The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for phrase side-channel-attacks (changed automatically) with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1998-2002 (35) 2003 (23) 2004 (44) 2005 (41) 2006 (42) 2007 (55) 2008 (59) 2009 (47) 2010 (24) 2011 (30) 2012 (30) 2013 (36) 2014 (38) 2015 (42) 2016 (50) 2017 (69) 2018 (75) 2019 (81) 2020 (85) 2021 (101) 2022 (99) 2023 (123) 2024 (28)
Publication types (Num. hits)
article(451) incollection(7) inproceedings(754) phdthesis(45)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 650 occurrences of 197 keywords

Results
Found 1257 publication records. Showing 1257 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
115Raphael C.-W. Phan, Sung-Ming Yen Amplifying Side-Channel Attacks with Techniques from Block Cipher Cryptanalysis. Search on Bibsonomy CARDIS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Attacks and countermeasures in hardware and software, cryptanalysis, Advanced Encryption Standard, side-channel attacks, fault attacks
100Kanthakumar Pongaliur, Zubin Abraham, Alex X. Liu, Li Xiao 0001, Leo C. Kempel Securing Sensor Nodes Against Side Channel Attacks. Search on Bibsonomy HASE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
96Katsuyuki Okeya, Kouichi Sakurai On Insecurity of the Side Channel Attack Countermeasure Using Addition-Subtraction Chains under Distinguishability between Addition and Doubling. Search on Bibsonomy ACISP The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Randomized Addition-Subtraction Chains Countermeasure, SPA Attack, Side Channel Attacks, Elliptic Curve Cryptosystems, Timing Attack
94Katsuyuki Okeya Side Channel Attacks Against HMACs Based on Block-Cipher Based Hash Functions. Search on Bibsonomy ACISP The full citation details ... 2006 DBLP  DOI  BibTeX  RDF (keyed) hash function, PGV construction, reverse DPA, side channel attacks, differential power analysis (DPA), HMAC
88Katsuyuki Okeya, Kouichi Sakurai A Second-Order DPA Attack Breaks a Window-Method Based Countermeasure against Side Channel Attacks. Search on Bibsonomy ISC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Higher-Order DPA Attack, Second-Order DPA Attack, Möller's Countermeasure, Side Channel Attacks, Differential Power Analysis, Elliptic Curve Cryptosystems
87Kai Schramm, Gregor Leander, Patrick Felke, Christof Paar A Collision-Attack on AES: Combining Side Channel- and Differential-Attack. Search on Bibsonomy CHES The full citation details ... 2004 DBLP  DOI  BibTeX  RDF internal collisions, AES, side channel attacks, birthday paradox
86Katsuyuki Okeya, Dong-Guk Han Side Channel Attack on Ha-Moon's Countermeasure of Randomized Signed Scalar Multiplication. Search on Bibsonomy INDOCRYPT The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Ha-Moons Countermeasure, Finite Markov Chain, Side Channel Attacks, DPA, Elliptic Curve Cryptosystem, SPA
86Shafi Goldwasser Cryptography without (Hardly Any) Secrets ? Search on Bibsonomy EUROCRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
85Katsuyuki Okeya, Tetsu Iwata Side Channel Attacks on Message Authentication Codes. Search on Bibsonomy ESAS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Selective Forgery, MACs, Side Channel Attacks, DPA, SPA
82Dakshi Agrawal, Josyula R. Rao, Pankaj Rohatgi Multi-channel Attacks. Search on Bibsonomy CHES The full citation details ... 2003 DBLP  DOI  BibTeX  RDF EM Analysis, Side-channel attacks, DPA, Power Analysis, DEMA
82Katsuyuki Okeya, Tsuyoshi Takagi, Camille Vuillaume On the Exact Flexibility of the Flexible Countermeasure Against Side Channel Attacks. Search on Bibsonomy ACISP The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Fractional Window, Side Channel Attacks, Flexibility, Elliptic Curve Cryptosystems, Smartcard, Discrete Logarithm Problem
