-
1
-
-
84890722754
-
Leakage-resilient symmetric encryption via re-keying
-
In: Bertoni, G., Coron, J.-S. (eds.), Springer, Heidelberg
-
Abdalla, M., Belaïd, S., Fouque, P.-A.: Leakage-resilient symmetric encryption via re-keying. In: Bertoni, G., Coron, J.-S. (eds.) CHES 2013. LNCS, vol. 8086, pp. 471–488. Springer, Heidelberg (2013)
-
(2013)
CHES 2013. LNCS
, vol.8086
, pp. 471-488
-
-
Abdalla, M.1
Belaïd, S.2
Fouque, P.-A.3
-
2
-
-
84943615552
-
An implementation of DES and AES, secure against some attacks
-
Koç, Ç.K., Naccache, D., Paar, C. (eds.), Springer, Heidelberg
-
Akkar, M.-L., Giraud, C.: An implementation of DES and AES, secure against some attacks. In: Koç, Ç.K., Naccache, D., Paar, C. (eds.) CHES 2001. LNCS, vol. 2162, pp. 309–318. Springer, Heidelberg (2001)
-
(2001)
CHES 2001. LNCS
, vol.2162
, pp. 309-318
-
-
Akkar, M.-L.1
Giraud, C.2
-
3
-
-
84881171201
-
Differential fault analysis of AES: Towards reaching its limits
-
Ali, S., Mukhopadhyay, D., Tunstall, M.: Differential fault analysis of AES: towards reaching its limits. J. Cryptographic Eng. 3(2), 73–97 (2013)
-
(2013)
J. Cryptographic Eng
, vol.3
, Issue.2
, pp. 73-97
-
-
Ali, S.1
Mukhopadhyay, D.2
Tunstall, M.3
-
4
-
-
84906275055
-
Towards fresh re-keying with leakage-resilient PRFs: Cipher design principles and analysis
-
Belaïd, S., Santis, F.D., Heyszl, J., Mangard, S., Medwed, M., Schmidt, J., Standaert, F., Tillich, S.: Towards fresh re-keying with leakage-resilient PRFs: cipher design principles and analysis. J. Cryptographic Eng. 4(3), 157–171 (2014)
-
(2014)
J. Cryptographic Eng
, vol.4
, Issue.3
, pp. 157-171
-
-
Belaïd, S.1
Santis, F.D.2
Heyszl, J.3
Mangard, S.4
Medwed, M.5
Schmidt, J.6
Standaert, F.7
Tillich, S.8
-
5
-
-
84925307272
-
Key Recovery Attacks on Recent Authenticated Ciphers
-
In: Aranha, D., Menezes, A. (eds.), Springer, (to appear)
-
Bogdanov, A., Dobraunig, C., Eichlseder, M., Lauridsen, M., Mendel, F., Schläffer, M., Tischhauser, E.: Key Recovery Attacks on Recent Authenticated Ciphers. In: Aranha, D., Menezes, A. (eds.) LATINCRYPT. LNCS, Springer (2014) (to appear)
-
(2014)
LATINCRYPT. LNCS
-
-
Bogdanov, A.1
Dobraunig, C.2
Eichlseder, M.3
Lauridsen, M.4
Mendel, F.5
Schläffer, M.6
Tischhauser, E.7
-
6
-
-
0040553594
-
An improved Monte Carlo factorization algorithm
-
Brent, R.P.: An improved Monte Carlo factorization algorithm. BIT, Nord. Tidskr. Inf.-behandl. 20, 176–184 (1980)
-
(1980)
BIT, Nord. Tidskr. Inf.-Behandl
, vol.20
, pp. 176-184
-
-
Brent, R.P.1
-
7
-
-
84925307271
-
Combining leakage-resilient PRFs and shuffling (Towards Bounded Security for Small Embedded Devices)
-
Grosso, V., Poussier, R., Standaert, F.X., Gaspar, L.: Combining leakage-resilient PRFs and shuffling (Towards Bounded Security for Small Embedded Devices). IACR Cryptology ePrint Archive 2014, p. 411 (2014)
-
(2014)
IACR Cryptology Eprint Archive
, vol.2014
, pp. 411
-
-
Grosso, V.1
Poussier, R.2
Standaert, F.X.3
Gaspar, L.4
-
8
-
-
0019038335
-
A cryptanalytic time-memory trade-off
-
Hellman, M.E.: A cryptanalytic time-memory trade-off. IEEE Trans. Inf. Theory 26(4), 401–406 (1980)
-
(1980)
IEEE Trans. Inf. Theory
, vol.26
, Issue.4
, pp. 401-406
-
-
Hellman, M.E.1
-
9
-
-
84939573910
-
Differential power analysis
-
In: Wiener, M. (ed.), Springer, Heidelberg
-
