|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 472 occurrences of 223 keywords
|
|
|
Results
Found 1140 publication records. Showing 1140 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
130 | Katsuyuki Okeya, Dong-Guk Han |
Side Channel Attack on Ha-Moon's Countermeasure of Randomized Signed Scalar Multiplication. |
INDOCRYPT |
2003 |
DBLP DOI BibTeX RDF |
Ha-Moons Countermeasure, Finite Markov Chain, Side Channel Attacks, DPA, Elliptic Curve Cryptosystem, SPA |
122 | Dong-Guk Han, Katsuyuki Okeya, Tae Hyun Kim 0003, Yoon Sung Hwang, Young-Ho Park 0001, Souhwan Jung |
Cryptanalysis of the Countermeasures Using Randomized Binary Signed Digits. |
ACNS |
2004 |
DBLP DOI BibTeX RDF |
BSD Representation, Ha-Moons Countermeasure, Ebeid-Hasans Countermeasure, Agagliates Countermeasure, Side Channel Attacks, DPA, Elliptic Curve Cryptosystem, SPA |
98 | Kouichi Itoh, Tetsuya Izu, Masahiko Takenaka |
A Practical Countermeasure against Address-Bit Differential Power Analysis. |
CHES |
2003 |
DBLP DOI BibTeX RDF |
address-bit DPA, RSA, ECC, Differential Power Analysis (DPA), exponentiation, countermeasure |
98 | Katsuyuki Okeya, Kouichi Sakurai |
A Second-Order DPA Attack Breaks a Window-Method Based Countermeasure against Side Channel Attacks. |
ISC |
2002 |
DBLP DOI BibTeX RDF |
Higher-Order DPA Attack, Second-Order DPA Attack, Möller's Countermeasure, Side Channel Attacks, Differential Power Analysis, Elliptic Curve Cryptosystems |
87 | Katsuyuki Okeya, Kouichi Sakurai |
On Insecurity of the Side Channel Attack Countermeasure Using Addition-Subtraction Chains under Distinguishability between Addition and Doubling. |
ACISP |
2002 |
DBLP DOI BibTeX RDF |
Randomized Addition-Subtraction Chains Countermeasure, SPA Attack, Side Channel Attacks, Elliptic Curve Cryptosystems, Timing Attack |
77 | Kouichi Itoh, Tetsuya Izu, Masahiko Takenaka |
Improving the Randomized Initial Point Countermeasure Against DPA. |
ACNS |
2006 |
DBLP DOI BibTeX RDF |
RPA, ZVA, Smart card, DPA, Elliptic Curve Cryptosystems (ECC), countermeasure, RIP |
68 | Li-Chiou Chen, Kathleen M. Carley |
The impact of countermeasure propagation on the prevalence of computer viruses. |
IEEE Trans. Syst. Man Cybern. Part B |
2004 |
DBLP DOI BibTeX RDF |
|
66 | Toru Akishita, Masanobu Katagi, Yoshikazu Miyato, Asami Mizuno, Kyoji Shibutani |
A Practical DPA Countermeasure with BDD Architecture. |
CARDIS |
2008 |
DBLP DOI BibTeX RDF |
dual-rail pre-charge logic, DPA, Binary Decision Diagram, countermeasure |
66 | Yoshitaka Nagami, Daisuke Miyamoto, Hiroaki Hazeyama, Youki Kadobayashi |
An Independent Evaluation of Web Timing Attack and its Countermeasure. |
ARES |
2008 |
DBLP DOI BibTeX RDF |
Web Timing Attack, Countermeasure, Web Application Security |
57 | Sung-Ming Yen, Seungjoo Kim, Seongan Lim, Sang-Jae Moon |
A Countermeasure against One Physical Cryptanalysis May Benefit Another Attack. |
ICISC |
2001 |
DBLP DOI BibTeX RDF |
Square-multiply exponentiation, Cryptography, Side channel attack, Exponentiation, Timing attack, Power analysis attack, Physical cryptanalysis, Hardware fault cryptanalysis |
56 | Kouichi Itoh, Masahiko Takenaka, Naoya Torii |
DPA Countermeasure Based on the "Masking Method". |
ICISC |
2001 |
DBLP DOI BibTeX RDF |
masking method, DPA, countermeasure, Rijndael |
47 | Jean-Sébastien Coron, Ilya Kizhvatov |
Analysis of the split mask countermeasure for embedded systems. |
WESS |
2009 |
DBLP DOI BibTeX RDF |
cryptanalysis, DPA, side channel analysis, countermeasures, masking |
