|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 650 occurrences of 197 keywords
|
|
|
Results
Found 1257 publication records. Showing 1257 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
115 | Raphael C.-W. Phan, Sung-Ming Yen |
Amplifying Side-Channel Attacks with Techniques from Block Cipher Cryptanalysis. |
CARDIS |
2006 |
DBLP DOI BibTeX RDF |
Attacks and countermeasures in hardware and software, cryptanalysis, Advanced Encryption Standard, side-channel attacks, fault attacks |
100 | Kanthakumar Pongaliur, Zubin Abraham, Alex X. Liu, Li Xiao 0001, Leo C. Kempel |
Securing Sensor Nodes Against Side Channel Attacks. |
HASE |
2008 |
DBLP DOI BibTeX RDF |
|
96 | Katsuyuki Okeya, Kouichi Sakurai |
On Insecurity of the Side Channel Attack Countermeasure Using Addition-Subtraction Chains under Distinguishability between Addition and Doubling. |
ACISP |
2002 |
DBLP DOI BibTeX RDF |
Randomized Addition-Subtraction Chains Countermeasure, SPA Attack, Side Channel Attacks, Elliptic Curve Cryptosystems, Timing Attack |
94 | Katsuyuki Okeya |
Side Channel Attacks Against HMACs Based on Block-Cipher Based Hash Functions. |
ACISP |
2006 |
DBLP DOI BibTeX RDF |
(keyed) hash function, PGV construction, reverse DPA, side channel attacks, differential power analysis (DPA), HMAC |
88 | Katsuyuki Okeya, Kouichi Sakurai |
A Second-Order DPA Attack Breaks a Window-Method Based Countermeasure against Side Channel Attacks. |
ISC |
2002 |
DBLP DOI BibTeX RDF |
Higher-Order DPA Attack, Second-Order DPA Attack, Möller's Countermeasure, Side Channel Attacks, Differential Power Analysis, Elliptic Curve Cryptosystems |
87 | Kai Schramm, Gregor Leander, Patrick Felke, Christof Paar |
A Collision-Attack on AES: Combining Side Channel- and Differential-Attack. |
CHES |
2004 |
DBLP DOI BibTeX RDF |
internal collisions, AES, side channel attacks, birthday paradox |
86 | Katsuyuki Okeya, Dong-Guk Han |
Side Channel Attack on Ha-Moon's Countermeasure of Randomized Signed Scalar Multiplication. |
INDOCRYPT |
2003 |
DBLP DOI BibTeX RDF |
Ha-Moons Countermeasure, Finite Markov Chain, Side Channel Attacks, DPA, Elliptic Curve Cryptosystem, SPA |
86 | Shafi Goldwasser |
Cryptography without (Hardly Any) Secrets ? |
EUROCRYPT |
2009 |
DBLP DOI BibTeX RDF |
|
85 | Katsuyuki Okeya, Tetsu Iwata |
Side Channel Attacks on Message Authentication Codes. |
ESAS |
2005 |
DBLP DOI BibTeX RDF |
Selective Forgery, MACs, Side Channel Attacks, DPA, SPA |
82 | Dakshi Agrawal, Josyula R. Rao, Pankaj Rohatgi |
Multi-channel Attacks. |
CHES |
2003 |
DBLP DOI BibTeX RDF |
EM Analysis, Side-channel attacks, DPA, Power Analysis, DEMA |
82 | Katsuyuki Okeya, Tsuyoshi Takagi, Camille Vuillaume |
On the Exact Flexibility of the Flexible Countermeasure Against Side Channel Attacks. |
ACISP |
2004 |
DBLP DOI BibTeX RDF |
Fractional Window, Side Channel Attacks, Flexibility, Elliptic Curve Cryptosystems, Smartcard, Discrete Logarithm Problem |
81 | Onur Aciiçmez, Shay Gueron, Jean-Pierre Seifert |
New Branch Prediction Vulnerabilities in OpenSSL and Necessary Software Countermeasures. |
IMACC |
2007 |
DBLP DOI BibTeX RDF |
branch prediction attacks, cache eviction attacks, Binary Extended Euclidean Algorithm, software mitigation methods, OpenSSL, RSA, Side channel attacks, CRT, modular inversion |