Kocher, P.C., Jaffe, J., Jun, B.: Differential power analysis. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 388–397. Springer, Heidelberg (1999)
-
(1999)
CRYPTO 1999. LNCS
, vol.1666
, pp. 388-397
-
-
Kocher, P.C.1
Jaffe, J.2
Jun, B.3
-
11
-
-
84890863577
-
-
Springer, New York
-
Mangard, S., Oswald, E., Popp, T.: Power Analysis Attacks - Revealing the Secrets of Smart Cards. Springer, New York (2007)
-
(2007)
Power Analysis Attacks - Revealing the Secrets of Smart Cards
-
-
Mangard, S.1
Oswald, E.2
Popp, T.3
-
12
-
-
84055192288
-
Fresh rekeying II: Securing multiple parties against side-channel and fault attacks
-
In: Prouff, E. (ed.), Springer, Heidelberg
-
Medwed, M., Petit, C., Regazzoni, F., Renauld, M., Standaert, F.-X.: Fresh rekeying II: Securing multiple parties against side-channel and fault attacks. In: Prouff, E. (ed.) CARDIS 2011. LNCS, vol. 7079, pp. 115–132. Springer, Heidelberg (2011)
-
(2011)
CARDIS 2011. LNCS
, vol.7079
, pp. 115-132
-
-
Medwed, M.1
Petit, C.2
Regazzoni, F.3
Renauld, M.4
Standaert, F.-X.5
-
13
-
-
77953509171
-
Fresh rekeying: Security against side-channel and fault attacks for low-cost devices
-
In: Bernstein, D.J., Lange, T. (eds.), Springer, Heidelberg
-
Medwed, M., Standaert, F.-X., Großschädl, J., Regazzoni, F.: Fresh rekeying: Security against side-channel and fault attacks for low-cost devices. In: Bernstein, D.J., Lange, T. (eds.) AFRICACRYPT 2010. LNCS, vol. 6055, pp. 279–296. Springer, Heidelberg (2010)
-
(2010)
AFRICACRYPT 2010. LNCS
, vol.6055
, pp. 279-296
-
-
Medwed, M.1
Standaert, F.-X.2
Großschädl, J.3
Regazzoni, F.4
-
14
-
-
84872700905
-
A simple key-recovery attack on McOE-X
-
In: Pieprzyk, J., Sadeghi, A.-R., Manulis, M. (eds.), Springer, Heidelberg
-
Mendel, F., Mennink, B., Rijmen, V., Tischhauser, E.: A simple key-recovery attack on McOE-X. In: Pieprzyk, J., Sadeghi, A.-R., Manulis, M. (eds.) CANS 2012. LNCS, vol. 7712, pp. 23–31. Springer, Heidelberg (2012)
-
(2012)
CANS 2012. LNCS,
, vol.7712
, pp. 23-31
-
-
Mendel, F.1
Mennink, B.2
Rijmen, V.3
Tischhauser, E.4
-
16
-
-
67650675583
-
A leakage-resilient mode of operation
-
In: Joux, A. (ed.), Springer, Heidelberg
-
Pietrzak, K.: A leakage-resilient mode of operation. In: Joux, A. (ed.) EUROCRYPT 2009. LNCS, vol. 5479, pp. 462–482. Springer, Heidelberg (2009)
-
(2009)
EUROCRYPT 2009. LNCS
, vol.5479
, pp. 462-482
-
-
Pietrzak, K.1
-
17
-
-
50049107054
-
How easy is collision search. New results and applications to DES
-
In: Brassard, G. (ed.), Springer, Heidelberg
-
Quisquater, J.-J., Delescaille, J.-P.: How easy is collision search. New results and applications to DES. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol. 435, pp. 408–413. Springer, Heidelberg (1990)
-
(1990)
CRYPTO 1989. LNCS
, vol.435
, pp. 408-413
-
-
Quisquater, J.-J.1
Delescaille, J.-P.2
-
18
-
-
35248825993
-
Securing encryption algorithms against DPA at the logic level: Next generation smart card technology
-
Walter, C.D., Koç, Ç.K., Paar, C. (eds.), Springer, Heidelberg
-
Tiri, K., Verbauwhede, I.: Securing encryption algorithms against DPA at the logic level: Next generation smart card technology. In: Walter, C.D., Koç, Ç.K., Paar, C. (eds.) CHES 2003. LNCS, vol. 2779, pp. 125–136. Springer, Heidelberg (2003)
-
(2003)
CHES 2003. LNCS
, vol.2779
, pp. 125-136
-
-
Tiri, K.1
Verbauwhede, I.2
|