81Onur Aciiçmez, Shay Gueron, Jean-Pierre Seifert New Branch Prediction Vulnerabilities in OpenSSL and Necessary Software Countermeasures. Search on Bibsonomy IMACC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF branch prediction attacks, cache eviction attacks, Binary Extended Euclidean Algorithm, software mitigation methods, OpenSSL, RSA, Side channel attacks, CRT, modular inversion
79Ryad Benadjila, Olivier Billet, Stanislas Francfort Drm to counter side-channel attacks? Search on Bibsonomy Digital Rights Management Workshop The full citation details ... 2007 DBLP  DOI  BibTeX  RDF white-box, AES, side-channel attacks, DRM
79Marc Joye, Jean-Jacques Quisquater Hessian Elliptic Curves and Side-Channel Attacks. Search on Bibsonomy CHES The full citation details ... 2001 DBLP  DOI  BibTeX  RDF Cryptography, Implementation, Smart-cards, Side-channel attacks, Elliptic curves
79David Molnar, Matt Piotrowski, David Schultz, David A. Wagner 0001 The Program Counter Security Model: Automatic Detection and Removal of Control-Flow Side Channel Attacks. Search on Bibsonomy ICISC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
76François-Xavier Standaert, Benedikt Gierlichs, Ingrid Verbauwhede Partition vs. Comparison Side-Channel Distinguishers: An Empirical Evaluation of Statistical Tests for Univariate Side-Channel Attacks against Two Unprotected CMOS Devices. Search on Bibsonomy ICISC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
76MahnKi Ahn, JaeCheol Ha, Hoon-Jae Lee 0001, Sang-Jae Moon A Random M-ary Method Based Countermeasure against Side Channel Attacks. Search on Bibsonomy ICCSA (2) The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Random m-ary Recoding Algorithm, Side Channel Attacks, DPA, Elliptic Curve Cryptosystems, SPA, Power Analysis Attacks
75Tae Hyun Kim 0003, Tsuyoshi Takagi, Dong-Guk Han, Ho Won Kim 0001, Jongin Lim 0001 Side Channel Attacks and Countermeasures on Pairing Based Cryptosystems over Binary Fields. Search on Bibsonomy CANS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Randomized projective coordinate systems, Eta pairing, Side channel attacks, Differential Power Analysis, Pairing based cryptosystems
75Svetla Nikova, Christian Rechberger, Vincent Rijmen Threshold Implementations Against Side-Channel Attacks and Glitches. Search on Bibsonomy ICICS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF side-channel attacks, secret sharing, Masking
75Katsuyuki Okeya, Tsuyoshi Takagi, Camille Vuillaume Efficient Representations on Koblitz Curves with Resistance to Side Channel Attacks. Search on Bibsonomy ACISP The full citation details ... 2005 DBLP  DOI  BibTeX  RDF SPA countermeasure, side channel attacks, elliptic curve cryptosystems, smartcard, Koblitz curves
75Hoon-Jae Lee 0001, ManKi Ahn, Seongan Lim, Sang-Jae Moon A Study on Smart Card Security Evaluation Criteria for Side Channel Attacks. Search on Bibsonomy ICCSA (1) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Protection Profiles, Vulnerability Assessment Activities, SPA/DPA, Smart Card, Side Channel Attacks, Common Criteria
75François-Xavier Standaert, François Koeune, Werner Schindler How to Compare Profiled Side-Channel Attacks?. Search on Bibsonomy ACNS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
74Nachiketh R. Potlapally, Anand Raghunathan, Srivaths Ravi 0001, Niraj K. Jha, Ruby B. Lee Satisfiability-based framework for enabling side-channel attacks on cryptographic software. Search on Bibsonomy DATE Designers' Forum The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