79 | Ryad Benadjila, Olivier Billet, Stanislas Francfort |
Drm to counter side-channel attacks? |
Digital Rights Management Workshop |
2007 |
DBLP DOI BibTeX RDF |
white-box, AES, side-channel attacks, DRM |
79 | Marc Joye, Jean-Jacques Quisquater |
Hessian Elliptic Curves and Side-Channel Attacks. |
CHES |
2001 |
DBLP DOI BibTeX RDF |
Cryptography, Implementation, Smart-cards, Side-channel attacks, Elliptic curves |
79 | David Molnar, Matt Piotrowski, David Schultz, David A. Wagner 0001 |
The Program Counter Security Model: Automatic Detection and Removal of Control-Flow Side Channel Attacks. |
ICISC |
2005 |
DBLP DOI BibTeX RDF |
|
76 | François-Xavier Standaert, Benedikt Gierlichs, Ingrid Verbauwhede |
Partition vs. Comparison Side-Channel Distinguishers: An Empirical Evaluation of Statistical Tests for Univariate Side-Channel Attacks against Two Unprotected CMOS Devices. |
ICISC |
2008 |
DBLP DOI BibTeX RDF |
|
76 | MahnKi Ahn, JaeCheol Ha, Hoon-Jae Lee 0001, Sang-Jae Moon |
A Random M-ary Method Based Countermeasure against Side Channel Attacks. |
ICCSA (2) |
2003 |
DBLP DOI BibTeX RDF |
Random m-ary Recoding Algorithm, Side Channel Attacks, DPA, Elliptic Curve Cryptosystems, SPA, Power Analysis Attacks |
75 | Tae Hyun Kim 0003, Tsuyoshi Takagi, Dong-Guk Han, Ho Won Kim 0001, Jongin Lim 0001 |
Side Channel Attacks and Countermeasures on Pairing Based Cryptosystems over Binary Fields. |
CANS |
2006 |
DBLP DOI BibTeX RDF |
Randomized projective coordinate systems, Eta pairing, Side channel attacks, Differential Power Analysis, Pairing based cryptosystems |
75 | Svetla Nikova, Christian Rechberger, Vincent Rijmen |
Threshold Implementations Against Side-Channel Attacks and Glitches. |
ICICS |
2006 |
DBLP DOI BibTeX RDF |
side-channel attacks, secret sharing, Masking |
75 | Katsuyuki Okeya, Tsuyoshi Takagi, Camille Vuillaume |
Efficient Representations on Koblitz Curves with Resistance to Side Channel Attacks. |
ACISP |
2005 |
DBLP DOI BibTeX RDF |
SPA countermeasure, side channel attacks, elliptic curve cryptosystems, smartcard, Koblitz curves |
75 | Hoon-Jae Lee 0001, ManKi Ahn, Seongan Lim, Sang-Jae Moon |
A Study on Smart Card Security Evaluation Criteria for Side Channel Attacks. |
ICCSA (1) |
2004 |
DBLP DOI BibTeX RDF |
Protection Profiles, Vulnerability Assessment Activities, SPA/DPA, Smart Card, Side Channel Attacks, Common Criteria |
75 | François-Xavier Standaert, François Koeune, Werner Schindler |
How to Compare Profiled Side-Channel Attacks?. |
ACNS |
2009 |
DBLP DOI BibTeX RDF |
|
74 | Nachiketh R. Potlapally, Anand Raghunathan, Srivaths Ravi 0001, Niraj K. Jha, Ruby B. Lee |
Satisfiability-based framework for enabling side-channel attacks on cryptographic software. |
DATE Designers' Forum |
2006 |
DBLP DOI BibTeX RDF |
|
73 | Dong-Guk Han, Jongin Lim 0001, Kouichi Sakurai |
On Security of XTR Public Key Cryptosystems Against Side Channel Attacks. |
ACISP |
2004 |
DBLP DOI BibTeX RDF |
XTR Public Key Cryptosystem, Data-bit DPA, Address-bit DPA, doubling attack, Side Channel Attacks, SPA |
72 | Emmanuel Prouff, Robert P. McEvoy |
First-Order Side-Channel Attacks on the Permutation Tables Countermeasure. |
