The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for phrase HO-DPA (changed automatically) with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1974-2000 (20) 2001-2002 (24) 2003 (19) 2004 (31) 2005 (39) 2006 (39) 2007 (46) 2008 (99) 2009 (31) 2010 (23) 2011 (19) 2012 (17) 2013 (19) 2014 (29) 2015 (30) 2016-2017 (34) 2018-2019 (24) 2020-2021 (19) 2022-2023 (19) 2024 (4)
Publication types (Num. hits)
article(147) incollection(1) inproceedings(433) phdthesis(3) proceedings(1)
Venues (Conferences, Journals, ...)
CHES(76) Euro-Par Workshops(51) IACR Cryptol. ePrint Arch.(41) CT-RSA(16) ISCAS(16) CoRR(10) WISA(10) HOST(9) DATE(8) ICISC(8) IEICE Trans. Fundam. Electron....(8) PATMOS(8) INDOCRYPT(7) ACISP(6) CARDIS(6) COSADE(6) More (+10 of total 203)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 576 occurrences of 189 keywords

Results
Found 585 publication records. Showing 585 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
103Hideyo Mamiya, Atsuko Miyaji, Hiroaki Morimoto Efficient Countermeasures against RPA, DPA, and SPA. Search on Bibsonomy CHES The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Elliptic curve exponentiation, ZPA, RPA, DPA, SPA
103Bert den Boer, Kerstin Lemke, Guntram Wicke A DPA Attack against the Modular Reduction within a CRT Implementation of RSA. Search on Bibsonomy CHES The full citation details ... 2002 DBLP  DOI  BibTeX  RDF RSA, DPA, power analysis, smartcard, CRT, side channel analysis, modular reduction
101Kouichi Itoh, Tetsuya Izu, Masahiko Takenaka A Practical Countermeasure against Address-Bit Differential Power Analysis. Search on Bibsonomy CHES The full citation details ... 2003 DBLP  DOI  BibTeX  RDF address-bit DPA, RSA, ECC, Differential Power Analysis (DPA), exponentiation, countermeasure
101Kouichi Itoh, Tetsuya Izu, Masahiko Takenaka Address-Bit Differential Power Analysis of Cryptographic Schemes OK-ECDH and OK-ECDSA. Search on Bibsonomy CHES The full citation details ... 2002 DBLP  DOI  BibTeX  RDF address-bit DPA, scalar exponentiation, OK-ECDH, OK-ECDSA, Differential power analysis (DPA), elliptic curve cryptosystems (ECC)
92Johannes Jendrsczok, Rolf Hoffmann, Thomas Lenck Generated Horizontal and Vertical Data Parallel GCA Machines for the N-Body Force Calculation. Search on Bibsonomy ARCS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
92Marco Bucci, Michele Guglielmo, Raimondo Luzzi, Alessandro Trifiletti A Power Consumption Randomization Countermeasure for DPA-Resistant Cryptographic Processors. Search on Bibsonomy PATMOS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF chipcards, cryptography, Differential power analysis, DPA, power analysis, countermeasures
92Kerstin Lemke, Kai Schramm, Christof Paar DPA on n-Bit Sized Boolean and Arithmetic Operations and Its Application to IDEA, RC6, and the HMAC-Construction. Search on Bibsonomy CHES The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Boolean and arithmetic operations, HMAC-construction, DPA, IDEA, RC6
90Thanh-Ha Le, Jessy Clédière, Cécile Canovas, Bruno Robisson, Christine Servière, Jean-Louis Lacoume A Proposition for Correlation Power Analysis Enhancement. Search on Bibsonomy CHES The full citation details ... 2006 DBLP  DOI  BibTeX  RDF multi-bit DPA, PPA, AES, correlation, DPA, power analysis, DES, side channel, CPA
90Dong-Guk Han, Jongin Lim 0001, Kouichi Sakurai On Security of XTR Public Key Cryptosystems Against Side Channel Attacks. Search on Bibsonomy ACISP The full citation details ... 2004 DBLP  DOI  BibTeX  RDF XTR Public Key Cryptosystem, Data-bit DPA, Address-bit DPA, doubling attack, Side Channel Attacks, SPA
