|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 576 occurrences of 189 keywords
|
|
|
Results
Found 585 publication records. Showing 585 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
104 | Hideyo Mamiya, Atsuko Miyaji, Hiroaki Morimoto |
Efficient Countermeasures against RPA, DPA, and SPA. |
CHES |
2004 |
DBLP DOI BibTeX RDF |
Elliptic curve exponentiation, ZPA, RPA, DPA, SPA |
104 | Bert den Boer, Kerstin Lemke, Guntram Wicke |
A DPA Attack against the Modular Reduction within a CRT Implementation of RSA. |
CHES |
2002 |
DBLP DOI BibTeX RDF |
RSA, DPA, power analysis, smartcard, CRT, side channel analysis, modular reduction |
101 | Kouichi Itoh, Tetsuya Izu, Masahiko Takenaka |
A Practical Countermeasure against Address-Bit Differential Power Analysis. |
CHES |
2003 |
DBLP DOI BibTeX RDF |
address-bit DPA, RSA, ECC, Differential Power Analysis (DPA), exponentiation, countermeasure |
101 | Kouichi Itoh, Tetsuya Izu, Masahiko Takenaka |
Address-Bit Differential Power Analysis of Cryptographic Schemes OK-ECDH and OK-ECDSA. |
CHES |
2002 |
DBLP DOI BibTeX RDF |
address-bit DPA, scalar exponentiation, OK-ECDH, OK-ECDSA, Differential power analysis (DPA), elliptic curve cryptosystems (ECC) |
93 | Marco Bucci, Michele Guglielmo, Raimondo Luzzi, Alessandro Trifiletti |
A Power Consumption Randomization Countermeasure for DPA-Resistant Cryptographic Processors. |
PATMOS |
2004 |
DBLP DOI BibTeX RDF |
chipcards, cryptography, Differential power analysis, DPA, power analysis, countermeasures |
93 | Kerstin Lemke, Kai Schramm, Christof Paar |
DPA on n-Bit Sized Boolean and Arithmetic Operations and Its Application to IDEA, RC6, and the HMAC-Construction. |
CHES |
2004 |
DBLP DOI BibTeX RDF |
Boolean and arithmetic operations, HMAC-construction, DPA, IDEA, RC6 |
92 | Johannes Jendrsczok, Rolf Hoffmann, Thomas Lenck |
Generated Horizontal and Vertical Data Parallel GCA Machines for the N-Body Force Calculation. |
ARCS |
2009 |
DBLP DOI BibTeX RDF |
|
91 | Thanh-Ha Le, Jessy Clédière, Cécile Canovas, Bruno Robisson, Christine Servière, Jean-Louis Lacoume |
A Proposition for Correlation Power Analysis Enhancement. |
CHES |
2006 |
DBLP DOI BibTeX RDF |
multi-bit DPA, PPA, AES, correlation, DPA, power analysis, DES, side channel, CPA |
90 | Dong-Guk Han, Jongin Lim 0001, Kouichi Sakurai |
On Security of XTR Public Key Cryptosystems Against Side Channel Attacks. |
ACISP |
2004 |
DBLP DOI BibTeX RDF |
XTR Public Key Cryptosystem, Data-bit DPA, Address-bit DPA, doubling attack, Side Channel Attacks, SPA |
85 | Mehdi-Laurent Akkar, Louis Goubin |
A Generic Protection against High-Order Differential Power Analysis. |
FSE |
2003 |
DBLP DOI BibTeX RDF |
High-Order DPA, Smart-cards, Power analysis, DES |
83 | Stefan Mangard, Kai Schramm |
Pinpointing the Side-Channel Leakage of Masked AES Hardware Implementations. |
CHES |
2006 |
DBLP DOI BibTeX RDF |
Zero-Offset DPA, Zero-Input DPA, Delay Chains, AES, DPA, Masking, Glitches |
81 | Kouichi Itoh, Tetsuya Izu, Masahiko Takenaka |
Improving the Randomized Initial Point Countermeasure Against DPA. |
ACNS |
2006 |
DBLP DOI BibTeX RDF |