CHES |
2009 |
DBLP DOI BibTeX RDF |
Permutation Tables, MIA, Side-Channel Attacks, Masking, CPA |
72 | Zhenghong Wang, Ruby B. Lee |
New cache designs for thwarting software cache-based side channel attacks. |
ISCA |
2007 |
DBLP DOI BibTeX RDF |
security, cache, computer architecture, processor, timing attacks, side channel |
71 | Andrey Bogdanov, Ilya Kizhvatov, Andrei Pyshkin |
Algebraic Methods in Side-Channel Collision Attacks and Practical Collision Detection. |
INDOCRYPT |
2008 |
DBLP DOI BibTeX RDF |
multiple-differential collision attacks, ternary voting, AES, Side-channel attacks, DPA, collision attacks, algebraic cryptanalysis |
70 | Douglas Stebila, Nicolas Thériault |
Unified Point Addition Formulæ and Side-Channel Attacks. |
CHES |
2006 |
DBLP DOI BibTeX RDF |
unified point addition formulæ, projective coordinates, elliptic-curve cryptography, side-channel attacks |
66 | Camille Vuillaume, Katsuyuki Okeya |
Flexible Exponentiation with Resistance to Side Channel Attacks. |
ACNS |
2006 |
DBLP DOI BibTeX RDF |
fractional width, RSA, side channel attacks, simple power analysis |
66 | Loren D. Olson |
Side-Channel Attacks in ECC: A General Technique for Varying the Parametrization of the Elliptic Curve. |
CHES |
2004 |
DBLP DOI BibTeX RDF |
weighted projective curves, uniform addition formula, cryptography, ECC, side-channel attacks, Elliptic curves |
66 | Katsuyuki Okeya, Tsuyoshi Takagi |
A More Flexible Countermeasure against Side Channel Attacks Using Window Method. |
CHES |
2003 |
DBLP DOI BibTeX RDF |
Width-w NAF, Fractional window, Pre-computation Table, Smart Card, Side Channel Attacks, Elliptic Curve Cryptosystem, Memory Constraint |
66 | Tetsuya Izu, Bodo Möller, Tsuyoshi Takagi |
Improved Elliptic Curve Multiplication Methods Resistant against Side Channel Attacks. |
INDOCRYPT |
2002 |
DBLP DOI BibTeX RDF |
side channel attacks, elliptic curve cryptosystems, scalar multiplication, window method, memory constraints |
66 | Katsuyuki Okeya, Kunihiko Miyazaki, Kouichi Sakurai |
A Fast Scalar Multiplication Method with Randomized Projective Coordinates on a Montgomery-Form Elliptic Curve Secure against Side Channel Attacks. |
ICISC |
2001 |
DBLP DOI BibTeX RDF |
Montgomery Form, Randomized Projective Coordinates, Side Channel Attacks, Elliptic Curve Cryptosystem |
65 | Yuval Ishai, Amit Sahai, David A. Wagner 0001 |
Private Circuits: Securing Hardware against Probing Attacks. |
CRYPTO |
2003 |
DBLP DOI BibTeX RDF |
Cryptanalysis, provable security, side channel attacks, secure multi-party computation, circuit complexity |
63 | Katsuyuki Okeya, Tsuyoshi Takagi, Camille Vuillaume |
On the Importance of Protecting Delta in SFLASH against Side Channel Attacks. |
ITCC (2) |
2004 |
DBLP DOI BibTeX RDF |
Asymmetric Signature, C *, C *-, Hidden Monomial Problem, Side Channel Attacks, SHA-1, SFLASH |
63 | Colin D. Walter |
Longer Keys May Facilitate Side Channel Attacks. |
Selected Areas in Cryptography |
2003 |
DBLP DOI BibTeX RDF |
Key Length, Side Channel Attacks, DPA, Power Analysis, Timing Attack, RSA Cryptosystem |
63 | Katsuyuki Okeya, Tsuyoshi Takagi |
The Width-w NAF Method Provides Small Memory and Fast Elliptic Scalar Multiplications Secure against Side Channel Attacks. |