85Mehdi-Laurent Akkar, Louis Goubin A Generic Protection against High-Order Differential Power Analysis. Search on Bibsonomy FSE The full citation details ... 2003 DBLP  DOI  BibTeX  RDF High-Order DPA, Smart-cards, Power analysis, DES
82Stefan Mangard, Kai Schramm Pinpointing the Side-Channel Leakage of Masked AES Hardware Implementations. Search on Bibsonomy CHES The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Zero-Offset DPA, Zero-Input DPA, Delay Chains, AES, DPA, Masking, Glitches
80Kouichi Itoh, Tetsuya Izu, Masahiko Takenaka Improving the Randomized Initial Point Countermeasure Against DPA. Search on Bibsonomy ACNS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF RPA, ZVA, Smart card, DPA, Elliptic Curve Cryptosystems (ECC), countermeasure, RIP
76Elisabeth Oswald, Stefan Mangard, Christoph Herbst, Stefan Tillich Practical Second-Order DPA Attacks for Masked Smart Card Implementations of Block Ciphers. Search on Bibsonomy CT-RSA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
76Thomas S. Messerges Using Second-Order Power Analysis to Attack DPA Resistant Software. Search on Bibsonomy CHES The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
74Joshua Jaffe A First-Order DPA Attack Against AES in Counter Mode with Unknown Initial Counter. Search on Bibsonomy CHES The full citation details ... 2007 DBLP  DOI  BibTeX  RDF HO-DPA, AES, DPA, power analysis, SPA, counter mode
73Katsuyuki Okeya, Kouichi Sakurai A Second-Order DPA Attack Breaks a Window-Method Based Countermeasure against Side Channel Attacks. Search on Bibsonomy ISC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Higher-Order DPA Attack, Second-Order DPA Attack, Möller's Countermeasure, Side Channel Attacks, Differential Power Analysis, Elliptic Curve Cryptosystems
69Lang Lin, Wayne P. Burleson Leakage-based differential power analysis (LDPA) on sub-90nm CMOS cryptosystems. Search on Bibsonomy ISCAS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
69Konrad J. Kulikowski, Ming Su, Alexander B. Smirnov, Alexander Taubin, Mark G. Karpovsky, Daniel MacDonald Delay Insensitive Encoding and Power Analysis: A Balancing Act. Search on Bibsonomy ASYNC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
69Toru Akishita, Masanobu Katagi, Yoshikazu Miyato, Asami Mizuno, Kyoji Shibutani A Practical DPA Countermeasure with BDD Architecture. Search on Bibsonomy CARDIS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF dual-rail pre-charge logic, DPA, Binary Decision Diagram, countermeasure
69Kouichi Itoh, Masahiko Takenaka, Naoya Torii DPA Countermeasure Based on the "Masking Method". Search on Bibsonomy ICISC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF masking method, DPA, countermeasure, Rijndael
64Srividhya Rammohan, Vijay Sundaresan, Ranga Vemuri Reduced Complementary Dynamic and Differential Logic: A CMOS Logic Style for DPA-Resistant Secure IC Design. Search on Bibsonomy VLSI Design The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
64Massimo Alioto, Massimo Poli, Santina Rocchi, Valerio Vignoli Power Modeling of Precharged Address Bus and Application to Multi-bit DPA Attacks to DES Algorithm. Search on Bibsonomy PATMOS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
64Stjepan Rajko, Gang Qian A Hybrid HMM/DPA Adaptive Gesture Recognition Method. Search on Bibsonomy ISVC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
64Stefan Mangard Hardware Countermeasures against DPA ? A Statistical Analysis of Their Effectiveness. Search on Bibsonomy CT-RSA The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
62Jean-Sébastien Coron, Emmanuel Prouff, Matthieu Rivain Side Channel Cryptanalysis of a Higher Order Masking Scheme. Search on Bibsonomy CHES The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Higher Order DPA, Masking Scheme, Side Channel Attacks, Differential Power Analysis, Template Attacks