47 | Thomas Plos |
Evaluation of the Detached Power Supply as Side-Channel Analysis Countermeasure for Passive UHF RFID Tags. |
CT-RSA |
2009 |
DBLP DOI BibTeX RDF |
Deta-ched Power Supply, Parasitic Backscatter, RFID, Differential Power Analysis, Side-Channel Analysis, UHF |
47 | Emmanuel Prouff, Robert P. McEvoy |
First-Order Side-Channel Attacks on the Permutation Tables Countermeasure. |
CHES |
2009 |
DBLP DOI BibTeX RDF |
Permutation Tables, MIA, Side-Channel Attacks, Masking, CPA |
47 | Masaaki Shirase, Tsuyoshi Takagi, Eiji Okamoto |
An Efficient Countermeasure against Side Channel Attacks for Pairing Computation. |
ISPEC |
2008 |
DBLP DOI BibTeX RDF |
random value addition, side channel attacks, Tate pairing, ? T pairing |
47 | Pierre-Alain Fouque, Denis Réal, Frédéric Valette, M'hamed Drissi |
The Carry Leakage on the Randomized Exponent Countermeasure. |
CHES |
2008 |
DBLP DOI BibTeX RDF |
|
47 | JaeCheol Ha, JeaHoon Park, Sang-Jae Moon, Sung-Ming Yen |
Provably Secure Countermeasure Resistant to Several Types of Power Attack for ECC. |
WISA |
2007 |
DBLP DOI BibTeX RDF |
Smart card, ECC, Side channel attack, Power analysis attack |
47 | Catherine H. Gebotys |
A table masking countermeasure for low-energy secure embedded systems. |
IEEE Trans. Very Large Scale Integr. Syst. |
2006 |
DBLP DOI BibTeX RDF |
|
47 | Tae-Jun Park, Mun-Kyu Lee, Dowon Hong, Kyoil Chung |
A DPA Countermeasure by Randomized Frobenius Decomposition. |
WISA |
2005 |
DBLP DOI BibTeX RDF |
|
47 | Katsuyuki Okeya, Tsuyoshi Takagi, Camille Vuillaume |
On the Exact Flexibility of the Flexible Countermeasure Against Side Channel Attacks. |
ACISP |
2004 |
DBLP DOI BibTeX RDF |
Fractional Window, Side Channel Attacks, Flexibility, Elliptic Curve Cryptosystems, Smartcard, Discrete Logarithm Problem |
45 | Yudistira Asnar, Paolo Giorgini |
Modelling Risk and Identifying Countermeasure in Organizations. |
CRITIS |
2006 |
DBLP DOI BibTeX RDF |
countermeasure identification, risk analysis, goal modelling |
42 | Jean-Sébastien Coron, Christophe Giraud 0001, Emmanuel Prouff, Matthieu Rivain |
Attack and Improvement of a Secure S-Box Calculation Based on the Fourier Transform. |
CHES |
2008 |
DBLP DOI BibTeX RDF |
|
42 | Hideyo Mamiya, Atsuko Miyaji, Hiroaki Morimoto |
Efficient Countermeasures against RPA, DPA, and SPA. |
CHES |
2004 |
DBLP DOI BibTeX RDF |
Elliptic curve exponentiation, ZPA, RPA, DPA, SPA |
42 | Sung-Ming Yen, Sang-Jae Moon, JaeCheol Ha |
Hardware Fault Attackon RSA with CRT Revisited. |
ICISC |
2002 |
DBLP DOI BibTeX RDF |
Computational fault, Memory access fault, Cryptography, Side channel attack, Factorization, Chinese remainder theorem (CRT), Transient fault, Permanent fault, Physical cryptanalysis, Hardware fault cryptanalysis |
41 | David Vigilant |
RSA with CRT: A New Cost-Effective Solution to Thwart Fault Attacks. |
CHES |
2008 |
DBLP DOI BibTeX RDF |
Software countermeasure, RSA, Chinese Remainder Theorem, Fault attacks, Modular exponentiation, Bellcore attack |
41 | Tai-Hoon Kim, Sun-myoung Hwang |
Intelligent Method for Building Security Countermeasures. |
KES (2) |
2006 |
DBLP DOI BibTeX RDF |
Security countermeasure, security hole, security engineering |
41 | Katsuyuki Okeya, Tsuyoshi Takagi, Camille Vuillaume |
Efficient Representations on Koblitz Curves with Resistance to Side Channel Attacks. |
ACISP |
2005 |
DBLP DOI BibTeX RDF |
SPA countermeasure, side channel attacks, elliptic curve cryptosystems, smartcard, Koblitz curves |