73Dong-Guk Han, Jongin Lim 0001, Kouichi Sakurai On Security of XTR Public Key Cryptosystems Against Side Channel Attacks. Search on Bibsonomy ACISP The full citation details ... 2004 DBLP  DOI  BibTeX  RDF XTR Public Key Cryptosystem, Data-bit DPA, Address-bit DPA, doubling attack, Side Channel Attacks, SPA
72Emmanuel Prouff, Robert P. McEvoy First-Order Side-Channel Attacks on the Permutation Tables Countermeasure. Search on Bibsonomy CHES The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Permutation Tables, MIA, Side-Channel Attacks, Masking, CPA
72Zhenghong Wang, Ruby B. Lee New cache designs for thwarting software cache-based side channel attacks. Search on Bibsonomy ISCA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF security, cache, computer architecture, processor, timing attacks, side channel
71Andrey Bogdanov, Ilya Kizhvatov, Andrei Pyshkin Algebraic Methods in Side-Channel Collision Attacks and Practical Collision Detection. Search on Bibsonomy INDOCRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF multiple-differential collision attacks, ternary voting, AES, Side-channel attacks, DPA, collision attacks, algebraic cryptanalysis
70Douglas Stebila, Nicolas Thériault Unified Point Addition Formulæ and Side-Channel Attacks. Search on Bibsonomy CHES The full citation details ... 2006 DBLP  DOI  BibTeX  RDF unified point addition formulæ, projective coordinates, elliptic-curve cryptography, side-channel attacks
66Camille Vuillaume, Katsuyuki Okeya Flexible Exponentiation with Resistance to Side Channel Attacks. Search on Bibsonomy ACNS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF fractional width, RSA, side channel attacks, simple power analysis
66Loren D. Olson Side-Channel Attacks in ECC: A General Technique for Varying the Parametrization of the Elliptic Curve. Search on Bibsonomy CHES The full citation details ... 2004 DBLP  DOI  BibTeX  RDF weighted projective curves, uniform addition formula, cryptography, ECC, side-channel attacks, Elliptic curves
66Katsuyuki Okeya, Tsuyoshi Takagi A More Flexible Countermeasure against Side Channel Attacks Using Window Method. Search on Bibsonomy CHES The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Width-w NAF, Fractional window, Pre-computation Table, Smart Card, Side Channel Attacks, Elliptic Curve Cryptosystem, Memory Constraint
66Tetsuya Izu, Bodo Möller, Tsuyoshi Takagi Improved Elliptic Curve Multiplication Methods Resistant against Side Channel Attacks. Search on Bibsonomy INDOCRYPT The full citation details ... 2002 DBLP  DOI  BibTeX  RDF side channel attacks, elliptic curve cryptosystems, scalar multiplication, window method, memory constraints
66Katsuyuki Okeya, Kunihiko Miyazaki, Kouichi Sakurai A Fast Scalar Multiplication Method with Randomized Projective Coordinates on a Montgomery-Form Elliptic Curve Secure against Side Channel Attacks. Search on Bibsonomy ICISC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF Montgomery Form, Randomized Projective Coordinates, Side Channel Attacks, Elliptic Curve Cryptosystem
65Yuval Ishai, Amit Sahai, David A. Wagner 0001 Private Circuits: Securing Hardware against Probing Attacks. Search on Bibsonomy CRYPTO The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Cryptanalysis, provable security, side channel attacks, secure multi-party computation, circuit complexity
63Katsuyuki Okeya, Tsuyoshi Takagi, Camille Vuillaume On the Importance of Protecting Delta in SFLASH against Side Channel Attacks. Search on Bibsonomy ITCC (2) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Asymmetric Signature, C *, C *-, Hidden Monomial Problem, Side Channel Attacks, SHA-1, SFLASH
63Colin D. Walter Longer Keys May Facilitate Side Channel Attacks. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Key Length, Side Channel Attacks, DPA, Power Analysis, Timing Attack, RSA Cryptosystem