62Kai Schramm, Christof Paar Higher Order Masking of the AES. Search on Bibsonomy CT-RSA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Higher Order DPA, Masking Countermeasure, AES
62Louis Goubin A Refined Power-Analysis Attack on Elliptic Curve Cryptosystems. Search on Bibsonomy Public Key Cryptography The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Side-channel attacks, Public-key cryptography, Elliptic curves, Differential Power Analysis (DPA), Power Analysis, Smartcards
58Dimitrios N. Skoutas, Angelos N. Rouskas A Scheduling Algorithm with Dynamic Priority Assignment for WCDMA Systems. Search on Bibsonomy IEEE Trans. Mob. Comput. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
58Karthik Baddam, Mark Zwolinski Evaluation of Dynamic Voltage and Frequency Scaling as a Differential Power Analysis Countermeasure. Search on Bibsonomy VLSI Design The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
58Manfred von Willich A Technique with an Information-Theoretic Basis for Protecting Secret Data from Differential Power Attacks. Search on Bibsonomy IMACC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
57Atsuko Miyaji Generalized MMM-Algorithm Secure Against SPA, DPA, and RPA. Search on Bibsonomy ICISC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF RPA, elliptic curve, DPA, SPA
57Daniel Mesquita, Jean-Denis Techer, Lionel Torres, Gilles Sassatelli, Gaston Cambon, Michel Robert, Fernando Moraes 0001 Current mask generation: a transistor level security against DPA attacks. Search on Bibsonomy SBCCI The full citation details ... 2005 DBLP  DOI  BibTeX  RDF cryptography, side channel attacks, DPA, countermeasures
55Katsuyuki Okeya Side Channel Attacks Against HMACs Based on Block-Cipher Based Hash Functions. Search on Bibsonomy ACISP The full citation details ... 2006 DBLP  DOI  BibTeX  RDF (keyed) hash function, PGV construction, reverse DPA, side channel attacks, differential power analysis (DPA), HMAC
53Alin Razafindraibe, Michel Robert, Philippe Maurine Analysis and Improvement of Dual Rail Logic as a Countermeasure Against DPA. Search on Bibsonomy PATMOS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
53Alin Razafindraibe, Michel Robert, Philippe Maurine Improvement of dual rail logic as a countermeasure against DPA. Search on Bibsonomy VLSI-SoC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
53Kuan Jen Lin, Shan Chien Fang, Shih Hsien Yang, Cheng Chia Lo Overcoming glitches and dissipation timing skews in design of DPA-resistant cryptographic hardware. Search on Bibsonomy DATE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
53Thomas Popp, Stefan Mangard Implementation aspects of the DPA-resistant logic style MDPL. Search on Bibsonomy ISCAS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
53G. Fraidy Bouesse, Marc Renaudin, Gilles Sicard Improving DPA Resistance of Quasi Delay Insensitive Circuits Using Randomly Time-shifted Acknowledgment Signals. Search on Bibsonomy VLSI-SoC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
53Emmanuel Prouff DPA Attacks and S-Boxes. Search on Bibsonomy FSE The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
53Tae-Jun Park, Mun-Kyu Lee, Dowon Hong, Kyoil Chung A DPA Countermeasure by Randomized Frobenius Decomposition. Search on Bibsonomy WISA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
53Nevine Maurice Ebeid, M. Anwar Hasan On Randomizing Private Keys to Counteract DPA Attacks. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2003 DBLP  DOI  BibTeX  RDF binary signed-digit representation, smart cards, Differential power analysis, elliptic curve cryptosystems, scalar multiplication