41 | Dong-Guk Han, Nam Su Chang, Seok Won Jung, Young-Ho Park 0001, Chang Han Kim, Heuisu Ryu |
Cryptanalysis of the Full Version Randomized Addition-Subtraction Chains. |
ACISP |
2003 |
DBLP DOI BibTeX RDF |
SPA attack, Randomized addition-subtraction chains countermeasure, Side-channel attack, Elliptic curve cryptosystems |
41 | John V. A. Janeri, Daylan B. Darby, Daniel D. Schnackenberg |
Building higher resolution synthetic clocks for signaling in covert timing channels. |
CSFW |
1995 |
DBLP DOI BibTeX RDF |
higher resolution synthetic clocks, timing channel countermeasure, Boeing multilevel secure local area network, secure network server, internal timing channels, time reference clock granularity, fine-grained signaling clock, timing channel throughput, timing channel capacities, local area networks, security of data, worst-case analysis, covert timing channels |
36 | Majid Khabbazian, Hugues Mercier, Vijay K. Bhargava |
Severity analysis and countermeasure for the wormhole attack in wireless ad hoc networks. |
IEEE Trans. Wirel. Commun. |
2009 |
DBLP DOI BibTeX RDF |
|
36 | Marc Joye |
On the Security of a Unified Countermeasure. |
FDTC |
2008 |
DBLP DOI BibTeX RDF |
|
36 | Jean-Sébastien Coron |
A New DPA Countermeasure Based on Permutation Tables. |
SCN |
2008 |
DBLP DOI BibTeX RDF |
|
36 | Sun-Myung Hwang |
Intelligent Methods and Procedures of Countermeasure Design. |
MUE |
2007 |
DBLP DOI BibTeX RDF |
|
36 | Karthik Baddam, Mark Zwolinski |
Evaluation of Dynamic Voltage and Frequency Scaling as a Differential Power Analysis Countermeasure. |
VLSI Design |
2007 |
DBLP DOI BibTeX RDF |
|
36 | Catherine H. Gebotys |
A split-mask countermeasure for low-energy secure embedded systems. |
ACM Trans. Embed. Comput. Syst. |
2006 |
DBLP DOI BibTeX RDF |
EM analysis, Side channel analysis, countermeasures, power attacks |
36 | ChangKyun Kim, JaeCheol Ha, Sang-Jae Moon, Sung-Ming Yen, Sung-Hyun Kim |
A CRT-Based RSA Countermeasure Against Physical Cryptanalysis. |
HPCC |
2005 |
DBLP DOI BibTeX RDF |
|
36 | Dong-Guk Han, Tsuyoshi Takagi, Tae Hyun Kim 0003, Howon Kim 0001, Kyoil Chung |
Collision Attack on XTR and a Countermeasure with a Fixed Pattern. |
EUC Workshops |
2005 |
DBLP DOI BibTeX RDF |
XTR public key system, XTR Exponentiation Algorithms, Ubiquitous computer, Side Channel Attacks, Collision Attack |
36 | Catherine H. Gebotys, C. C. Tiu, X. Chen |
A Countermeasure for EM Attack of a Wireless PDA. |
ITCC (1) |
2005 |
DBLP DOI BibTeX RDF |
|
36 | Girish B. Ratanpal, Ronald D. Williams, Travis N. Blalock |
An On-Chip Signal Suppression Countermeasure to Power Analysis Attacks. |
IEEE Trans. Dependable Secur. Comput. |
2004 |
DBLP DOI BibTeX RDF |
VLSI, smartcards, DES, security and protection, Power analysis attacks, code breaking |
36 | Marco Bucci, Michele Guglielmo, Raimondo Luzzi, Alessandro Trifiletti |
A Power Consumption Randomization Countermeasure for DPA-Resistant Cryptographic Processors. |
PATMOS |
2004 |
DBLP DOI BibTeX RDF |
chipcards, cryptography, Differential power analysis, DPA, power analysis, countermeasures |
36 | MahnKi Ahn, JaeCheol Ha, Hoon-Jae Lee 0001, Sang-Jae Moon |
A Random M-ary Method Based Countermeasure against Side Channel Attacks. |
ICCSA (2) |
2003 |
DBLP DOI BibTeX RDF |
Random m-ary Recoding Algorithm, Side Channel Attacks, DPA, Elliptic Curve Cryptosystems, SPA, Power Analysis Attacks |
35 | Marcel Medwed, Jörn-Marc Schmidt |
A Continuous Fault Countermeasure for AES Providing a Constant Error Detection Rate. |