RPA, ZVA, Smart card, DPA, Elliptic Curve Cryptosystems (ECC), countermeasure, RIP |
76 | Elisabeth Oswald, Stefan Mangard, Christoph Herbst, Stefan Tillich |
Practical Second-Order DPA Attacks for Masked Smart Card Implementations of Block Ciphers. |
CT-RSA |
2006 |
DBLP DOI BibTeX RDF |
|
76 | Thomas S. Messerges |
Using Second-Order Power Analysis to Attack DPA Resistant Software. |
CHES |
2000 |
DBLP DOI BibTeX RDF |
|
74 | Joshua Jaffe |
A First-Order DPA Attack Against AES in Counter Mode with Unknown Initial Counter. |
CHES |
2007 |
DBLP DOI BibTeX RDF |
HO-DPA, AES, DPA, power analysis, SPA, counter mode |
73 | Katsuyuki Okeya, Kouichi Sakurai |
A Second-Order DPA Attack Breaks a Window-Method Based Countermeasure against Side Channel Attacks. |
ISC |
2002 |
DBLP DOI BibTeX RDF |
Higher-Order DPA Attack, Second-Order DPA Attack, Möller's Countermeasure, Side Channel Attacks, Differential Power Analysis, Elliptic Curve Cryptosystems |
70 | Toru Akishita, Masanobu Katagi, Yoshikazu Miyato, Asami Mizuno, Kyoji Shibutani |
A Practical DPA Countermeasure with BDD Architecture. |
CARDIS |
2008 |
DBLP DOI BibTeX RDF |
dual-rail pre-charge logic, DPA, Binary Decision Diagram, countermeasure |
70 | Kouichi Itoh, Masahiko Takenaka, Naoya Torii |
DPA Countermeasure Based on the "Masking Method". |
ICISC |
2001 |
DBLP DOI BibTeX RDF |
masking method, DPA, countermeasure, Rijndael |
69 | Lang Lin, Wayne P. Burleson |
Leakage-based differential power analysis (LDPA) on sub-90nm CMOS cryptosystems. |
ISCAS |
2008 |
DBLP DOI BibTeX RDF |
|
69 | Konrad J. Kulikowski, Ming Su, Alexander B. Smirnov, Alexander Taubin, Mark G. Karpovsky, Daniel MacDonald |
Delay Insensitive Encoding and Power Analysis: A Balancing Act. |
ASYNC |
2005 |
DBLP DOI BibTeX RDF |
|
64 | Srividhya Rammohan, Vijay Sundaresan, Ranga Vemuri |
Reduced Complementary Dynamic and Differential Logic: A CMOS Logic Style for DPA-Resistant Secure IC Design. |
VLSI Design |
2008 |
DBLP DOI BibTeX RDF |
|
64 | Massimo Alioto, Massimo Poli, Santina Rocchi, Valerio Vignoli |
Power Modeling of Precharged Address Bus and Application to Multi-bit DPA Attacks to DES Algorithm. |
PATMOS |
2006 |
DBLP DOI BibTeX RDF |
|
64 | Stjepan Rajko, Gang Qian |
A Hybrid HMM/DPA Adaptive Gesture Recognition Method. |
ISVC |
2005 |
DBLP DOI BibTeX RDF |
|
64 | Stefan Mangard |
Hardware Countermeasures against DPA ? A Statistical Analysis of Their Effectiveness. |
CT-RSA |
2004 |
DBLP DOI BibTeX RDF |
|
62 | Jean-Sébastien Coron, Emmanuel Prouff, Matthieu Rivain |
Side Channel Cryptanalysis of a Higher Order Masking Scheme. |
CHES |
2007 |
DBLP DOI BibTeX RDF |
Higher Order DPA, Masking Scheme, Side Channel Attacks, Differential Power Analysis, Template Attacks |
62 | Kai Schramm, Christof Paar |
Higher Order Masking of the AES. |
CT-RSA |
2006 |
DBLP DOI BibTeX RDF |
Higher Order DPA, Masking Countermeasure, AES |
62 | Louis Goubin |
A Refined Power-Analysis Attack on Elliptic Curve Cryptosystems. |
Public Key Cryptography |
2003 |
DBLP DOI BibTeX RDF |
Side-channel attacks, Public-key cryptography, Elliptic curves, Differential Power Analysis (DPA), Power Analysis, Smartcards |
58 | Atsuko Miyaji |