63Katsuyuki Okeya, Tsuyoshi Takagi The Width-w NAF Method Provides Small Memory and Fast Elliptic Scalar Multiplications Secure against Side Channel Attacks. Search on Bibsonomy CT-RSA The full citation details ... 2003 DBLP  DOI  BibTeX  RDF width-w NAF, pre-computation table, smart card, side channel attacks, Elliptic curve cryptosystem, memory constraint
62Mustapha Hedabou Efficient Countermeasures for Thwarting the SCA Attacks on the Frobenius Based Methods. Search on Bibsonomy IMACC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF ?–adic method, precomputed table, Side Channel Attacks, Elliptic curve, scalar multiplication, Frobenius map
61Dong-Guk Han, Katsuyuki Okeya, Tae Hyun Kim 0003, Yoon Sung Hwang, Young-Ho Park 0001, Souhwan Jung Cryptanalysis of the Countermeasures Using Randomized Binary Signed Digits. Search on Bibsonomy ACNS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF BSD Representation, Ha-Moons Countermeasure, Ebeid-Hasans Countermeasure, Agagliates Countermeasure, Side Channel Attacks, DPA, Elliptic Curve Cryptosystem, SPA
60Masaaki Shirase, Tsuyoshi Takagi, Eiji Okamoto An Efficient Countermeasure against Side Channel Attacks for Pairing Computation. Search on Bibsonomy ISPEC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF random value addition, side channel attacks, Tate pairing, ? T pairing
59Praveen Gauravaram, Katsuyuki Okeya An Update on the Side Channel Cryptanalysis of MACs Based on Cryptographic Hash Functions. Search on Bibsonomy INDOCRYPT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF M-NMAC, MDx-MAC, Side channel attacks, DPA, HMAC
59Mustapha Hedabou, Pierre Pinel, Lucien Bénéteau Countermeasures for Preventing Comb Method Against SCA Attacks. Search on Bibsonomy ISPEC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF comb method, pre-computed table, memory space, side channel attacks, Elliptic curve, scalar multiplication
58Wei Li 0013, Dawu Gu An Approach for Symmetric Encryption Against Side Channel Attacks in Provable Security. Search on Bibsonomy ProvSec The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
58Dong-Guk Han, Tsuyoshi Takagi, Tae Hyun Kim 0003, Howon Kim 0001, Kyoil Chung Collision Attack on XTR and a Countermeasure with a Fixed Pattern. Search on Bibsonomy EUC Workshops The full citation details ... 2005 DBLP  DOI  BibTeX  RDF XTR public key system, XTR Exponentiation Algorithms, Ubiquitous computer, Side Channel Attacks, Collision Attack
58Tanja Römer, Jean-Pierre Seifert Information Leakage Attacks against Smart Card Implementations of the Elliptic Curve Digital Signature Algorithm. Search on Bibsonomy E-smart The full citation details ... 2001 DBLP  DOI  BibTeX  RDF successive minimum, Cryptanalysis, side-channel-attacks, Lattice, ECDSA, Lattice basis reduction, LLL
57Tanja Lange 0001, Pradeep Kumar Mishra SCA Resistant Parallel Explicit Formula for Addition and Doubling of Divisors in the Jacobian of Hyperelliptic Curves of Genus 2. Search on Bibsonomy INDOCRYPT The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
56Julien Cathalo, François Koeune, Jean-Jacques Quisquater A New Type of Timing Attack: Application to GPS. Search on Bibsonomy CHES The full citation details ... 2003 DBLP  DOI  BibTeX  RDF GPS, Side-Channel Attacks, Timing Attacks, Identification Schemes
56Josyula R. Rao, Pankaj Rohatgi, Helmut Scherzer, Stéphane Tinguely Partitioning Attacks: Or How to Rapidly Clone Some GSM Cards. Search on Bibsonomy S&P The full citation details ... 2002 DBLP  DOI  BibTeX  RDF commercial and industrial security, COMP128, authentication, security protocols, side channel attacks, smartcards, GSM