FDTC |
2010 |
DBLP DOI BibTeX RDF |
EAN+B codes, redundant table lookups, AES, Fault attacks, countermeasure |
32 | Nele Mentens, Benedikt Gierlichs, Ingrid Verbauwhede |
Power and Fault Analysis Resistance in Hardware through Dynamic Reconfiguration. |
CHES |
2008 |
DBLP DOI BibTeX RDF |
|
32 | HeeSeok Kim, Tae Hyun Kim 0003, Jeong Choon Ryoo, Dong-Guk Han, Howon Kim 0001, Jongin Lim 0001 |
Enhanced Doubling Attacks on Signed-All-Bits Set Recoding. |
WISTP |
2007 |
DBLP DOI BibTeX RDF |
sABS recoding, SPA-based analysis, Doubling Attack, Side Channel Attacks, scalar multiplication |
32 | Byoung-Joon Min, Seung Hwan Yoo, Jongho Ryu, Dong Il Seo |
Return on Security Investment Against Cyber Attacks on Availability. |
ICCSA (2) |
2006 |
DBLP DOI BibTeX RDF |
|
32 | Toru Akishita, Tsuyoshi Takagi |
On the Optimal Parameter Choice for Elliptic Curve Cryptosystems Using Isogeny. |
Public Key Cryptography |
2004 |
DBLP DOI BibTeX RDF |
zero-value point attack, side channel attack, elliptic curve cryptosystems, isomorphism, isogeny |
30 | Michael Tunstall |
Random Order m-ary Exponentiation. |
ACISP |
2009 |
DBLP DOI BibTeX RDF |
random order countermeasure, side channel analysis, Exponentiation algorithms |
30 | Fabrizio Baiardi, S. Suin, Claudio Telmon, M. Pioli |
Assessing the Risk of an Information Infrastructure Through Security Dependencies. |
CRITIS |
2006 |
DBLP DOI BibTeX RDF |
mitigation plan, ranking, risk assessment, vulnerability, countermeasure |
30 | ManKi Ahn, Hoon-Jae Lee 0001 |
Experiments and Hardware Countermeasures on Power Analysis Attacks. |
ICCSA (3) |
2006 |
DBLP DOI BibTeX RDF |
SPA/DPA, Side Channel Attacks, Power Analysis, SmartCard, Countermeasure |
30 | Kai Schramm, Christof Paar |
Higher Order Masking of the AES. |
CT-RSA |
2006 |
DBLP DOI BibTeX RDF |
Higher Order DPA, Masking Countermeasure, AES |
30 | Emmanuel Prouff, Christophe Giraud 0001, Sébastien Aumônier |
Provably Secure S-Box Implementation Based on Fourier Transform. |
CHES |
2006 |
DBLP DOI BibTeX RDF |
Provably Secure Countermeasure, Symmetric Cryptosystems, FOX, AES, Differential Power Analysis, Fourier Transform, S-Box |
30 | Hua Yu, Dan Dou |
E-commerce application in the electric utility industry of China. |
ICEC |
2005 |
DBLP DOI BibTeX RDF |
advantage countermeasure, electric utility industry, e-commerce |
30 | Eric Peeters, François-Xavier Standaert, Nicolas Donckers, Jean-Jacques Quisquater |
Improved Higher-Order Side-Channel Attacks with FPGA Experiments. |
CHES |
2005 |
DBLP DOI BibTeX RDF |
cryptographic devices, high-order power analysis, masking countermeasure, FPGA, block cipher, DPA, side-channel analysis |
30 | Kris Tiri, David D. Hwang, Alireza Hodjat, Bo-Cheng Lai, Shenglin Yang, Patrick Schaumont, Ingrid Verbauwhede |
Prototype IC with WDDL and Differential Routing - DPA Resistance Assessment. |
CHES |
2005 |
DBLP DOI BibTeX RDF |
dual rail with precharge, wave dynamic differential logic (WDDL), differential routing, parasitic capacitance matching, side-channel attack (SCA), differential power analysis (DPA), countermeasure |
30 | Kris Tiri, Ingrid Verbauwhede |
Simulation models for side-channel information leaks. |
DAC |
2005 |
DBLP DOI BibTeX RDF |
security IC, encryption, smart card, side-channel attack, differential power analysis, simulation model, countermeasure |
30 | Christophe Clavier, Jean-Sébastien Coron, Nora Dabbous |
Differential Power Analysis in the Presence of Hardware Countermeasures. |