Generalized MMM-Algorithm Secure Against SPA, DPA, and RPA. |
ICISC |
2007 |
DBLP DOI BibTeX RDF |
RPA, elliptic curve, DPA, SPA |
58 | Daniel Mesquita, Jean-Denis Techer, Lionel Torres, Gilles Sassatelli, Gaston Cambon, Michel Robert, Fernando Moraes 0001 |
Current mask generation: a transistor level security against DPA attacks. |
SBCCI |
2005 |
DBLP DOI BibTeX RDF |
cryptography, side channel attacks, DPA, countermeasures |
58 | Dimitrios N. Skoutas, Angelos N. Rouskas |
A Scheduling Algorithm with Dynamic Priority Assignment for WCDMA Systems. |
IEEE Trans. Mob. Comput. |
2009 |
DBLP DOI BibTeX RDF |
|
58 | Karthik Baddam, Mark Zwolinski |
Evaluation of Dynamic Voltage and Frequency Scaling as a Differential Power Analysis Countermeasure. |
VLSI Design |
2007 |
DBLP DOI BibTeX RDF |
|
58 | Manfred von Willich |
A Technique with an Information-Theoretic Basis for Protecting Secret Data from Differential Power Attacks. |
IMACC |
2001 |
DBLP DOI BibTeX RDF |
|
55 | Katsuyuki Okeya |
Side Channel Attacks Against HMACs Based on Block-Cipher Based Hash Functions. |
ACISP |
2006 |
DBLP DOI BibTeX RDF |
(keyed) hash function, PGV construction, reverse DPA, side channel attacks, differential power analysis (DPA), HMAC |
53 | Alin Razafindraibe, Michel Robert, Philippe Maurine |
Analysis and Improvement of Dual Rail Logic as a Countermeasure Against DPA. |
PATMOS |
2007 |
DBLP DOI BibTeX RDF |
|
53 | Alin Razafindraibe, Michel Robert, Philippe Maurine |
Improvement of dual rail logic as a countermeasure against DPA. |
VLSI-SoC |
2007 |
DBLP DOI BibTeX RDF |
|
53 | Kuan Jen Lin, Shan Chien Fang, Shih Hsien Yang, Cheng Chia Lo |
Overcoming glitches and dissipation timing skews in design of DPA-resistant cryptographic hardware. |
DATE |
2007 |
DBLP DOI BibTeX RDF |
|
53 | Thomas Popp, Stefan Mangard |
Implementation aspects of the DPA-resistant logic style MDPL. |
ISCAS |
2006 |
DBLP DOI BibTeX RDF |
|
53 | G. Fraidy Bouesse, Marc Renaudin, Gilles Sicard |
Improving DPA Resistance of Quasi Delay Insensitive Circuits Using Randomly Time-shifted Acknowledgment Signals. |
VLSI-SoC |
2005 |
DBLP DOI BibTeX RDF |
|
53 | Emmanuel Prouff |
DPA Attacks and S-Boxes. |
FSE |
2005 |
DBLP DOI BibTeX RDF |
|
53 | Tae-Jun Park, Mun-Kyu Lee, Dowon Hong, Kyoil Chung |
A DPA Countermeasure by Randomized Frobenius Decomposition. |
WISA |
2005 |
DBLP DOI BibTeX RDF |
|
53 | Nevine Maurice Ebeid, M. Anwar Hasan |
On Randomizing Private Keys to Counteract DPA Attacks. |
Selected Areas in Cryptography |
2003 |
DBLP DOI BibTeX RDF |
binary signed-digit representation, smart cards, Differential power analysis, elliptic curve cryptosystems, scalar multiplication |
53 | Pierre-Yvan Liardet, Nigel P. Smart |
Preventing SPA/DPA in ECC Systems Using the Jacobi Form. |
CHES |
2001 |
DBLP DOI BibTeX RDF |
|
52 | Robert P. McEvoy, Colin C. Murphy, William P. Marnane, Michael Tunstall |
Isolated WDDL: A Hiding Countermeasure for Differential Power Analysis on FPGAs. |
ACM Trans. Reconfigurable Technol. Syst. |
2009 |
DBLP DOI BibTeX RDF |
secure logic, FPGA, Side-channel attacks, DPA, Whirlpool |
52 | Praveen Gauravaram, Katsuyuki Okeya |
