-
1
-
-
2342548663
-
Information Leakage Attacks Against Smart Card Implementations of Cryptographic Algorithms and Countermeasures - A Survey
-
June
-
E. Hess, N. Janssen, B. Meyer and T. Schuetze. "Information Leakage Attacks Against Smart Card Implementations of Cryptographic Algorithms and Countermeasures - a Survey," Proc. of Eurosmart Security Conference pp. 55-64, June 2000.
-
(2000)
Proc. of Eurosmart Security Conference
, pp. 55-64
-
-
Hess, E.1
Janssen, N.2
Meyer, B.3
Schuetze, T.4
-
2
-
-
84939573910
-
Differential Power Analysis
-
LNCS, Jan
-
P. Kocher, J. Jaffe, B. Jun, "Differential Power Analysis," Proc. of CRYPTO'99, LNCS 1666, pp. 388-397, Jan. 1999.
-
(1999)
Proc. of CRYPTO'99
, vol.1666
, pp. 388-397
-
-
Kocher, P.1
Jaffe, J.2
Jun, B.3
-
3
-
-
84957079591
-
Towards Sound Approaches to Counteract Power-Analysis Attacks
-
LNCS, Jan
-
S. Chari, C. S. Jutla, J. R. Rao and P. Rohatgi, "Towards Sound Approaches to Counteract Power-Analysis Attacks," Proc. of CRYPTO'99, LNCS 1666, pp. 398-412, Jan. 1999.
-
(1999)
Proc. of CRYPTO'99
, vol.1666
, pp. 398-412
-
-
Chari, S.1
Jutla, C.S.2
Rao, J.R.3
Rohatgi, P.4
-
4
-
-
35248825993
-
Securing Encryption Algorithms against DPA at the Logic Level: Next Generation Smart Card Technology
-
LNCS, Sept
-
K. Tiri and I. Verbauwhede, "Securing Encryption Algorithms against DPA at the Logic Level: Next Generation Smart Card Technology," Proc. of CHES 2003, LNCS 2779, pp. 125-136, Sept. 2003.
-
(2003)
Proc. of CHES 2003
, vol.2779
, pp. 125-136
-
-
Tiri, K.1
Verbauwhede, I.2
-
5
-
-
35248826454
-
Security Evaluation of Asynchronous Circuits
-
LNCS, Sept
-
J. Fournier, S. Moore, H. Li, R. Mullins and G. Taylor, "Security Evaluation of Asynchronous Circuits," Proc. of CHES 2003, LNCS 2779, pp. 137-151, Sept. 2003.
-
(2003)
Proc. of CHES 2003
, vol.2779
, pp. 137-151
-
-
Fournier, J.1
Moore, S.2
Li, H.3
Mullins, R.4
Taylor, G.5
-
7
-
-
3042604811
-
A Logic Level design methodology for a secure DPA resistant ASIC or FPGA implementation
-
Feb
-
K. Tiri, I. Verbauwhede, "A Logic Level design methodology for a secure DPA resistant ASIC or FPGA implementation," Proc. of DATE 2004, pp. 246-251, Feb. 2004.
-
(2004)
Proc. of DATE 2004
, pp. 246-251
-
-
Tiri, K.1
Verbauwhede, I.2
-
8
-
-
0032678594
-
A novel VLSI layout fabric for deep sub-micron applications
-
June
-
S. Khatri et al. "A novel VLSI layout fabric for deep sub-micron applications," Proc. Of DAC 1999, pp. 491-496, June 1999.
-
(1999)
Proc. of DAC 1999
, pp. 491-496
-
-
Khatri, S.1
-
9
-
-
84902452017
-
-
Silicon Ensemble, www.cadence.com/products/digita_ic/sepks
-
-
-
Ensemble, S.1
-
10
-
-
84902452018
-
-
LEF/DEF Language Reference 5.5, Jan
-
LEF/DEF Language Reference 5.5, Jan. 2003, www.openeda.org
-
(2003)
-
-
-
11
-
-
0003508568
-
-
NIST FIPS PUB 46-2, Dec
-
NIST FIPS PUB 46-2 "Data Encryption Standard," Dec. 1993. www.itl.nist.gov/fipspubs/fip46-2.htm
-
(1993)
Data Encryption Standard
-
-
-
12
-
-
84902452019
-
-
Cadence Chip Assembly Router
-
Cadence Chip Assembly Router, www.cadence.com/products/custom_ic/chip_assembly
-
-
-
|