53Pierre-Yvan Liardet, Nigel P. Smart Preventing SPA/DPA in ECC Systems Using the Jacobi Form. Search on Bibsonomy CHES The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
51Robert P. McEvoy, Colin C. Murphy, William P. Marnane, Michael Tunstall Isolated WDDL: A Hiding Countermeasure for Differential Power Analysis on FPGAs. Search on Bibsonomy ACM Trans. Reconfigurable Technol. Syst. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF secure logic, FPGA, Side-channel attacks, DPA, Whirlpool
51Praveen Gauravaram, Katsuyuki Okeya An Update on the Side Channel Cryptanalysis of MACs Based on Cryptographic Hash Functions. Search on Bibsonomy INDOCRYPT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF M-NMAC, MDx-MAC, Side channel attacks, DPA, HMAC
51Christoph Herbst, Elisabeth Oswald, Stefan Mangard An AES Smart Card Implementation Resistant to Power Analysis Attacks. Search on Bibsonomy ACNS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF DPA resistance, smart card, AES
51Naofumi Homma, Sei Nagashima, Yuichi Imai, Takafumi Aoki, Akashi Satoh High-Resolution Side-Channel Attack Using Phase-Based Waveform Matching. Search on Bibsonomy CHES The full citation details ... 2006 DBLP  DOI  BibTeX  RDF cryptographic module, waveform matching, phase-only correlation, side-channel attacks, DPA, DEMA
51Dakshi Agrawal, Josyula R. Rao, Pankaj Rohatgi Multi-channel Attacks. Search on Bibsonomy CHES The full citation details ... 2003 DBLP  DOI  BibTeX  RDF EM Analysis, Side-channel attacks, DPA, Power Analysis, DEMA
46You-Seok Lee, YongJe Choi, Dong-Guk Han, Ho Won Kim 0001, Hyoung-Nam Kim A nobel key-search method for side channel attacks based on pattern recognition. Search on Bibsonomy ICASSP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
46Eric Menendez, Ken Mai A High-Performance, Low-Overhead, Power-Analysis-Resistant, Single-Rail Logic Style. Search on Bibsonomy HOST The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
46Jean-Sébastien Coron, Christophe Giraud 0001, Emmanuel Prouff, Matthieu Rivain Attack and Improvement of a Secure S-Box Calculation Based on the Fourier Transform. Search on Bibsonomy CHES The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
46Praveen Gauravaram, Katsuyuki Okeya Side Channel Analysis of Some Hash Based MACs: A Response to SHA-3 Requirements. Search on Bibsonomy ICICS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF hash functions, side channel attacks, HMAC, Applied cryptography
46Vijay Sundaresan, Srividhya Rammohan, Ranga Vemuri Power invariant secure IC design methodology using reduced complementary dynamic and differential logic. Search on Bibsonomy VLSI-SoC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
46Massimo Alioto, Massimo Poli, Santina Rocchi, Valerio Vignoli Techniques to Enhance the Resistance of Precharged Busses to Differential Power Analysis. Search on Bibsonomy PATMOS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
46Dong-Guk Han, Tsuyoshi Takagi, Jongin Lim 0001 Further Security Analysis of XTR. Search on Bibsonomy ISPEC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF XTR public key system, XTR-ISE, differential power analysis
46Emmanuel Prouff, Christophe Giraud 0001, Sébastien Aumônier Provably Secure S-Box Implementation Based on Fourier Transform. Search on Bibsonomy CHES The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Provably Secure Countermeasure, Symmetric Cryptosystems, FOX, AES, Differential Power Analysis, Fourier Transform, S-Box
46Marc Joye, Pascal Paillier, Berry Schoenmakers On Second-Order Differential Power Analysis. Search on Bibsonomy CHES The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
