-
1
-
-
27244458972
-
Templates as Master Keys
-
J.R. Rao, B. Sunar, Eds, Springer-Verlag
-
Dakshi Agrawal, Josyula R. Rao, Pankaj Rohatgi, Kai Schramm, “Templates as Master Keys”, J.R. Rao, B. Sunar, Eds., CHES 2005, LNCS 3659, Springer-Verlag, 2005, pp. 15–29.
-
CHES 2005, LNCS 3659
, vol.2005
, pp. 15-29
-
-
Agrawal, D.1
Rao, J.R.2
Rohatgi, P.3
Schramm, K.4
-
2
-
-
84943615552
-
An implementation of DES and AES, secure against some attacks
-
Ç Koç, D. Naccache, Ch. Paar, Eds, Springer-Verlag
-
Mehdi-Laurent Akkar, Christophe Giraud, “An implementation of DES and AES, secure against some attacks”, Ç Koç, D. Naccache, Ch. Paar, Eds., CHES 2001, LNCS 2162, Springer-Verlag, 2001, pp. 309–318.
-
(2001)
CHES 2001, LNCS
, vol.2162
, pp. 309-318
-
-
Akkar, M.-L.1
Giraud, C.2
-
3
-
-
85062838317
-
Safeguarding cryptographic keys
-
George Blakley, Safeguarding cryptographic keys, AFIPS 48, 1979, pp. 313-317.
-
(1979)
AFIPS
, vol.48
, pp. 313-317
-
-
Blakley, G.1
-
4
-
-
84961369151
-
Security of ramp schemes
-
Springer-Verlag
-
George Blakley, Catherine Meadows, “Security of ramp schemes”, CRYPTO ’84, LNCS 196, Springer-Verlag, 1984, pp. 242–268.
-
(1984)
CRYPTO ’84, LNCS 196
, pp. 242-268
-
-
Blakley, G.1
Meadows, C.2
-
5
-
-
35048848490
-
Provably Secure Masking of AES
-
H. Handschuh, M. Anwar Hasan, Eds., Springer-Verlag
-
Johannes Blömer, Jorge Guajardo Merchan, Volker Krummel, “Provably Secure Masking of AES”, H. Handschuh, M. Anwar Hasan, Eds., Selected Areas in Cryptography (SAC 2004), LNCS 3357, Springer-Verlag, 2004, pp. 69-83.
-
Selected Areas in Cryptography (SAC 2004), LNCS 3357
, vol.2004
, pp. 69-83
-
-
Blömer, J.1
Merchan, J.G.2
Krummel, V.3
-
6
-
-
84957079591
-
Towards Sound Approaches to Counteract Power- Analysis Attacks
-
Suresh Chari, Charanjit S. Jutla, Josyula R. Rao, Pankaj Rohatgi, “Towards Sound Approaches to Counteract Power- Analysis Attacks” CRYPTO ’99, LNCS 1666, Springer-Verlag, 1999, pp. 398-412.
-
(1999)
CRYPTO ’99, LNCS 1666, Springer-Verlag
, pp. 398-412
-
-
Chari, S.1
Jutla, C.S.2
Rao, J.R.3
Rohatgi, P.4
-
7
-
-
35248899532
-
Template Attacks
-
B. Kaliski, Ç Koç, Ch. Paar, Eds, Springer-Verlag
-
Suresh Chari, Josyula R. Rao, Pankaj Rohatgi, “Template Attacks”, B. Kaliski, Ç Koç, Ch. Paar, Eds., CHES 2002, LNCS 2523, Springer-Verlag, 2003, pp. 13–28.
-
CHES 2002, LNCS 2523
, vol.2003
, pp. 13-28
-
-
Chari, S.1
Rao, J.R.2
Rohatgi, P.3
-
8
-
-
84947931331
-
Some recent research aspects of threshold cryptography
-
E. Okamoto, G. Davida, M. Mambo, Eds, Springer-Verlag
-
Yvo Desmedt, “Some recent research aspects of threshold cryptography”, E. Okamoto, G. Davida, M. Mambo, Eds., Information Security, LNCS 1396, Springer-Verlag, 1997, pp. 158–173.
-
Information Security, LNCS 1396
, vol.1997
, pp. 158-173
-
-
Desmedt, Y.1
-
9
-
-
27244432772
-
Masking at Gate Level in the Presence of Glitches
-
J.R. Rao, B. Sunar, Eds, Springer-Verlag
-
Wieland Fischer, Berndt M. Gammel, “Masking at Gate Level in the Presence of Glitches,” J.R. Rao, B. Sunar, Eds., CHES 2005, LNCS 3659, Springer-Verlag, 2005, pp. 187–200.