An Update on the Side Channel Cryptanalysis of MACs Based on Cryptographic Hash Functions. |
INDOCRYPT |
2007 |
DBLP DOI BibTeX RDF |
M-NMAC, MDx-MAC, Side channel attacks, DPA, HMAC |
52 | Naofumi Homma, Sei Nagashima, Yuichi Imai, Takafumi Aoki, Akashi Satoh |
High-Resolution Side-Channel Attack Using Phase-Based Waveform Matching. |
CHES |
2006 |
DBLP DOI BibTeX RDF |
cryptographic module, waveform matching, phase-only correlation, side-channel attacks, DPA, DEMA |
52 | Dakshi Agrawal, Josyula R. Rao, Pankaj Rohatgi |
Multi-channel Attacks. |
CHES |
2003 |
DBLP DOI BibTeX RDF |
EM Analysis, Side-channel attacks, DPA, Power Analysis, DEMA |
51 | Christoph Herbst, Elisabeth Oswald, Stefan Mangard |
An AES Smart Card Implementation Resistant to Power Analysis Attacks. |
ACNS |
2006 |
DBLP DOI BibTeX RDF |
DPA resistance, smart card, AES |
47 | Thomas Popp, Stefan Mangard |
Masked Dual-Rail Pre-charge Logic: DPA-Resistance Without Routing Constraints. |
CHES |
2005 |
DBLP DOI BibTeX RDF |
Hardware Countermeasures, MDPL, Masking Logic, Dual-Rail Pre-Charge Logic, DPA, Side-Channel Analysis |
46 | You-Seok Lee, YongJe Choi, Dong-Guk Han, Ho Won Kim 0001, Hyoung-Nam Kim |
A nobel key-search method for side channel attacks based on pattern recognition. |
ICASSP |
2008 |
DBLP DOI BibTeX RDF |
|
46 | Eric Menendez, Ken Mai |
A High-Performance, Low-Overhead, Power-Analysis-Resistant, Single-Rail Logic Style. |
HOST |
2008 |
DBLP DOI BibTeX RDF |
|
46 | Jean-Sébastien Coron, Christophe Giraud 0001, Emmanuel Prouff, Matthieu Rivain |
Attack and Improvement of a Secure S-Box Calculation Based on the Fourier Transform. |
CHES |
2008 |
DBLP DOI BibTeX RDF |
|
46 | Praveen Gauravaram, Katsuyuki Okeya |
Side Channel Analysis of Some Hash Based MACs: A Response to SHA-3 Requirements. |
ICICS |
2008 |
DBLP DOI BibTeX RDF |
hash functions, side channel attacks, HMAC, Applied cryptography |
46 | Vijay Sundaresan, Srividhya Rammohan, Ranga Vemuri |
Power invariant secure IC design methodology using reduced complementary dynamic and differential logic. |
VLSI-SoC |
2007 |
DBLP DOI BibTeX RDF |
|
46 | Massimo Alioto, Massimo Poli, Santina Rocchi, Valerio Vignoli |
Techniques to Enhance the Resistance of Precharged Busses to Differential Power Analysis. |
PATMOS |
2006 |
DBLP DOI BibTeX RDF |
|
46 | Dong-Guk Han, Tsuyoshi Takagi, Jongin Lim 0001 |
Further Security Analysis of XTR. |
ISPEC |
2006 |
DBLP DOI BibTeX RDF |
XTR public key system, XTR-ISE, differential power analysis |
46 | Emmanuel Prouff, Christophe Giraud 0001, Sébastien Aumônier |
Provably Secure S-Box Implementation Based on Fourier Transform. |
CHES |
2006 |
DBLP DOI BibTeX RDF |
Provably Secure Countermeasure, Symmetric Cryptosystems, FOX, AES, Differential Power Analysis, Fourier Transform, S-Box |
46 | Marc Joye, Pascal Paillier, Berry Schoenmakers |
On Second-Order Differential Power Analysis. |
CHES |
2005 |
DBLP DOI BibTeX RDF |
|
46 | Kris Tiri, David D. Hwang, Alireza Hodjat, Bo-Cheng Lai, Shenglin Yang, Patrick Schaumont, Ingrid Verbauwhede |
Prototype IC with WDDL and Differential Routing - DPA Resistance Assessment. |
CHES |
2005 |
DBLP DOI BibTeX RDF |