55Jun Wu, Yong-Bin Kim, Minsu Choi Low-power side-channel attack-resistant asynchronous S-box design for AES cryptosystems. Search on Bibsonomy ACM Great Lakes Symposium on VLSI The full citation details ... 2010 DBLP  DOI  BibTeX  RDF substitution box, substitution box (S-box), differential power/noise analysis, power/noise measurement, security, advanced encryption standard, advanced encryption standard, side-channel attacks (SCA), null convention logic
55Pascal Delaunay, Antoine Joux Yet Another Attack on Vest. Search on Bibsonomy AFRICACRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF VEST, Stream Ciphers, Side Channel Attacks, Fourier Transform
55Zhimin Chen, Yujie Zhou Dual-Rail Random Switching Logic: A Countermeasure to Reduce Side Channel Leakage. Search on Bibsonomy CHES The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Gate Level Masking, DRSL, Dual-Rail, Pre-charge, Side Channel Attacks, DPA
55Naofumi Homma, Sei Nagashima, Yuichi Imai, Takafumi Aoki, Akashi Satoh High-Resolution Side-Channel Attack Using Phase-Based Waveform Matching. Search on Bibsonomy CHES The full citation details ... 2006 DBLP  DOI  BibTeX  RDF cryptographic module, waveform matching, phase-only correlation, side-channel attacks, DPA, DEMA
55Wieland Fischer, Berndt M. Gammel Masking at Gate Level in the Presence of Glitches. Search on Bibsonomy CHES The full citation details ... 2005 DBLP  DOI  BibTeX  RDF random masking, masked logic circuits, Cryptanalysis, side-channel attacks, DPA, power analysis, logic circuits, digital circuits, masking, glitches
53Donggang Liu, Qi Dong 0001 Combating side-channel attacks using key management. Search on Bibsonomy IPDPS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
52Mathieu Renauld, François-Xavier Standaert, Nicolas Veyrat-Charvillon Algebraic Side-Channel Attacks on the AES: Why Time also Matters in DPA. Search on Bibsonomy CHES The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
52ManKi Ahn, Hoon-Jae Lee 0001 Experiments and Hardware Countermeasures on Power Analysis Attacks. Search on Bibsonomy ICCSA (3) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF SPA/DPA, Side Channel Attacks, Power Analysis, SmartCard, Countermeasure
52Kai Schramm, Christof Paar IT Security Project: Implementation of the Advanced Encryption Standard (AES) on a Smart Card. Search on Bibsonomy ITCC (1) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF RISC architecture, smart cards, AES, side channel attacks
52Jean-Claude Bajard, Laurent Imbert, Pierre-Yvan Liardet, Yannick Teglia Leak Resistant Arithmetic. Search on Bibsonomy CHES The full citation details ... 2004 DBLP  DOI  BibTeX  RDF RNS Montgomery multiplication, Side channel attacks, residue number systems
52Louis Goubin A Refined Power-Analysis Attack on Elliptic Curve Cryptosystems. Search on Bibsonomy Public Key Cryptography The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Side-channel attacks, Public-key cryptography, Elliptic curves, Differential Power Analysis (DPA), Power Analysis, Smartcards
52Kai Schramm, Thomas J. Wollinger, Christof Paar A New Class of Collision Attacks and Its Application to DES. Search on Bibsonomy FSE The full citation details ... 2003 DBLP  DOI  BibTeX  RDF internal collisions, side channel attacks, power analysis, DES, S-Boxes, collision attack
52Roberto Maria Avanzi Countermeasures against Differential Power Analysis for Hyperelliptic Curve Cryptosystems. Search on Bibsonomy CHES The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Smart cards, Side-channel attacks, Public-key cryptography, Differential power analysis (DPA), Timing attacks, Hyperelliptic curves