-
CHES 2005, LNCS 3659
, vol.2005
, pp. 187-200
-
-
Fischer, W.1
Gammel, B.M.2
-
10
-
-
35248830819
-
Multiplicative masking and power analysis
-
B. Kaliski, Ç Koç, Ch. Paar, Eds, Springer-Verlag
-
Jovan D. Golić, Christophe Tymen, “Multiplicative masking and power analysis”, B. Kaliski, Ç Koç, Ch. Paar, Eds., CHES 2002, LNCS 2523, Springer-Verlag, 2003, pp. 198–212.
-
(2003)
CHES 2002, LNCS
, vol.2523
, pp. 198-212
-
-
Golić, J.D.1
Tymen, C.2
-
11
-
-
84949520149
-
DES and differential power analysis – the duplication method
-
Ç. Koç, Ch. Paar, Eds, Springer-Verlag
-
Louis Goubin, Jacques Patarin, “DES and differential power analysis – the duplication method”, Ç. Koç, Ch. Paar, Eds., CHES ’99, LNCS 1717, Springer-Verlag, 1999, pp. 158–172.
-
CHES ’99, LNCS 1717
, vol.1999
, pp. 158-172
-
-
Goubin, L.1
Patarin, J.2
-
12
-
-
35248830337
-
Private circuits: Securing hardware against probing attacks
-
D. Boneh, Ed., Springer-Verlag
-
Yuval Ishai, Amit Sahai, David Wagner, “Private circuits: securing hardware against probing attacks”, D. Boneh, Ed., CRYPTO 2003, LNCS 2729, Springer-Verlag, 2003, pp. 463–481.
-
CRYPTO 2003, LNCS 2729
, vol.2003
, pp. 463-481
-
-
Ishai, Y.1
Sahai, A.2
Wagner, D.3
-
13
-
-
27244453895
-
On second-order differential power analysis
-
J.R. Rao, B. Sunar, Eds, Springer-Verlag
-
Marc Joye, Pascal Paillier, Berry Schoenmakers, “On second-order differential power analysis,” J.R. Rao, B. Sunar, Eds., CHES 2005, LNCS 3659, Springer-Verlag, 2005, pp. 293–308.
-
CHES 2005, LNCS 3659
, vol.2005
, pp. 293-308
-
-
Joye, M.1
Paillier, P.2
Schoenmakers, B.3
-
14
-
-
84939573910
-
-
M. Wiener, Ed., CRYPTO ’99, LNCS 1666, Springer-Verlag
-
Paul Kocher, Joshua Jaffe, Benjamin Jun, “Differential Power Analysis”, M. Wiener, Ed., CRYPTO ’99, LNCS 1666, Springer-Verlag, 1999, pp. 388–397.
-
Differential Power Analysis
, vol.1999
, pp. 388-397
-
-
Kocher, P.1
Jaffe, J.2
Jun, B.3
-
15
-
-
24144459808
-
-
A.J. Menezes, Ed., CT-RSA 2005, LNCS 3376, Springer-Verlag
-
Stefan Mangard, Thomas Popp, Berndt M. Gammel, “Side-channel leakage of masked CMOS gates”, A.J. Menezes, Ed., CT-RSA 2005, LNCS 3376, Springer-Verlag, 2005, pp. 351–365.
-
Side-Channel Leakage of Masked CMOS Gates
, vol.2005
, pp. 351-365
-
-
Mangard, S.1
Popp, T.2
Gammel, B.M.3
-
16
-
-
27244451021
-
-
J.R. Rao, B. Sunar, Eds., CHES 2005, LNCS 3659, Springer-Verlag
-
Stefan Mangard, Norbert Pramstaller, Elisabeth Oswald, “Successfully attacking masked AES hardware implementations,” J.R. Rao, B. Sunar, Eds., CHES 2005, LNCS 3659, Springer-Verlag, 2005, pp. 157–171.
-
Successfully Attacking Masked AES Hardware Implementations
, vol.2005
, pp. 157-171
-
-
Mangard, S.1
Pramstaller, N.2
Oswald, E.3
-
17
-
-
68549099555
-
-
Ç.K. Koç, Ch. Paar, Eds., CHES 2000, LNCS 1965, Springer-Verlag
-
Thomas S. Messerges, “Using second-order power analysis to attack DPA resistant software,” Ç.K. Koç, Ch. Paar, Eds., CHES 2000, LNCS 1965, Springer-Verlag, 2000, pp. 238–251.