46Kris Tiri, David D. Hwang, Alireza Hodjat, Bo-Cheng Lai, Shenglin Yang, Patrick Schaumont, Ingrid Verbauwhede Prototype IC with WDDL and Differential Routing - DPA Resistance Assessment. Search on Bibsonomy CHES The full citation details ... 2005 DBLP  DOI  BibTeX  RDF dual rail with precharge, wave dynamic differential logic (WDDL), differential routing, parasitic capacitance matching, side-channel attack (SCA), differential power analysis (DPA), countermeasure
46Thomas Popp, Stefan Mangard Masked Dual-Rail Pre-charge Logic: DPA-Resistance Without Routing Constraints. Search on Bibsonomy CHES The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Hardware Countermeasures, MDPL, Masking Logic, Dual-Rail Pre-Charge Logic, DPA, Side-Channel Analysis
41Jean-Sébastien Coron A New DPA Countermeasure Based on Permutation Tables. Search on Bibsonomy SCN The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
41Francesco Regazzoni 0001, Stéphane Badel, Thomas Eisenbarth 0001, Johann Großschädl, Axel Poschmann, Zeynep Toprak Deniz, Marco Macchetti, Laura Pozzi, Christof Paar, Yusuf Leblebici, Paolo Ienne A Simulation-Based Methodology for Evaluating the DPA-Resistance of Cryptographic Functional Units with Application to CMOS and MCML Technologies. Search on Bibsonomy ICSAMOS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
41Jens Rüdinger, Adolf Finger Algorithm Design and Side Channel Vulnerability on the Example of DPA Attack. Search on Bibsonomy ICN The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
41Sei Nagashima, Naofumi Homma, Yuichi Imai, Takafumi Aoki, Akashi Satoh DPA Using Phase-Based Waveform Matching against Random-Delay Countermeasure. Search on Bibsonomy ISCAS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
41Matteo Giaconia, Marco Macchetti, Francesco Regazzoni 0001, Kai Schramm Area and Power Efficient Synthesis of DPA-Resistant Cryptographic S-Boxes. Search on Bibsonomy VLSI Design The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
41Daisuke Suzuki, Minoru Saeki Security Evaluation of DPA Countermeasures Using Dual-Rail Pre-charge Logic Style. Search on Bibsonomy CHES The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
41Yi Wang 0016, Jussipekka Leiwo, Thambipillai Srikanthan, Luo Jianwen An Efficient Algorithm for DPA-resistent RSA. Search on Bibsonomy APCCAS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
41G. Fraidy Bouesse, Marc Renaudin, Sophie Dumont, Fabien Germain DPA on Quasi Delay Insensitive Asynchronous Circuits: Formalization and Improvement. Search on Bibsonomy DATE The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
41Claude Carlet On Highly Nonlinear S-Boxes and Their Inability to Thwart DPA Attacks. Search on Bibsonomy INDOCRYPT The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
41Daisuke Suzuki, Minoru Saeki, Tetsuya Ichikawa DPA Leakage Models for CMOS Logic Circuits. Search on Bibsonomy CHES The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
41Marc Berthod, Zoltan Kato, Josiane Zerubia DPA: a deterministic approach to the MAP problem. Search on Bibsonomy IEEE Trans. Image Process. The full citation details ... 1995 DBLP  DOI  BibTeX  RDF
39Jean-Sébastien Coron, Ilya Kizhvatov Analysis of the split mask countermeasure for embedded systems. Search on Bibsonomy WESS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF cryptanalysis, DPA, side channel analysis, countermeasures, masking
39Thomas Popp, Mario Kirschbaum, Stefan Mangard Practical Attacks on Masked Hardware. Search on Bibsonomy CT-RSA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF DPA-Resistant Masked Logic Styles, MDPL, Prototype Chip, Hardware AES, PDF-Attack, PRNG
39Stefan Tillich, Christoph Herbst Attacking State-of-the-Art Software Countermeasures-A Case Study for AES. Search on Bibsonomy CHES The full citation details ... 2008 DBLP  DOI  BibTeX  RDF software countermeasures, operation randomization, advanced DPA attacks, smart card, Advanced Encryption Standard, side channel attacks, power analysis, masking