52Marc Joye, Jean-Jacques Quisquater, Sung-Ming Yen, Moti Yung Observability Analysis - Detecting When Improved Cryptosystems Fail. Search on Bibsonomy CT-RSA The full citation details ... 2002 DBLP  DOI  BibTeX  RDF robustness, cryptanalysis, implementations, side-channel attacks, observability, Security analysis, fault analysis, cryptosystems
52Onur Aciiçmez, Jean-Pierre Seifert Cheap Hardware Parallelism Implies Cheap Security. Search on Bibsonomy FDTC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
49Jingfei Kong, Onur Aciiçmez, Jean-Pierre Seifert, Huiyang Zhou Hardware-software integrated approaches to defend against software cache-based side channel attacks. Search on Bibsonomy HPCA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
49Artemios G. Voyiatzis, Dimitrios N. Serpanos The security of the Fiat-Shamir scheme in the presence of transient hardware faults. Search on Bibsonomy ACM Trans. Embed. Comput. Syst. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Fiat-Shamir identification scheme, cryptography, side-channel attacks, smartcards, Bellcore attack
49Stefan Tillich, Christoph Herbst Attacking State-of-the-Art Software Countermeasures-A Case Study for AES. Search on Bibsonomy CHES The full citation details ... 2008 DBLP  DOI  BibTeX  RDF software countermeasures, operation randomization, advanced DPA attacks, smart card, Advanced Encryption Standard, side channel attacks, power analysis, masking
49Praveen Gauravaram, Katsuyuki Okeya Side Channel Analysis of Some Hash Based MACs: A Response to SHA-3 Requirements. Search on Bibsonomy ICICS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF hash functions, side channel attacks, HMAC, Applied cryptography
49Nachiketh R. Potlapally, Anand Raghunathan, Srivaths Ravi 0001, Niraj K. Jha, Ruby B. Lee Aiding Side-Channel Attacks on Cryptographic Software With Satisfiability-Based Analysis. Search on Bibsonomy IEEE Trans. Very Large Scale Integr. Syst. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
49Elena Trichina, Antonio Bellezza Implementation of Elliptic Curve Cryptography with Built-In Counter Measures against Side Channel Attacks. Search on Bibsonomy CHES The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
49Jean-Sébastien Coron, Ilya Kizhvatov An Efficient Method for Random Delay Generation in Embedded Software. Search on Bibsonomy CHES The full citation details ... 2009 DBLP  DOI  BibTeX  RDF random delays, Side channel attacks, countermeasures
49K. Gopalakrishnan, Nicolas Thériault, Chui Zhi Yao Solving Discrete Logarithms from Partial Knowledge of the Key. Search on Bibsonomy INDOCRYPT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Generic Groups, Side Channel Attacks, Discrete Logarithm Problem
49Amir Moradi 0001, Mohammad T. Manzuri Shalmani, Mahmoud Salmasizadeh A Generalized Method of Differential Fault Attack Against AES Cryptosystem. Search on Bibsonomy CHES The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Cryptanalysis, Smart Card, AES, Side Channel Attacks, Fault Attacks
49Katsuyuki Okeya, Tsuyoshi Takagi Security Analysis of CRT-Based Cryptosystems. Search on Bibsonomy ACNS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Multi-Prime RSA, PKCS #1, RSA, Side Channel Attacks, Factoring, Chinese Remainder Theorem
49Lejla Batina, Geeke Bruin-Muurling, Siddika Berna Örs Flexible Hardware Design for RSA and Elliptic Curve Cryptosystems. Search on Bibsonomy CT-RSA The full citation details ... 2004 DBLP  DOI  BibTeX  RDF RSA, ECC, Side-channel attacks, Systolic array, Hardware implementation, Montgomery multiplication, FPGA design
49Johannes Blömer, Alexander May 0001 New Partial Key Exposure Attacks on RSA. Search on Bibsonomy CRYPTO The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