-
Using Second-Order Power Analysis to Attack DPA Resistant Software
, vol.2000
, pp. 238-251
-
-
Messerges, T.S.1
-
18
-
-
26444465110
-
A Side-Channel Analysis Resistant Description of the AES S-box
-
Springer-Verlag
-
Elisabeth Oswald, Stefan Mangard, Norbert Pramstaller, Vincent Rijmen, “A Side-Channel Analysis Resistant Description of the AES S-box”, FSE 2005, LNCS 3557, Springer-Verlag, pp. 413–423.
-
FSE 2005, LNCS
, vol.3557
, pp. 413-423
-
-
Oswald, E.1
Mangard, S.2
Pramstaller, N.3
Rijmen, V.4
-
19
-
-
33745679179
-
Practical Second-Order DPA Attacks for Masked Smart Card Implementations of Block Ciphers
-
Springer-Verlag
-
Elisabeth Oswald, Stefan Mangard, Christoph Herbst, Stefan Tillich, “Practical Second-Order DPA Attacks for Masked Smart Card Implementations of Block Ciphers”, CT-RSA 2006, LNCS 3860, Springer-Verlag, pp. 192–207.
-
CT-RSA 2006, LNCS
, vol.3860
, pp. 192-207
-
-
Oswald, E.1
Mangard, S.2
Herbst, C.3
Tillich, S.4
-
20
-
-
27244451515
-
-
J.R. Rao, B. Sunar, Eds., CHES 2005, LNCS 3659, Springer-Verlag
-
Thomas Popp, Stefan Mangard, “Masked dual-rail pre-charge logic: DPA-resistance without routing constraints,” J.R. Rao, B. Sunar, Eds., CHES 2005, LNCS 3659, Springer-Verlag, 2005, pp. 172–186.
-
Masked Dual-Rail Pre-Charge Logic: Dpa-Resistance without Routing Constraints
, vol.2005
, pp. 172-186
-
-
Popp, T.1
Mangard, S.2
-
22
-
-
33745652931
-
Higher Order Masking of the AES
-
Springer-Verlag
-
Kai Schramm, Christof Paar, “Higher Order Masking of the AES”, CT-RSA 2006, LNCS 3860, Springer-Verlag, pp. 208–225.
-
CT-RSA 2006, LNCS 3860
, pp. 208-225
-
-
Schramm, K.1
Paar, C.2
-
23
-
-
0018545449
-
How to share a secret
-
Adi Shamir, “How to share a secret”, Commun. ACM 22, 1979, pp. 612-613.
-
(1979)
Commun. ACM
, vol.22
, pp. 612-613
-
-
Shamir, A.1
-
24
-
-
85025655803
-
-
SAC), LNCS, Springer-Verlag, to appear
-
Kris Tiri, Patrick Schaumont, “Changing the Odds against Masked Logic”, Selected Areas of Cryptagraphy 2006 (SAC), LNCS, Springer-Verlag, to appear.
-
(2006)
Changing the Odds against Masked Logic, Selected Areas of Cryptagraphy
-
-
Tiri, K.1
Schaumont, P.2
-
25
-
-
24144458916
-
Small size, low power, side channel immune AES coprocessor design and synthesis results
-
Springer-Verlag
-
Elena Trichina, Tymur Korkishko, “Small size, low power, side channel immune AES coprocessor design and synthesis results”, Proc. fourth conference on the Advanced Encryption Standard (AES4), LNCS 3373, Springer-Verlag, 2005, pp. 113–127.
-
(2005)
Proc. Fourth Conference on the Advanced Encryption Standard (AES4), LNCS
, vol.3373
, pp. 113-127
-
-
Trichina, E.1
Korkishko, T.2
-
26
-
-
84944896938
-
-
B. Preneel, Ed., CT-RSA 2002, LNCS 2271, Springer-Verlag
-
Johannes Wolkerstorfer, Elisabeth Oswald, Mario Lamberger, “An ASIC implementation of the AES S-boxes”, B. Preneel, Ed., CT-RSA 2002, LNCS 2271, Springer-Verlag, 2002, pp. 67–78.
-
An ASIC Implementation of the AES S-Boxes
, vol.2002
, pp. 67-78
-
-
Wolkerstorfer, J.1
Oswald, E.2
Lamberger, M.3
-
27
-
-
0020312165
-
Protocols for secure computation
-
Andrew Yao, “Protocols for secure computation”, FOCS’82, 1982, pp. 160-164.
-
(1982)
FOCS’82
, pp. 160-164
-
-
Yao, A.1
|