|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 77 occurrences of 29 keywords
|
|
|
Results
Found 20 publication records. Showing 20 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
110 | Pierre-Yvan Liardet, Nigel P. Smart |
Preventing SPA/DPA in ECC Systems Using the Jacobi Form. |
CHES |
2001 |
DBLP DOI BibTeX RDF |
|
86 | Atsuko Miyaji |
Generalized MMM-Algorithm Secure Against SPA, DPA, and RPA. |
ICISC |
2007 |
DBLP DOI BibTeX RDF |
RPA, elliptic curve, DPA, SPA |
60 | ManKi Ahn, Hoon-Jae Lee 0001 |
Experiments and Hardware Countermeasures on Power Analysis Attacks. |
ICCSA (3) |
2006 |
DBLP DOI BibTeX RDF |
SPA/DPA, Side Channel Attacks, Power Analysis, SmartCard, Countermeasure |
60 | Hoon-Jae Lee 0001, ManKi Ahn, Seongan Lim, Sang-Jae Moon |
A Study on Smart Card Security Evaluation Criteria for Side Channel Attacks. |
ICCSA (1) |
2004 |
DBLP DOI BibTeX RDF |
Protection Profiles, Vulnerability Assessment Activities, SPA/DPA, Smart Card, Side Channel Attacks, Common Criteria |
60 | JaeCheol Ha, Sang-Jae Moon |
Randomized Signed-Scalar Multiplication of ECC to Resist Power Attacks. |
CHES |
2002 |
DBLP DOI BibTeX RDF |
Side-channel attack, DPA, Elliptic curve cryptosystems, SPA, Power analysis attack, Non-adjacent form |
48 | Chong Hee Kim, Jean-Jacques Quisquater |
How can we overcome both side channel analysis and fault attacks on RSA-CRT? |
FDTC |
2007 |
DBLP DOI BibTeX RDF |
|
48 | Dong Jin Park, Sang Gyoo Sim, Pil Joong Lee |
Fast Scalar Multiplication Method Using Change-of-Basis Matrix to Prevent Power Analysis Attacks on Koblitz Curves. |
WISA |
2003 |
DBLP DOI BibTeX RDF |
sliding window methods, basis conversion, Koblitz curve cryptosystems, DPA, scalar multiplication, SPA |
48 | MahnKi Ahn, JaeCheol Ha, Hoon-Jae Lee 0001, Sang-Jae Moon |
A Random M-ary Method Based Countermeasure against Side Channel Attacks. |
ICCSA (2) |
2003 |
DBLP DOI BibTeX RDF |
Random m-ary Recoding Algorithm, Side Channel Attacks, DPA, Elliptic Curve Cryptosystems, SPA, Power Analysis Attacks |
38 | Weiwei Shan, Xingyuan Fu, Zhipeng Xu |
A Secure Reconfigurable Crypto IC With Countermeasures Against SPA, DPA, and EMA. |
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. |
2015 |
DBLP DOI BibTeX RDF |
|
38 | Atsuko Miyaji |
Generalized Scalar Multiplication Secure against SPA, DPA, and RPA. |
IEICE Trans. Fundam. Electron. Commun. Comput. Sci. |
2008 |
DBLP DOI BibTeX RDF |
|
24 | Sylvain Guilley, Laurent Sauvage, Jean-Luc Danger, Nidhal Selmane, Renaud Pacalet |
Silicon-level Solutions to Counteract Passive and Active Attacks. |
FDTC |
2008 |
DBLP DOI BibTeX RDF |
|
24 | Katsuyuki Okeya, Tetsu Iwata |
Side Channel Attacks on Message Authentication Codes. |
ESAS |
2005 |
DBLP DOI BibTeX RDF |
Selective Forgery, MACs, Side Channel Attacks, DPA, SPA |
24 | Dong-Guk Han, Katsuyuki Okeya, Tae Hyun Kim 0003, Yoon Sung Hwang, Young-Ho Park 0001, Souhwan Jung |
Cryptanalysis of the Countermeasures Using Randomized Binary Signed Digits. |
ACNS |
2004 |
DBLP DOI BibTeX RDF |
BSD Representation, Ha-Moons Countermeasure, Ebeid-Hasans Countermeasure, Agagliates Countermeasure, Side Channel Attacks, DPA, Elliptic Curve Cryptosystem, SPA |
24 | Colin D. Walter |
Issues of Security with the Oswald-Aigner Exponentiation Algorithm. |
CT-RSA |
2004 |
DBLP DOI BibTeX RDF |
Addition-subtraction chains, randomized exponentiation, elliptic curve cryptography, ECC, DPA, blinding, power analysis, smartcard, SPA, DEMA, point multiplication, SEMA |
24 | Jean-Claude Bajard, Laurent Imbert, Pierre-Yvan Liardet, Yannick Teglia |
Leak Resistant Arithmetic. |
CHES |
2004 |
DBLP DOI BibTeX RDF |
RNS Montgomery multiplication, Side channel attacks, residue number systems |
24 | Mehdi-Laurent Akkar, Nicolas T. Courtois, Romain Duteuil, Louis Goubin |
A Fast and Secure Implementation of Sflash. |
Public Key Cryptography |
2003 |
DBLP DOI BibTeX RDF |
Matsumoto-Imai cryptosystem C*, C*- trapdoor function, Digital Signatures, Smart cards, DPA, PKI, Power Analysis, SPA, portable devices, Addition Chains, Multivariate Cryptography, HFE |
24 | Katsuyuki Okeya, Dong-Guk Han |
Side Channel Attack on Ha-Moon's Countermeasure of Randomized Signed Scalar Multiplication. |
INDOCRYPT |
2003 |
DBLP DOI BibTeX RDF |
Ha-Moons Countermeasure, Finite Markov Chain, Side Channel Attacks, DPA, Elliptic Curve Cryptosystem, SPA |
24 | Colin D. Walter |
Seeing through MIST Given a Small Fraction of an RSA Private Key. |
CT-RSA |
2003 |
DBLP DOI BibTeX RDF |
division chains, randomized exponentiation, Mist, randomary exponentiation, RSA, DPA, blinding, power analysis, smartcard, SPA, Addition chains, DEMA, side channel leakage, SEMA |
24 | Jean-Jacques Quisquater, David Samyde |
ElectroMagnetic Analysis (EMA): Measures and Counter-Measures for Smart Cards. |
E-smart |
2001 |
DBLP DOI BibTeX RDF |
electromagnetic and power analysis, DPA, smartcard, SPA, tamper resistance, DEMA, SEMA |
24 | Adi Shamir |
Protecting Smart Cards from Passive Power Analysis with Detached Power Supplies. |
CHES |
2000 |
DBLP DOI BibTeX RDF |
Smart cards, DPA, power analysis, SPA |
Displaying result #1 - #20 of 20 (100 per page; Change: )
|
|