48Werner Schindler On the Optimization of Side-Channel Attacks by Advanced Stochastic Methods. Search on Bibsonomy Public Key Cryptography The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Montgomerys multiplication algo-rithm, statistical decision problem, optimal decision strategy, Side-channel attack, stochastic process
46Zhimin Chen 0002, Syed Haider, Patrick Schaumont Side-Channel Leakage in Masked Circuits Caused by Higher-Order Circuit Effects. Search on Bibsonomy ISA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
46HeeSeok Kim, Tae Hyun Kim 0003, Jeong Choon Ryoo, Dong-Guk Han, Howon Kim 0001, Jongin Lim 0001 Enhanced Doubling Attacks on Signed-All-Bits Set Recoding. Search on Bibsonomy WISTP The full citation details ... 2007 DBLP  DOI  BibTeX  RDF sABS recoding, SPA-based analysis, Doubling Attack, Side Channel Attacks, scalar multiplication
46Helena Handschuh, Bart Preneel Blind Differential Cryptanalysis for Enhanced Power Attacks. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2006 DBLP  DOI  BibTeX  RDF combined cryptanalysis, blind cryptanalysis, side channel attacks, power analysis, differential cryptanalysis, Hamming weights
46Sergei P. Skorobogatov Optically Enhanced Position-Locked Power Analysis. Search on Bibsonomy CHES The full citation details ... 2006 DBLP  DOI  BibTeX  RDF semi-invasive attacks, optical probing, side-channel attacks, power analysis
46Itsik Mantin A Practical Attack on the Fixed RC4 in the WEP Mode. Search on Bibsonomy ASIACRYPT The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Related IV attacks, Cryptanalysis, Stream ciphers, Side-channel attacks, Fault analysis, RC4, Related key attacks
46Pradeep Kumar Mishra, Palash Sarkar 0001 Application of Montgomery's Trick to Scalar Multiplication for Elliptic and Hyperelliptic Curves Using a Fixed Base Point. Search on Bibsonomy Public Key Cryptography The full citation details ... 2004 DBLP  DOI  BibTeX  RDF scalar multipication, field inversion, side-channel attacks, elliptic curves, hyperelliptic curves, explicit formulae
46Gilles Piret, Jean-Jacques Quisquater A Differential Fault Attack Technique against SPN Structures, with Application to the AES and KHAZAD. Search on Bibsonomy CHES The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Block Ciphers, AES, Side-channel Attacks, Fault Attacks
46Marc Joye, Sung-Ming Yen The Montgomery Powering Ladder. Search on Bibsonomy CHES The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Montgomery powering ladder, constrained environments, cryptographic implementations, side-channel attacks, fault attacks, Exponentiation algorithms
45Christophe Clavier, Marc Joye Universal Exponentiation Algorithm. Search on Bibsonomy CHES The full citation details ... 2001 DBLP  DOI  BibTeX  RDF Implementation, smart-cards, provable security, side-channel attacks, discrete logarithm, exponentiation, simple power analysis (SPA), RSA cryptosystem, addition chains
45Anjela Yu. Matrosova, Ekaterina Loukovnikova, Sergei Ostanin, Alexandra Zinchuk, Ekaterina Nikolaeva Test Generation for Single and Multiple Stuck-at Faults of a Combinational Circuit Designed by Covering Shared ROBDD with CLBs. Search on Bibsonomy DFT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
44Onur Aciiçmez, Çetin Kaya Koç, Jean-Pierre Seifert Predicting Secret Keys Via Branch Prediction. Search on Bibsonomy CT-RSA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Simultaneous Multi-threading, RSA, Branch Prediction, Side Channel Analysis, Montgomery Multiplication, Modular Exponentiation
43Lejla Batina, Nele Mentens, Ingrid Verbauwhede Side-Channel Issues for Designing Secure Hardware Implementations. Search on Bibsonomy IOLTS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
43Christoph Herbst, Marcel Medwed Using Templates to Attack Masked Montgomery Ladder Implementations of Modular Exponentiation. Search on Bibsonomy WISA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Montgomery Ladder, Base Point Blinding, Smart Cards, RSA, Side- Channel Attacks, Power Analysis, Microcontroller, Template Attacks
43Sylvain Guilley, Florent Flament, Philippe Hoogvorst, Renaud Pacalet, Yves Mathieu Secured CAD Back-End Flow for Power-Analysis-Resistant Cryptoprocessors. Search on Bibsonomy IEEE Des. Test Comput. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF robust hardware, back-end design automation, power-constant architectures, DFY, side-channel attacks, DFM, mitigation
43Marc Joye, Christophe Tymen Protections against Differential Analysis for Elliptic Curve Cryptography. Search on Bibsonomy CHES The full citation details ... 2001 DBLP  DOI  BibTeX  RDF Smart-cards, Side-channel attacks, Public-key cryptography, Elliptic curves, Differential power analysis (DPA), Timing attacks
42Francesco Regazzoni 0001, Thomas Eisenbarth 0001, Luca Breveglieri, Paolo Ienne, Israel Koren Can Knowledge Regarding the Presence of Countermeasures Against Fault Attacks Simplify Power Attacks on Cryptographic Devices?. Search on Bibsonomy DFT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
39Jingfei Kong, Onur Aciiçmez, Jean-Pierre Seifert, Huiyang Zhou Deconstructing new cache designs for thwarting software cache-based side channel attacks. Search on Bibsonomy CSAW The full citation details ... 2008 DBLP  DOI  BibTeX  RDF microarchitectural analysis, cryptanalysis, side-channel analysis, timing attack, cache architecture, cache attack
39Chuan-Wen Loe, Khoongming Khoo Side Channel Attacks on Irregularly Decimated Generators. Search on Bibsonomy ICISC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Irregularly Decimated Generators, ABSG, Timing Analysis, Fault Attack, DECIM
39Eric Brier, Marc Joye Weierstraß Elliptic Curves and Side-Channel Attacks. Search on Bibsonomy Public Key Cryptography The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
39Geir Olav Dyrkolbotn, Einar Snekkenes A Wireless Covert Channel on Smart Cards (Short Paper). Search on Bibsonomy ICICS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF EMSide-Channel, Wireless Covert Channel, Smart Cards, Subversion
39Robert P. McEvoy, Colin C. Murphy, William P. Marnane, Michael Tunstall Isolated WDDL: A Hiding Countermeasure for Differential Power Analysis on FPGAs. Search on Bibsonomy ACM Trans. Reconfigurable Technol. Syst. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF secure logic, FPGA, Side-channel attacks, DPA, Whirlpool
39Rafael Soares, Ney Laert Vilar Calazans, Victor Lomné, Philippe Maurine, Lionel Torres, Michel Robert Evaluating the robustness of secure triple track logic through prototyping. Search on Bibsonomy SBCCI The full citation details ... 2008 DBLP  DOI  BibTeX  RDF logic style, FPGA, side-channel attacks, DPA, DES, CPA
39Sanjay Burman, Debdeep Mukhopadhyay, Kamakoti Veezhinathan LFSR Based Stream Ciphers Are Vulnerable to Power Attacks. Search on Bibsonomy INDOCRYPT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Linear Feed Back Shift Registers, Dynamic Power Dissipation, Side Channel Attacks, Power Analysis, Hamming Distance
39Tetsuya Izu, Tsuyoshi Takagi Fast Elliptic Curve Multiplications with SIMD Operations. Search on Bibsonomy ICICS The full citation details ... 2002 DBLP  DOI  BibTeX  RDF NAF, SIMD operations, side channel attacks, Elliptic Curve Cryptosystems (ECC), scalar multiplication, window method
Displaying result #1 - #100 of 1257 (100 per page; Change: )
Pages: [1][2][3][4][5][6][7][8][9][10][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license