
, pp. 100-110
-
-
Mangard, S.1
Oswald, E.2
Standaert, F.-X.3
-
19
-
-
34548823012
-
DPA Using Phase-Based Waveform Matching against Random-Delay Countermeasure
-
IEEE
-
Nagashima, S., Homma, N., Imai, Y., Aoki, T., Satoh, A.: DPA Using Phase-Based Waveform Matching against Random-Delay Countermeasure. In: ISCAS, pp. 1807-1810. IEEE (2007)
-
(2007)
ISCAS
, pp. 1807-1810
-
-
Nagashima, S.1
Homma, N.2
Imai, Y.3
Aoki, T.4
Satoh, A.5
-
20
-
-
52949150830
-
SCARE of an Unknown Hardware Feistel Implementation
-
Grimaud, G., Standaert, F.-X. (eds.) CARDIS 2008. Springer, Heidelberg
-
Rȩal, D., Dubois, V., Guilloux, A.-M., Valette, F., Drissi, M.: SCARE of an Unknown Hardware Feistel Implementation. In: Grimaud, G., Standaert, F.-X. (eds.) CARDIS 2008. LNCS, vol. 5189, pp. 218-227. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5189
, pp. 218-227
-
-
Rȩal, D.1
Dubois, V.2
Guilloux, A.-M.3
Valette, F.4
Drissi, M.5
-
21
-
-
27244432445
-
A stochastic model for differential side channel cryptanalysis
-
Cryptographic Hardware and Embedded Systems - CHES 2005: 7th International Workshop. Proceedings
-
Schindler, W., Lemke, K., Paar, C.: A Stochastic Model for Differential Side Channel Cryptanalysis. In: Rao, J.R., Sunar, B. (eds.) CHES 2005. LNCS, vol. 3659, pp. 30-46. Springer, Heidelberg (2005) (Pubitemid 41520697)
-
(2005)
Lecture Notes in Computer Science
, vol.3659
, pp. 30-46
-
-
Schindler, W.1
Lemke, K.2
Paar, C.3
-
22
-
-
51049103841
-
Using Subspace-Based Template Attacks to Compare and Combine Power and Electromagnetic Information Leakages
-
Oswald, E., Rohatgi, P. (eds.) CHES 2008. Springer, Heidelberg
-
Standaert, F.-X., Archambeau, C.: Using Subspace-Based Template Attacks to Compare and Combine Power and Electromagnetic Information Leakages. In: Oswald, E., Rohatgi, P. (eds.) CHES 2008. LNCS, vol. 5154, pp. 411-425. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5154
, pp. 411-425
-
-
Standaert, F.-X.1
Archambeau, C.2
-
23
-
-
67650694228
-
A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks
-
Joux, A. (ed.) EUROCRYPT 2009. Springer, Heidelberg
-
Standaert, F.-X., Malkin, T.G., Yung, M.: A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks. In: Joux, A. (ed.) EUROCRYPT 2009. LNCS, vol. 5479, pp. 443-461. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5479
, pp. 443-461
-
-
Standaert, F.-X.1
Malkin, T.G.2
Yung, M.3
-
24
-
-
78650838653
-
The World Is Not Enough: Another Look on Second- Order DPA
-
Abe, M. (ed.) ASIACRYPT 2010. Springer, Heidelberg
-
Standaert, F.-X., Veyrat-Charvillon, N., Oswald, E., Gierlichs, B., Medwed, M., Kasper, M., Mangard, S.: The World Is Not Enough: Another Look on Second- Order DPA. In: Abe, M. (ed.) ASIACRYPT 2010. LNCS, vol. 6477, pp. 112-129. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.6477
, pp. 112-129
-
-
Standaert, F.-X.1
Veyrat-Charvillon, N.2
Oswald, E.3
Gierlichs, B.4
Medwed, M.5
Kasper, M.6
Mangard, S.7
-
25
-
-
84864665770
-
An Efficient Method for Eliminating Random Delays in Power Traces of Embedded Software
-
Kim, H. (ed.) ICISC 2011. Springer, Heidelberg
-
Strobel, D., Paar, C.: An Efficient Method for Eliminating Random Delays in Power Traces of Embedded Software. In: Kim, H. (ed.) ICISC 2011. LNCS, vol. 7259, pp. 48-60. Springer, Heidelberg (2012)
-
(2012)
LNCS
, vol.7259
, pp. 48-60
-
-
Strobel, D.1
Paar, C.2
-
27
-
-
37149030674
-
Efficient use of random delays in embedded software
-
Information Security Theory and Practices: Smart Cards, Mobile and Ubiquitous Computing Systems - First IFIP TC6 / WG 8.8 / WG 11.2 International Workshop, WISTP 2007, Proceedings
-
Tunstall, M., Benoit, O.: Efficient Use of Random Delays in Embedded Software. In: Sauveron, D., Markantonakis, K., Bilas, A., Quisquater, J.-J. (eds.) WISTP 2007. LNCS, vol. 4462, pp. 27-38. Springer, Heidelberg (2007) (Pubitemid 350259638)
-
(2007)
Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.4462 LNCS
, pp. 27-38
-
-
Tunstall, M.1
Benoit, O.2
-
28
-
-
79951793524
-
Improving Differential Power Analysis by Elastic Alignment
-
Kiayias, A. (ed.) CT-RSA 2011. Springer, Heidelberg
-
van Woudenberg, J.G.J., Witteman, M.F., Bakker, B.: Improving Differential Power Analysis by Elastic Alignment. In: Kiayias, A. (ed.) CT-RSA 2011. LNCS, vol. 6558, pp. 104-119. Springer, Heidelberg (2011)
-
(2011)
LNCS
, vol.6558
, pp. 104-119
-
-
Van Woudenberg, J.G.J.1
Witteman, M.F.2
Bakker, B.3
-
29
-
-
84875107824
-
CHES 2003
-
Springer, Heidelberg
-
Walter, C.D., Koç, Ç.K., Paar, C. (eds.): CHES 2003. LNCS, vol. 2779. Springer, Heidelberg (2003)
-
(2003)
LNCS
, vol.2779
-
-
Walter, C.D.1
Koç, Ç.K.2
Paar, C.3
|