CT-RSA |
2003 |
DBLP DOI BibTeX RDF |
width-w NAF, pre-computation table, smart card, side channel attacks, Elliptic curve cryptosystem, memory constraint |
62 | Mustapha Hedabou |
Efficient Countermeasures for Thwarting the SCA Attacks on the Frobenius Based Methods. |
IMACC |
2005 |
DBLP DOI BibTeX RDF |
?–adic method, precomputed table, Side Channel Attacks, Elliptic curve, scalar multiplication, Frobenius map |
61 | Dong-Guk Han, Katsuyuki Okeya, Tae Hyun Kim 0003, Yoon Sung Hwang, Young-Ho Park 0001, Souhwan Jung |
Cryptanalysis of the Countermeasures Using Randomized Binary Signed Digits. |
ACNS |
2004 |
DBLP DOI BibTeX RDF |
BSD Representation, Ha-Moons Countermeasure, Ebeid-Hasans Countermeasure, Agagliates Countermeasure, Side Channel Attacks, DPA, Elliptic Curve Cryptosystem, SPA |
60 | Masaaki Shirase, Tsuyoshi Takagi, Eiji Okamoto |
An Efficient Countermeasure against Side Channel Attacks for Pairing Computation. |
ISPEC |
2008 |
DBLP DOI BibTeX RDF |
random value addition, side channel attacks, Tate pairing, ? T pairing |
59 | Praveen Gauravaram, Katsuyuki Okeya |
An Update on the Side Channel Cryptanalysis of MACs Based on Cryptographic Hash Functions. |
INDOCRYPT |
2007 |
DBLP DOI BibTeX RDF |
M-NMAC, MDx-MAC, Side channel attacks, DPA, HMAC |
59 | Mustapha Hedabou, Pierre Pinel, Lucien Bénéteau |
Countermeasures for Preventing Comb Method Against SCA Attacks. |
ISPEC |
2005 |
DBLP DOI BibTeX RDF |
comb method, pre-computed table, memory space, side channel attacks, Elliptic curve, scalar multiplication |
58 | Wei Li 0013, Dawu Gu |
An Approach for Symmetric Encryption Against Side Channel Attacks in Provable Security. |
ProvSec |
2007 |
DBLP DOI BibTeX RDF |
|
58 | Dong-Guk Han, Tsuyoshi Takagi, Tae Hyun Kim 0003, Howon Kim 0001, Kyoil Chung |
Collision Attack on XTR and a Countermeasure with a Fixed Pattern. |
EUC Workshops |
2005 |
DBLP DOI BibTeX RDF |
XTR public key system, XTR Exponentiation Algorithms, Ubiquitous computer, Side Channel Attacks, Collision Attack |
58 | Tanja Römer, Jean-Pierre Seifert |
Information Leakage Attacks against Smart Card Implementations of the Elliptic Curve Digital Signature Algorithm. |
E-smart |
2001 |
DBLP DOI BibTeX RDF |
successive minimum, Cryptanalysis, side-channel-attacks, Lattice, ECDSA, Lattice basis reduction, LLL |
57 | Tanja Lange 0001, Pradeep Kumar Mishra |
SCA Resistant Parallel Explicit Formula for Addition and Doubling of Divisors in the Jacobian of Hyperelliptic Curves of Genus 2. |
INDOCRYPT |
2005 |
DBLP DOI BibTeX RDF |
|
56 | Julien Cathalo, François Koeune, Jean-Jacques Quisquater |
A New Type of Timing Attack: Application to GPS. |
CHES |
2003 |
DBLP DOI BibTeX RDF |
GPS, Side-Channel Attacks, Timing Attacks, Identification Schemes |
56 | Josyula R. Rao, Pankaj Rohatgi, Helmut Scherzer, Stéphane Tinguely |
Partitioning Attacks: Or How to Rapidly Clone Some GSM Cards. |
S&P |
2002 |
DBLP DOI BibTeX RDF |
commercial and industrial security, COMP128, authentication, security protocols, side channel attacks, smartcards, GSM |
55 | Jun Wu, Yong-Bin Kim, Minsu Choi |
Low-power side-channel attack-resistant asynchronous S-box design for AES cryptosystems. |