CHES |
2000 |
DBLP DOI BibTeX RDF |
hardware countermeasure, random process interrupt, smart card, Power analysis |
30 | Paul Ammann, Sushil Jajodia, Catherine D. McCollum, Barbara T. Blaustein |
Surviving information warfare attacks on databases. |
S&P |
1997 |
DBLP DOI BibTeX RDF |
information warfare attack survival, fault tolerance approach, damaged data, partially repaired data, snapshot algorithm, damage markings, consistency preserving normal transactions, countermeasure transactions, databases, protocol, security of data, integrity constraints, data security, database consistency |
30 | Steffen Wendzel, Daniela Eller, Wojciech Mazurczyk |
One Countermeasure, Multiple Patterns: Countermeasure Variation for Covert Channels. |
CECC |
2018 |
DBLP DOI BibTeX RDF |
|
30 | Arpan Roy, Dong Seong Kim 0001, Kishor S. Trivedi |
Scalable optimal countermeasure selection using implicit enumeration on attack countermeasure trees. |
DSN |
2012 |
DBLP DOI BibTeX RDF |
|
26 | Amir Moradi 0001, Mehrdad Khatir, Mahmoud Salmasizadeh, Mohammad T. Manzuri Shalmani |
Charge recovery logic as a side channel attack countermeasure. |
ISQED |
2009 |
DBLP DOI BibTeX RDF |
|
26 | Fan Zhang 0010, Zhijie Jerry Shi |
An Efficient Window-Based Countermeasure to Power Analysis of ECC Algorithms. |
ITNG |
2008 |
DBLP DOI BibTeX RDF |
|
26 | Marcel Medwed, Jörn-Marc Schmidt |
A Generic Fault Countermeasure Providing Data and Program Flow Integrity. |
FDTC |
2008 |
DBLP DOI BibTeX RDF |
|
26 | Alin Razafindraibe, Michel Robert, Philippe Maurine |
Analysis and Improvement of Dual Rail Logic as a Countermeasure Against DPA. |
PATMOS |
2007 |
DBLP DOI BibTeX RDF |
|
26 | Alin Razafindraibe, Michel Robert, Philippe Maurine |
Improvement of dual rail logic as a countermeasure against DPA. |
VLSI-SoC |
2007 |
DBLP DOI BibTeX RDF |
|
26 | Stefano Bistarelli, Fabio Fioravanti, Pamela Peretti |
Using CP-nets as a guide for countermeasure selection. |
SAC |
2007 |
DBLP DOI BibTeX RDF |
|
26 | Sei Nagashima, Naofumi Homma, Yuichi Imai, Takafumi Aoki, Akashi Satoh |
DPA Using Phase-Based Waveform Matching against Random-Delay Countermeasure. |
ISCAS |
2007 |
DBLP DOI BibTeX RDF |
|
26 | Shin Yokoyama, Yoshikazu Nakane, Osamu Takahashi, Eiichi Miyamoto |
Evaluation of the Impact of Selfish Nodes in Ad Hoc Networks and Detection and Countermeasure Methods. |
MDM |
2006 |
DBLP DOI BibTeX RDF |
|
26 | Pasquale Corsonello, Stefania Perri, Martin Margala |
An integrated countermeasure against differential power analysis for secure smart-cards. |
ISCAS |
2006 |
DBLP DOI BibTeX RDF |
|
26 | Jakob Eriksson, Srikanth V. Krishnamurthy, Michalis Faloutsos |
TrueLink: A Practical Countermeasure to the Wormhole Attack in Wireless Networks. |
ICNP |
2006 |
DBLP DOI BibTeX RDF |
|
26 | Zhaoyu Liu, Roopesh Uppala |
A Dynamic Countermeasure Method for Large-Scale Network Attacks. |
DASC |
2006 |
DBLP DOI BibTeX RDF |
|
26 | Issa M. Khalil, Saurabh Bagchi, Ness B. Shroff |
LITEWORP: A Lightweight Countermeasure for the Wormhole Attack in Multihop Wireless Networks. |
DSN |
2005 |
DBLP DOI BibTeX RDF |
|
26 | Yanyun Zhou, Maixiu Hu |
E-commerce ethics problem and countermeasure of China on the basis of systematic thinking. |
ICEC |
2005 |
DBLP DOI BibTeX RDF |
e-commerce (system), e-commerce ethics, the morals containing by oneself (conscientious) |
26 | P. Vinod 0002, Prabin Kumar Bora |
A New Inter-frame Collusion Attack and a Countermeasure. |
IWDW |
2005 |
DBLP DOI BibTeX RDF |
|
26 | Marco Bucci, