메뉴 건너뛰기




Volumn , Issue , 2003, Pages 84-89

Masking the energy behavior of des encryption

Author keywords

[No Author keywords available]

Indexed keywords

CRITICAL OPERATIONS; ENCRYPTION ALGORITHMS; ENERGY DIFFERENCES; INSTRUCTION SET ARCHITECTURE; MEASUREMENT TECHNIQUES; OPTIMIZING COMPILERS; TIMING MEASUREMENT; UNDERLYING SYSTEMS;

EID: 84893793732     PISSN: 15301591     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/DATE.2003.1253591     Document Type: Conference Paper
Times cited : (65)

References (17)
  • 3
    • 84880293917 scopus 로고    scopus 로고
    • Resistance against differential power analysis for elliptic curve cryptosystems
    • Ç.K Koç and C. Paar, Eds of Lecture Notes in Computer Science, Springer- Verlag
    • J. Coron. Resistance Against Differential Power Analysis for Elliptic Curve Cryptosystems. Ç.K Koç and C. Paar, Eds., Cryptographic Hardware and Embedded Systems, vol. 1717 of Lecture Notes in Computer Science, pp. 292-302, Springer-Verlag, 1999
    • (1999) Cryptographic Hardware and Embedded Systems , vol.1717 , pp. 292-302
    • Coron, J.1
  • 4
    • 0035517887 scopus 로고    scopus 로고
    • Hardware and software symbiosis helps smart card evolution
    • November-December
    • J.-F. Dhem, N. Feyt. Hardware and Software Symbiosis Helps Smart card Evolution. IEEE Micro, Vol. 21, Issue. 6, pp. 14-25, November-December 2001
    • (2001) IEEE Micro , vol.21 , Issue.6 , pp. 14-25
    • Dhem, J.-F.1    Feyt, N.2
  • 5
    • 84949520149 scopus 로고    scopus 로고
    • Des and differential power analysis the duplication
    • Springer, Lecture Notes in Computer Science 1717 August
    • L. Goubin, J. Patarin. DES and Differential Power Analysis The ?Duplication? Method. Proceeding of CHES?99, Springer, Lecture Notes in Computer Science, Vol. 1717, August 1999
    • (1999) Method. Proceeding of CHES , vol.99
    • Goubin, L.1    Patarin, J.2
  • 6
    • 84943632039 scopus 로고    scopus 로고
    • Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS and other Systems
    • N.Koblitz, Ed., Springer-Verlag
    • P. Kocher. Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS and other Systems, Advances in Cryptology, Proceedings of Crypto?96, LNCS 1109, N.Koblitz, Ed., Springer-Verlag, 1996, pp.104-113
    • (1996) Advances in Cryptology, Proceedings of Crypto?96, LNCS 1109 , pp. 104-113
    • Kocher, P.1
  • 15
    • 85093467807 scopus 로고    scopus 로고
    • Design principles for tamper-resistant smart card processors
    • Chicago, IL, May 10-May 11
    • O. Kommerling and M. G. Kuhn. Design Principles for Tamper-Resistant Smart card Processors. USENIX Workshop on Smart card Technology, Chicago, IL, May 10-May 11 1999
    • (1999) USENIX Workshop on Smart Card Technology
    • Kommerling, O.1    Kuhn, M.G.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.