ACM Great Lakes Symposium on VLSI |
2010 |
DBLP DOI BibTeX RDF |
substitution box, substitution box (S-box), differential power/noise analysis, power/noise measurement, security, advanced encryption standard, advanced encryption standard, side-channel attacks (SCA), null convention logic |
55 | Pascal Delaunay, Antoine Joux |
Yet Another Attack on Vest. |
AFRICACRYPT |
2008 |
DBLP DOI BibTeX RDF |
VEST, Stream Ciphers, Side Channel Attacks, Fourier Transform |
55 | Zhimin Chen, Yujie Zhou |
Dual-Rail Random Switching Logic: A Countermeasure to Reduce Side Channel Leakage. |
CHES |
2006 |
DBLP DOI BibTeX RDF |
Gate Level Masking, DRSL, Dual-Rail, Pre-charge, Side Channel Attacks, DPA |
55 | Naofumi Homma, Sei Nagashima, Yuichi Imai, Takafumi Aoki, Akashi Satoh |
High-Resolution Side-Channel Attack Using Phase-Based Waveform Matching. |
CHES |
2006 |
DBLP DOI BibTeX RDF |
cryptographic module, waveform matching, phase-only correlation, side-channel attacks, DPA, DEMA |
55 | Wieland Fischer, Berndt M. Gammel |
Masking at Gate Level in the Presence of Glitches. |
CHES |
2005 |
DBLP DOI BibTeX RDF |
random masking, masked logic circuits, Cryptanalysis, side-channel attacks, DPA, power analysis, logic circuits, digital circuits, masking, glitches |
53 | Donggang Liu, Qi Dong 0001 |
Combating side-channel attacks using key management. |
IPDPS |
2009 |
DBLP DOI BibTeX RDF |
|
52 | Mathieu Renauld, François-Xavier Standaert, Nicolas Veyrat-Charvillon |
Algebraic Side-Channel Attacks on the AES: Why Time also Matters in DPA. |
CHES |
2009 |
DBLP DOI BibTeX RDF |
|
52 | ManKi Ahn, Hoon-Jae Lee 0001 |
Experiments and Hardware Countermeasures on Power Analysis Attacks. |
ICCSA (3) |
2006 |
DBLP DOI BibTeX RDF |
SPA/DPA, Side Channel Attacks, Power Analysis, SmartCard, Countermeasure |
52 | Kai Schramm, Christof Paar |
IT Security Project: Implementation of the Advanced Encryption Standard (AES) on a Smart Card. |
ITCC (1) |
2004 |
DBLP DOI BibTeX RDF |
RISC architecture, smart cards, AES, side channel attacks |
52 | Jean-Claude Bajard, Laurent Imbert, Pierre-Yvan Liardet, Yannick Teglia |
Leak Resistant Arithmetic. |
CHES |
2004 |
DBLP DOI BibTeX RDF |
RNS Montgomery multiplication, Side channel attacks, residue number systems |
52 | Louis Goubin |
A Refined Power-Analysis Attack on Elliptic Curve Cryptosystems. |
Public Key Cryptography |
2003 |
DBLP DOI BibTeX RDF |
Side-channel attacks, Public-key cryptography, Elliptic curves, Differential Power Analysis (DPA), Power Analysis, Smartcards |
52 | Kai Schramm, Thomas J. Wollinger, Christof Paar |
A New Class of Collision Attacks and Its Application to DES. |
FSE |
2003 |
DBLP DOI BibTeX RDF |
internal collisions, side channel attacks, power analysis, DES, S-Boxes, collision attack |
52 | Roberto Maria Avanzi |
Countermeasures against Differential Power Analysis for Hyperelliptic Curve Cryptosystems. |
CHES |
2003 |
DBLP DOI BibTeX RDF |
Smart cards, Side-channel attacks, Public-key cryptography, Differential power analysis (DPA), Timing attacks, Hyperelliptic curves |
52 | Marc Joye, Jean-Jacques Quisquater, Sung-Ming Yen, Moti Yung |
Observability Analysis - Detecting When Improved Cryptosystems Fail. |
CT-RSA |
2002 |
DBLP DOI BibTeX RDF |
robustness, cryptanalysis, implementations, side-channel attacks, observability, Security analysis, fault analysis, cryptosystems |
52 | Onur Aciiçmez, Jean-Pierre Seifert |
Cheap Hardware Parallelism Implies Cheap Security. |
FDTC |
2007 |
DBLP DOI BibTeX RDF |
|
49 | Jingfei Kong, Onur Aciiçmez, Jean-Pierre Seifert, Huiyang Zhou |
Hardware-software integrated approaches to defend against software cache-based side channel attacks. |
HPCA |
2009 |
DBLP DOI BibTeX RDF |
|
49 | Artemios G. Voyiatzis, Dimitrios N. Serpanos |
The security of the Fiat-Shamir scheme in the presence of transient hardware faults. |
ACM Trans. Embed. Comput. Syst. |
2008 |
DBLP DOI BibTeX RDF |
Fiat-Shamir identification scheme, cryptography, side-channel attacks, smartcards, Bellcore attack |
49 | Stefan Tillich, Christoph Herbst |
Attacking State-of-the-Art Software Countermeasures-A Case Study for AES. |
CHES |
2008 |
DBLP DOI BibTeX RDF |
software countermeasures, operation randomization, advanced DPA attacks, smart card, Advanced Encryption Standard, side channel attacks, power analysis, masking |
49 | Praveen Gauravaram, Katsuyuki Okeya |
Side Channel Analysis of Some Hash Based MACs: A Response to SHA-3 Requirements. |
ICICS |
2008 |
DBLP DOI BibTeX RDF |
hash functions, side channel attacks, HMAC, Applied cryptography |
49 | Nachiketh R. Potlapally, Anand Raghunathan, Srivaths Ravi 0001, Niraj K. Jha, Ruby B. Lee |
Aiding Side-Channel Attacks on Cryptographic Software With Satisfiability-Based Analysis. |
IEEE Trans. Very Large Scale Integr. Syst. |
2007 |
DBLP DOI BibTeX RDF |
|
49 | Elena Trichina, Antonio Bellezza |
Implementation of Elliptic Curve Cryptography with Built-In Counter Measures against Side Channel Attacks. |
CHES |
2002 |
DBLP DOI BibTeX RDF |
|
49 | Jean-Sébastien Coron, Ilya Kizhvatov |
An Efficient Method for Random Delay Generation in Embedded Software. |
CHES |
2009 |
DBLP DOI BibTeX RDF |
random delays, Side channel attacks, countermeasures |
49 | K. Gopalakrishnan, Nicolas Thériault, Chui Zhi Yao |
Solving Discrete Logarithms from Partial Knowledge of the Key. |
INDOCRYPT |
2007 |
DBLP DOI BibTeX RDF |
Generic Groups, Side Channel Attacks, Discrete Logarithm Problem |
49 | Amir Moradi 0001, Mohammad T. Manzuri Shalmani, Mahmoud Salmasizadeh |
A Generalized Method of Differential Fault Attack Against AES Cryptosystem. |
CHES |
2006 |
DBLP DOI BibTeX RDF |
Cryptanalysis, Smart Card, AES, Side Channel Attacks, Fault Attacks |
49 | Katsuyuki Okeya, Tsuyoshi Takagi |
Security Analysis of CRT-Based Cryptosystems. |
ACNS |
2004 |
DBLP DOI BibTeX RDF |
Multi-Prime RSA, PKCS #1, RSA, Side Channel Attacks, Factoring, Chinese Remainder Theorem |
49 | Lejla Batina, Geeke Bruin-Muurling, Siddika Berna Örs |
Flexible Hardware Design for RSA and Elliptic Curve Cryptosystems. |
CT-RSA |
2004 |
DBLP DOI BibTeX RDF |
RSA, ECC, Side-channel attacks, Systolic array, Hardware implementation, Montgomery multiplication, FPGA design |
49 | Johannes Blömer, Alexander May 0001 |
New Partial Key Exposure Attacks on RSA. |
CRYPTO |
2003 |
DBLP DOI BibTeX RDF |
|
48 | Werner Schindler |
On the Optimization of Side-Channel Attacks by Advanced Stochastic Methods. |
Public Key Cryptography |
2005 |
DBLP DOI BibTeX RDF |
Montgomerys multiplication algo-rithm, statistical decision problem, optimal decision strategy, Side-channel attack, stochastic process |
46 | Zhimin Chen 0002, Syed Haider, Patrick Schaumont |
Side-Channel Leakage in Masked Circuits Caused by Higher-Order Circuit Effects. |
ISA |
2009 |
DBLP DOI BibTeX RDF |
|
46 | HeeSeok Kim, Tae Hyun Kim 0003, Jeong Choon Ryoo, Dong-Guk Han, Howon Kim 0001, Jongin Lim 0001 |
Enhanced Doubling Attacks on Signed-All-Bits Set Recoding. |
WISTP |
2007 |
DBLP DOI BibTeX RDF |
sABS recoding, SPA-based analysis, Doubling Attack, Side Channel Attacks, scalar multiplication |
46 | Helena Handschuh, Bart Preneel |
Blind Differential Cryptanalysis for Enhanced Power Attacks. |
Selected Areas in Cryptography |
2006 |
DBLP DOI BibTeX RDF |
combined cryptanalysis, blind cryptanalysis, side channel attacks, power analysis, differential cryptanalysis, Hamming weights |
46 | Sergei P. Skorobogatov |
Optically Enhanced Position-Locked Power Analysis. |
CHES |
2006 |
DBLP DOI BibTeX RDF |
semi-invasive attacks, optical probing, side-channel attacks, power analysis |
46 | Itsik Mantin |
A Practical Attack on the Fixed RC4 in the WEP Mode. |
ASIACRYPT |
2005 |
DBLP DOI BibTeX RDF |
Related IV attacks, Cryptanalysis, Stream ciphers, Side-channel attacks, Fault analysis, RC4, Related key attacks |
46 | Pradeep Kumar Mishra, Palash Sarkar 0001 |
Application of Montgomery's Trick to Scalar Multiplication for Elliptic and Hyperelliptic Curves Using a Fixed Base Point. |
Public Key Cryptography |
2004 |
DBLP DOI BibTeX RDF |
scalar multipication, field inversion, side-channel attacks, elliptic curves, hyperelliptic curves, explicit formulae |
46 | Gilles Piret, Jean-Jacques Quisquater |
A Differential Fault Attack Technique against SPN Structures, with Application to the AES and KHAZAD. |
CHES |
2003 |
DBLP DOI BibTeX RDF |
Block Ciphers, AES, Side-channel Attacks, Fault Attacks |
46 | Marc Joye, Sung-Ming Yen |
The Montgomery Powering Ladder. |
CHES |
2002 |
DBLP DOI BibTeX RDF |
Montgomery powering ladder, constrained environments, cryptographic implementations, side-channel attacks, fault attacks, Exponentiation algorithms |
45 | Christophe Clavier, Marc Joye |
Universal Exponentiation Algorithm. |
CHES |
2001 |
DBLP DOI BibTeX RDF |
Implementation, smart-cards, provable security, side-channel attacks, discrete logarithm, exponentiation, simple power analysis (SPA), RSA cryptosystem, addition chains |
45 | Anjela Yu. Matrosova, Ekaterina Loukovnikova, Sergei Ostanin, Alexandra Zinchuk, Ekaterina Nikolaeva |
Test Generation for Single and Multiple Stuck-at Faults of a Combinational Circuit Designed by Covering Shared ROBDD with CLBs. |
DFT |
2007 |
DBLP DOI BibTeX RDF |
|
44 | Onur Aciiçmez, Çetin Kaya Koç, Jean-Pierre Seifert |
Predicting Secret Keys Via Branch Prediction. |
CT-RSA |
2007 |
DBLP DOI BibTeX RDF |
Simultaneous Multi-threading, RSA, Branch Prediction, Side Channel Analysis, Montgomery Multiplication, Modular Exponentiation |
43 | Lejla Batina, Nele Mentens, Ingrid Verbauwhede |
Side-Channel Issues for Designing Secure Hardware Implementations. |
IOLTS |
2005 |
DBLP DOI BibTeX RDF |
|
43 | Christoph Herbst, Marcel Medwed |
Using Templates to Attack Masked Montgomery Ladder Implementations of Modular Exponentiation. |
WISA |
2008 |
DBLP DOI BibTeX RDF |
Montgomery Ladder, Base Point Blinding, Smart Cards, RSA, Side- Channel Attacks, Power Analysis, Microcontroller, Template Attacks |
43 | Sylvain Guilley, Florent Flament, Philippe Hoogvorst, Renaud Pacalet, Yves Mathieu |
Secured CAD Back-End Flow for Power-Analysis-Resistant Cryptoprocessors. |
IEEE Des. Test Comput. |
2007 |
DBLP DOI BibTeX RDF |
robust hardware, back-end design automation, power-constant architectures, DFY, side-channel attacks, DFM, mitigation |
43 | Marc Joye, Christophe Tymen |
Protections against Differential Analysis for Elliptic Curve Cryptography. |
CHES |
2001 |
DBLP DOI BibTeX RDF |
Smart-cards, Side-channel attacks, Public-key cryptography, Elliptic curves, Differential power analysis (DPA), Timing attacks |
42 | Francesco Regazzoni 0001, Thomas Eisenbarth 0001, Luca Breveglieri, Paolo Ienne, Israel Koren |
Can Knowledge Regarding the Presence of Countermeasures Against Fault Attacks Simplify Power Attacks on Cryptographic Devices?. |
DFT |
2008 |
DBLP DOI BibTeX RDF |
|
39 | Jingfei Kong, Onur Aciiçmez, Jean-Pierre Seifert, Huiyang Zhou |
Deconstructing new cache designs for thwarting software cache-based side channel attacks. |
CSAW |
2008 |
DBLP DOI BibTeX RDF |
microarchitectural analysis, cryptanalysis, side-channel analysis, timing attack, cache architecture, cache attack |
39 | Chuan-Wen Loe, Khoongming Khoo |
Side Channel Attacks on Irregularly Decimated Generators. |
ICISC |
2007 |
DBLP DOI BibTeX RDF |
Irregularly Decimated Generators, ABSG, Timing Analysis, Fault Attack, DECIM |
39 | Eric Brier, Marc Joye |
Weierstraß Elliptic Curves and Side-Channel Attacks. |
Public Key Cryptography |
2002 |
DBLP DOI BibTeX RDF |
|
39 | Geir Olav Dyrkolbotn, Einar Snekkenes |
A Wireless Covert Channel on Smart Cards (Short Paper). |
ICICS |
2006 |
DBLP DOI BibTeX RDF |
EMSide-Channel, Wireless Covert Channel, Smart Cards, Subversion |
39 | Robert P. McEvoy, Colin C. Murphy, William P. Marnane, Michael Tunstall |
Isolated WDDL: A Hiding Countermeasure for Differential Power Analysis on FPGAs. |
ACM Trans. Reconfigurable Technol. Syst. |
2009 |
DBLP DOI BibTeX RDF |
secure logic, FPGA, Side-channel attacks, DPA, Whirlpool |
39 | Rafael Soares, Ney Laert Vilar Calazans, Victor Lomné, Philippe Maurine, Lionel Torres, Michel Robert |
Evaluating the robustness of secure triple track logic through prototyping. |
SBCCI |
2008 |
DBLP DOI BibTeX RDF |
logic style, FPGA, side-channel attacks, DPA, DES, CPA |
39 | Sanjay Burman, Debdeep Mukhopadhyay, Kamakoti Veezhinathan |
LFSR Based Stream Ciphers Are Vulnerable to Power Attacks. |
INDOCRYPT |
2007 |
DBLP DOI BibTeX RDF |
Linear Feed Back Shift Registers, Dynamic Power Dissipation, Side Channel Attacks, Power Analysis, Hamming Distance |
39 | Tetsuya Izu, Tsuyoshi Takagi |
Fast Elliptic Curve Multiplications with SIMD Operations. |
ICICS |
2002 |
DBLP DOI BibTeX RDF |
NAF, SIMD operations, side channel attacks, Elliptic Curve Cryptosystems (ECC), scalar multiplication, window method |
Displaying result #1 - #100 of 1257 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ >>] |
|