39Thomas Popp, Mario Kirschbaum, Thomas Zefferer, Stefan Mangard Evaluation of the Masked Logic Style MDPL on a Prototype Chip. Search on Bibsonomy CHES The full citation details ... 2007 DBLP  DOI  BibTeX  RDF DPA-Resistant Logic Styles, Masked Logic, Dual-Rail Precharge Logic, Early Propagation Effect, Improved MDPL, Prototype Chip
39HyungSo Yoo, Christoph Herbst, Stefan Mangard, Elisabeth Oswald, Sang-Jae Moon Investigations of Power Analysis Attacks and Countermeasures for ARIA. Search on Bibsonomy WISA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF DPA, smartcard, ARIA
39Eric Peeters, François-Xavier Standaert, Nicolas Donckers, Jean-Jacques Quisquater Improved Higher-Order Side-Channel Attacks with FPGA Experiments. Search on Bibsonomy CHES The full citation details ... 2005 DBLP  DOI  BibTeX  RDF cryptographic devices, high-order power analysis, masking countermeasure, FPGA, block cipher, DPA, side-channel analysis
39Wieland Fischer, Berndt M. Gammel Masking at Gate Level in the Presence of Glitches. Search on Bibsonomy CHES The full citation details ... 2005 DBLP  DOI  BibTeX  RDF random masking, masked logic circuits, Cryptanalysis, side-channel attacks, DPA, power analysis, logic circuits, digital circuits, masking, glitches
39Dong Jin Park, Sang Gyoo Sim, Pil Joong Lee Fast Scalar Multiplication Method Using Change-of-Basis Matrix to Prevent Power Analysis Attacks on Koblitz Curves. Search on Bibsonomy WISA The full citation details ... 2003 DBLP  DOI  BibTeX  RDF sliding window methods, basis conversion, Koblitz curve cryptosystems, DPA, scalar multiplication, SPA
39MahnKi Ahn, JaeCheol Ha, Hoon-Jae Lee 0001, Sang-Jae Moon A Random M-ary Method Based Countermeasure against Side Channel Attacks. Search on Bibsonomy ICCSA (2) The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Random m-ary Recoding Algorithm, Side Channel Attacks, DPA, Elliptic Curve Cryptosystems, SPA, Power Analysis Attacks
39JaeCheol Ha, Sang-Jae Moon Randomized Signed-Scalar Multiplication of ECC to Resist Power Attacks. Search on Bibsonomy CHES The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Side-channel attack, DPA, Elliptic curve cryptosystems, SPA, Power analysis attack, Non-adjacent form
39Colin D. Walter Sliding Windows Succumbs to Big Mac Attack. Search on Bibsonomy CHES The full citation details ... 2001 DBLP  DOI  BibTeX  RDF Cryptography, smart card, RSA, differential power analysis, DPA, blinding, sliding windows, exponentiation
37Meng Yi, Qingkui Chen, Gang Zhang, Haiyan Zhao DPA: 一种动态环境下QoS单播路由算法 (DPA: A QoS Unicast Routing Algorithm in Dynamic Environment). Search on Bibsonomy 计算机科学 The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
37Luke Mather, Elisabeth Oswald, Carolyn Whitnall Multi-target DPA attacks: Pushing DPA beyond the limits of a desktop computer. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2014 DBLP  BibTeX  RDF
37Luke Mather, Elisabeth Oswald, Carolyn Whitnall Multi-target DPA Attacks: Pushing DPA Beyond the Limits of a Desktop Computer. Search on Bibsonomy ASIACRYPT (1) The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
37Michael Vielhaber 0001 Reduce-by-Feedback: Timing Resistant and DPA-Aware Modular Multiplication Plus: How to Break RSA by DPA. Search on Bibsonomy CHES The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
37Houssem Maghrebi Masking countermeasures against HO-DPA : security evaluation and enhancement by specific mask encodings. (Les contre-mesures par masquage contre les attaques HO-DPA : évaluation et amélioration de la sécurité en utilisant des encodages spécifiques). Search on Bibsonomy 2012   RDF
37Shantenu Jha, Daniel S. Katz, Manish Parashar, Omer F. Rana, Murray Cole Abstractions for Distributed Systems (DPA 2008). Search on Bibsonomy Euro-Par Workshops The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
37Daisuke Suzuki, Minoru Saeki, Tetsuya Ichikawa Random Switching Logic: A New Countermeasure against DPA and Second-Order DPA at the Logic Level. Search on Bibsonomy IEICE Trans. Fundam. Electron. Commun. Comput. Sci. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
35Zhenjiang Wang, Chenggang Wu 0002, Pen-Chung Yew On improving heap memory layout by dynamic pool allocation. Search on Bibsonomy CGO The full citation details ... 2010 DBLP  DOI  BibTeX  RDF adaptive partial call chain, pool allocation, dynamic optimization, data layout
35Kazuo Sakiyama, Tatsuya Yagi, Kazuo Ohta Fault Analysis Attack against an AES Prototype Chip Using RSL. Search on Bibsonomy CT-RSA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Random Switching Logic, Clock-based Attack, AES, Fault Analysis
35Matthieu Rivain, Emmanuel Prouff, Julien Doget Higher-Order Masking and Shuffling for Software Implementations of Block Ciphers. Search on Bibsonomy CHES The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
35Jing Pan, J. I. den Hartog, Erik P. de Vink An Operation-Based Metric for CPA Resistance. Search on Bibsonomy SEC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
35Yingxi Lu, Máire O'Neill, John V. McCanny Differential Power Analysis of a SHACAL-2 hardware implementation. Search on Bibsonomy ISCAS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
35Khurram Waheed, Robert Bogdan Staszewski Mitigation of CMOS device variability in the transmitter amplitude path using Digital RF Processing. Search on Bibsonomy ISCAS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
35Massimo Alioto, Massimo Poli, Santina Rocchi A general model for differential power analysis attacks to static logic circuits. Search on Bibsonomy ISCAS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
35Mikko Alatossava, Lassi Hentilä, Veli-Matti Holappa, Juha Meinilä Comparison of Outdoor to Indoor and Indoor to Outdoor MIMO Propagation Characteristics at 5.25 GHz. Search on Bibsonomy VTC Spring The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
35Dong Liu 0022, Weiyan Xing, Rui Li 0051, Chunyuan Zhang, Haiyan Li A Fault-Tolerant Real-Time Scheduling Algorithm in Software Fault-Tolerant Module. Search on Bibsonomy International Conference on Computational Science (4) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF real-time system, scheduling algorithm, software fault-tolerance
35JaeCheol Ha, JeaHoon Park, Sang-Jae Moon, Sung-Ming Yen Provably Secure Countermeasure Resistant to Several Types of Power Attack for ECC. Search on Bibsonomy WISA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Smart card, ECC, Side channel attack, Power analysis attack
35Massimo Alioto, Massimo Poli, Santina Rocchi, Valerio Vignoli Mixed Techniques to Protect Precharged Busses against Differential Power Analysis Attacks. Search on Bibsonomy ISCAS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
35Guillaume Fumaroli, Emmanuel Mayer, Renaud Dubois First-Order Differential Power Analysis on the Duplication Method. Search on Bibsonomy INDOCRYPT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF zero attack, differential power analysis, spectral analysis, Side-channel analysis
35Elisabeth Oswald, Stefan Mangard Template Attacks on Masking - Resistance Is Futile. Search on Bibsonomy CT-RSA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #100 of 585 (100 per page; Change: )
Pages: [1][2][3][4][5][6][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license