-
2
-
-
84943632039
-
Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems
-
P. Kocher Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems Crypto 96 1996 104 113
-
(1996)
Crypto
, vol.96
, pp. 104-113
-
-
Kocher, P.1
-
5
-
-
78650238574
-
Electromagnetic analysis (EMA): Measures and countermeasures for smart cards
-
J.J. Quisquater, and D. Samyde Electromagnetic analysis (EMA): measures and countermeasures for smart cards Lecture Notes in Computer Science 2001 200 210
-
(2001)
Lecture Notes in Computer Science
, pp. 200-210
-
-
Quisquater, J.J.1
Samyde, D.2
-
9
-
-
33750688820
-
A proposition for correlation power analysis enhancement
-
T.H. Le, J. Clédière, C. Canovas, B. Robisson, C. Serviere, J.L. Lacoume, A proposition for correlation power analysis enhancement, in: Cryptographic Hardware and Embedded Systems - CHES 2006, 2006, pp. 174-186.
-
(2006)
Cryptographic Hardware and Embedded Systems - CHES 2006
, pp. 174-186
-
-
Le, T.H.1
-
10
-
-
37149004055
-
On the ability of AES S-boxes to secure against correlation power analysis
-
Z. Liu, X. Guo, Y. Chen, Y. Han, X. Zou, On the ability of AES S-boxes to secure against correlation power analysis, in: Information Security Practice and Experience, 2007, pp. 43-50.
-
(2007)
Information Security Practice and Experience
, pp. 43-50
-
-
Liu, Z.1
Guo, X.2
Chen, Y.3
Han, Y.4
Zou, X.5
-
12
-
-
84964870993
-
Differential power analysis of stream ciphers
-
W. Fischer, B. Gammel, O. Kniffler, J. Velten, Differential power analysis of stream ciphers, in: Topics in Cryptology - CCT-RSA 2007, 2006, pp. 257-270.
-
(2006)
Topics in Cryptology - CCT-RSA 2007
, pp. 257-270
-
-
Fischer, W.1
Gammel, B.2
Kniffler, O.3
Velten, J.4
-
16
-
-
84255212830
-
Multipath design for 6LoWPAN ad hoc on-demand distance vector routing
-
J.M. Chang, H.Y. Yang, H.C. Chao, and J.L. Chen Multipath design for 6LoWPAN ad hoc on-demand distance vector routing International Journal of Information Technology, Communications and Convergence 1 2010 24 40
-
(2010)
International Journal of Information Technology, Communications and Convergence
, vol.1
, pp. 24-40
-
-
Chang, J.M.1
Yang, H.Y.2
Chao, H.C.3
Chen, J.L.4
-
17
-
-
84857735690
-
Automatic method for efficient hardware implementation from RVC-CAL dataflow: A LAR coder baseline case study
-
K. Jerbi, M. Wipliez, M. Raulet, O. Déforges, M. Babel, and M. Abid Automatic method for efficient hardware implementation from RVC-CAL dataflow: a LAR coder baseline case study Journal of Convergence 1 2010 85 92
-
(2010)
Journal of Convergence
, vol.1
, pp. 85-92
-
-
Jerbi, K.1
Wipliez, M.2
Raulet, M.3
Déforges, O.4
Babel, M.5
Abid, M.6
-
18
-
-
84255174624
-
An energy conservation DVFS algorithm for the Android operating system
-
W.Y. Liang, P.T. Lai, and C.W. Chiou An energy conservation DVFS algorithm for the Android operating system Journal of Convergence 1 2010 93 100
-
(2010)
Journal of Convergence
, vol.1
, pp. 93-100
-
-
Liang, W.Y.1
Lai, P.T.2
Chiou, C.W.3
-
20
-
-
84877727710
-
Stream ciphers and side-channel analysis
-
C. Rechberger, E. Oswald, Stream ciphers and side-channel analysis, in: Citeseer, 2004.
-
(2004)
Citeseer
-
-
Rechberger, C.1
Oswald, E.2
-
21
-
-
23944463342
-
Template attacks
-
S. Chari, J. Rao, P. Rohatgi, Template attacks, in: Cryptographic Hardware and Embedded Systems - CHES 2002, 2003, pp. 51-62.
-
(2003)
Cryptographic Hardware and Embedded Systems - CHES 2002
, pp. 51-62
-
-
Chari, S.1
Rao, J.2
Rohatgi, P.3
-
23
-
-
48249103232
-
-
J. Lano, N. Mentens, B. Preneel, I. Verbauwhede, Power analysis of synchronous stream ciphers with resynchronization mechanism, 2004, pp. 327-333.
-
(2004)
Power Analysis of Synchronous Stream Ciphers with Resynchronization Mechanism
, pp. 327-333
-
-
Lano, J.1
Mentens, N.2
Preneel, B.3
Verbauwhede, I.4
-
24
-
-
84877772298
-
Some thoughts about implementation properties of stream ciphers
-
S. Kumar, K. Lemke, C. Paar, Some thoughts about implementation properties of stream ciphers, in: Citeseer, 2004.
-
(2004)
Citeseer
-
-
Kumar, S.1
Lemke, K.2
Paar, C.3
-
25
-
-
58549120665
-
Susceptibility of eSTREAM candidates towards side channel analysis
-
B. Gierlichs, L. Batina, C. Clavier, T. Eisenbarth, A. Gouget, H. Handschuh, T. Kasper, K. Lemke-Rust, S. Mangard, A. Moradi, Susceptibility of eSTREAM candidates towards side channel analysis, in: Proceedings of SASC, 2008, pp. 123-150.
-
(2008)
Proceedings of SASC
, pp. 123-150
-
-
Gierlichs, B.1
Batina, L.2
Clavier, C.3
Eisenbarth, T.4
Gouget, A.5
Handschuh, H.6
Kasper, T.7
Lemke-Rust, K.8
Mangard, S.9
Moradi, A.10
-
26
-
-
57049128814
-
Dismantling MIFARE classic
-
F. Garcia, G. de Koning Gans, R. Muijrers, P. Van Rossum, R. Verdult, R. Schreur, B. Jacobs, Dismantling MIFARE classic, in: Computer Security - ESORICS 2008, 2008, pp. 97-114.
-
(2008)
Computer Security - ESORICS 2008
, pp. 97-114
-
-
Garcia, F.1
De Koning Gans, G.2
Muijrers, R.3
Van Rossum, P.4
Verdult, R.5
Schreur, R.6
Jacobs, B.7
-
28
-
-
52949116081
-
A practical attack on the MIFARE classic
-
G. de Koning Gans, J.H. Hoepman, F. Garcia, A practical attack on the MIFARE classic, in: Smart Card Research and Advanced Applications, 2008, pp. 267-282.
-
(2008)
Smart Card Research and Advanced Applications
, pp. 267-282
-
-
De Koning Gans, G.1
Hoepman, J.H.2
Garcia, F.3
-
29
-
-
77955326935
-
All you can eat or breaking a real-world contactless payment system
-
T. Kasper, M. Silbermann, C. Paar, All you can eat or breaking a real-world contactless payment system, in: Financial Cryptography and Data Security, 2010, pp. 343-350.
-
(2010)
Financial Cryptography and Data Security
, pp. 343-350
-
-
Kasper, T.1
Silbermann, M.2
Paar, C.3
|