dual rail with precharge, wave dynamic differential logic (WDDL), differential routing, parasitic capacitance matching, side-channel attack (SCA), differential power analysis (DPA), countermeasure |
41 | Jean-Sébastien Coron |
A New DPA Countermeasure Based on Permutation Tables. |
SCN |
2008 |
DBLP DOI BibTeX RDF |
|
41 | Francesco Regazzoni 0001, Stéphane Badel, Thomas Eisenbarth 0001, Johann Großschädl, Axel Poschmann, Zeynep Toprak Deniz, Marco Macchetti, Laura Pozzi, Christof Paar, Yusuf Leblebici, Paolo Ienne |
A Simulation-Based Methodology for Evaluating the DPA-Resistance of Cryptographic Functional Units with Application to CMOS and MCML Technologies. |
ICSAMOS |
2007 |
DBLP DOI BibTeX RDF |
|
41 | Jens Rüdinger, Adolf Finger |
Algorithm Design and Side Channel Vulnerability on the Example of DPA Attack. |
ICN |
2007 |
DBLP DOI BibTeX RDF |
|
41 | Sei Nagashima, Naofumi Homma, Yuichi Imai, Takafumi Aoki, Akashi Satoh |
DPA Using Phase-Based Waveform Matching against Random-Delay Countermeasure. |
ISCAS |
2007 |
DBLP DOI BibTeX RDF |
|
41 | Matteo Giaconia, Marco Macchetti, Francesco Regazzoni 0001, Kai Schramm |
Area and Power Efficient Synthesis of DPA-Resistant Cryptographic S-Boxes. |
VLSI Design |
2007 |
DBLP DOI BibTeX RDF |
|
41 | Daisuke Suzuki, Minoru Saeki |
Security Evaluation of DPA Countermeasures Using Dual-Rail Pre-charge Logic Style. |
CHES |
2006 |
DBLP DOI BibTeX RDF |
|
41 | Yi Wang 0016, Jussipekka Leiwo, Thambipillai Srikanthan, Luo Jianwen |
An Efficient Algorithm for DPA-resistent RSA. |
APCCAS |
2006 |
DBLP DOI BibTeX RDF |
|
41 | G. Fraidy Bouesse, Marc Renaudin, Sophie Dumont, Fabien Germain |
DPA on Quasi Delay Insensitive Asynchronous Circuits: Formalization and Improvement. |
DATE |
2005 |
DBLP DOI BibTeX RDF |
|
41 | Claude Carlet |
On Highly Nonlinear S-Boxes and Their Inability to Thwart DPA Attacks. |
INDOCRYPT |
2005 |
DBLP DOI BibTeX RDF |
|
41 | Daisuke Suzuki, Minoru Saeki, Tetsuya Ichikawa |
DPA Leakage Models for CMOS Logic Circuits. |
CHES |
2005 |
DBLP DOI BibTeX RDF |
|
41 | Marc Berthod, Zoltan Kato, Josiane Zerubia |
DPA: a deterministic approach to the MAP problem. |
IEEE Trans. Image Process. |
1995 |
DBLP DOI BibTeX RDF |
|
40 | Jean-Sébastien Coron, Ilya Kizhvatov |
Analysis of the split mask countermeasure for embedded systems. |
WESS |
2009 |
DBLP DOI BibTeX RDF |
cryptanalysis, DPA, side channel analysis, countermeasures, masking |
40 | HyungSo Yoo, Christoph Herbst, Stefan Mangard, Elisabeth Oswald, Sang-Jae Moon |
Investigations of Power Analysis Attacks and Countermeasures for ARIA. |
WISA |
2006 |
DBLP DOI BibTeX RDF |
DPA, smartcard, ARIA |
40 | Eric Peeters, François-Xavier Standaert, Nicolas Donckers, Jean-Jacques Quisquater |
Improved Higher-Order Side-Channel Attacks with FPGA Experiments. |
CHES |
2005 |
DBLP DOI BibTeX RDF |
cryptographic devices, high-order power analysis, masking countermeasure, FPGA, block cipher, DPA, side-channel analysis |
40 | Wieland Fischer, Berndt M. Gammel |
Masking at Gate Level in the Presence of Glitches. |
CHES |
2005 |
DBLP DOI BibTeX RDF |
random masking, masked logic circuits, Cryptanalysis, side-channel attacks, DPA, power analysis, logic circuits, digital circuits, masking, glitches |
40 | Dong Jin Park, Sang Gyoo Sim, Pil Joong Lee |
Fast Scalar Multiplication Method Using Change-of-Basis Matrix to Prevent Power Analysis Attacks on Koblitz Curves. |
WISA |
2003 |
DBLP DOI BibTeX RDF |
sliding window methods, basis conversion, Koblitz curve cryptosystems, DPA, scalar multiplication, SPA |
40 | MahnKi Ahn, JaeCheol Ha, Hoon-Jae Lee 0001, Sang-Jae Moon |
A Random M-ary Method Based Countermeasure against Side Channel Attacks. |
ICCSA (2) |
2003 |
DBLP DOI BibTeX RDF |
Random m-ary Recoding Algorithm, Side Channel Attacks, DPA, Elliptic Curve Cryptosystems, SPA, Power Analysis Attacks |
40 | JaeCheol Ha, Sang-Jae Moon |
Randomized Signed-Scalar Multiplication of ECC to Resist Power Attacks. |
CHES |
2002 |
DBLP DOI BibTeX RDF |
Side-channel attack, DPA, Elliptic curve cryptosystems, SPA, Power analysis attack, Non-adjacent form |
40 | Colin D. Walter |
Sliding Windows Succumbs to Big Mac Attack. |
CHES |
2001 |
DBLP DOI BibTeX RDF |
Cryptography, smart card, RSA, differential power analysis, DPA, blinding, sliding windows, exponentiation |
39 | Thomas Popp, Mario Kirschbaum, Stefan Mangard |
Practical Attacks on Masked Hardware. |
CT-RSA |
2009 |
DBLP DOI BibTeX RDF |
DPA-Resistant Masked Logic Styles, MDPL, Prototype Chip, Hardware AES, PDF-Attack, PRNG |
39 | Stefan Tillich, Christoph Herbst |
Attacking State-of-the-Art Software Countermeasures-A Case Study for AES. |
CHES |
2008 |
DBLP DOI BibTeX RDF |
software countermeasures, operation randomization, advanced DPA attacks, smart card, Advanced Encryption Standard, side channel attacks, power analysis, masking |
39 | Thomas Popp, Mario Kirschbaum, Thomas Zefferer, Stefan Mangard |
Evaluation of the Masked Logic Style MDPL on a Prototype Chip. |
CHES |
2007 |
DBLP DOI BibTeX RDF |
DPA-Resistant Logic Styles, Masked Logic, Dual-Rail Precharge Logic, Early Propagation Effect, Improved MDPL, Prototype Chip |
37 | Meng Yi, Qingkui Chen, Gang Zhang, Haiyan Zhao |
DPA: 一种动态环境下QoS单播路由算法 (DPA: A QoS Unicast Routing Algorithm in Dynamic Environment). |
计算机科学 |
2015 |
DBLP DOI BibTeX RDF |
|
37 | Luke Mather, Elisabeth Oswald, Carolyn Whitnall |
Multi-target DPA attacks: Pushing DPA beyond the limits of a desktop computer. |
IACR Cryptol. ePrint Arch. |
2014 |
DBLP BibTeX RDF |
|
37 | Luke Mather, Elisabeth Oswald, Carolyn Whitnall |
Multi-target DPA Attacks: Pushing DPA Beyond the Limits of a Desktop Computer. |
ASIACRYPT (1) |
2014 |
DBLP DOI BibTeX RDF |
|
37 | Michael Vielhaber 0001 |
Reduce-by-Feedback: Timing Resistant and DPA-Aware Modular Multiplication Plus: How to Break RSA by DPA. |
CHES |
2012 |
DBLP DOI BibTeX RDF |
|
37 | Houssem Maghrebi |
Masking countermeasures against HO-DPA : security evaluation and enhancement by specific mask encodings. (Les contre-mesures par masquage contre les attaques HO-DPA : évaluation et amélioration de la sécurité en utilisant des encodages spécifiques). |
|
2012 |
RDF |
|
37 | Shantenu Jha, Daniel S. Katz, Manish Parashar, Omer F. Rana, Murray Cole |
Abstractions for Distributed Systems (DPA 2008). |
Euro-Par Workshops |
2008 |
DBLP DOI BibTeX RDF |
|
37 | Daisuke Suzuki, Minoru Saeki, Tetsuya Ichikawa |
Random Switching Logic: A New Countermeasure against DPA and Second-Order DPA at the Logic Level. |
IEICE Trans. Fundam. Electron. Commun. Comput. Sci. |
2007 |
DBLP DOI BibTeX RDF |
|
35 | Victor Lomné, Thomas Ordas, Philippe Maurine, Lionel Torres, Michel Robert, Rafael Soares, Ney Calazans |
Triple Rail Logic Robustness against DPA. |
ReConFig |
2008 |
DBLP DOI BibTeX RDF |
STTL, DPA, SCA, CPA |
35 | Lejla Batina, Benedikt Gierlichs, Kerstin Lemke-Rust |
Comparative Evaluation of Rank Correlation Based DPA on an AES Prototype Chip. |
ISC |
2008 |
DBLP DOI BibTeX RDF |
Differential side-channel analysis, AES hardware, Stochastic model, DPA, Rank correlation, Template attacks |
35 | Zhenjiang Wang, Chenggang Wu 0002, Pen-Chung Yew |
On improving heap memory layout by dynamic pool allocation. |
CGO |
2010 |
DBLP DOI BibTeX RDF |
adaptive partial call chain, pool allocation, dynamic optimization, data layout |
35 | Kazuo Sakiyama, Tatsuya Yagi, Kazuo Ohta |
Fault Analysis Attack against an AES Prototype Chip Using RSL. |
CT-RSA |
2009 |
DBLP DOI BibTeX RDF |
Random Switching Logic, Clock-based Attack, AES, Fault Analysis |
35 | Matthieu Rivain, Emmanuel Prouff, Julien Doget |
Higher-Order Masking and Shuffling for Software Implementations of Block Ciphers. |
CHES |
2009 |
DBLP DOI BibTeX RDF |
|
35 | Jing Pan, J. I. den Hartog, Erik P. de Vink |
An Operation-Based Metric for CPA Resistance. |
SEC |
2008 |
DBLP DOI BibTeX RDF |
|
35 | Yingxi Lu, Máire O'Neill, John V. McCanny |
Differential Power Analysis of a SHACAL-2 hardware implementation. |
ISCAS |
2008 |
DBLP DOI BibTeX RDF |
|
35 | Khurram Waheed, Robert Bogdan Staszewski |
Mitigation of CMOS device variability in the transmitter amplitude path using Digital RF Processing. |
ISCAS |
2008 |
DBLP DOI BibTeX RDF |
|
35 | Massimo Alioto, Massimo Poli, Santina Rocchi |
A general model for differential power analysis attacks to static logic circuits. |
ISCAS |
2008 |
DBLP DOI BibTeX RDF |
|
35 | Mikko Alatossava, Lassi Hentilä, Veli-Matti Holappa, Juha Meinilä |
Comparison of Outdoor to Indoor and Indoor to Outdoor MIMO Propagation Characteristics at 5.25 GHz. |
VTC Spring |
2007 |
DBLP DOI BibTeX RDF |
|
35 | Dong Liu 0022, Weiyan Xing, Rui Li 0051, Chunyuan Zhang, Haiyan Li |
A Fault-Tolerant Real-Time Scheduling Algorithm in Software Fault-Tolerant Module. |
International Conference on Computational Science (4) |
2007 |
DBLP DOI BibTeX RDF |
real-time system, scheduling algorithm, software fault-tolerance |
35 | JaeCheol Ha, JeaHoon Park, Sang-Jae Moon, Sung-Ming Yen |
Provably Secure Countermeasure Resistant to Several Types of Power Attack for ECC. |
WISA |
2007 |
DBLP DOI BibTeX RDF |
Smart card, ECC, Side channel attack, Power analysis attack |
35 | Massimo Alioto, Massimo Poli, Santina Rocchi, Valerio Vignoli |
Mixed Techniques to Protect Precharged Busses against Differential Power Analysis Attacks. |
ISCAS |
2007 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #100 of 585 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ 4][ 5][ 6][ >>] |
|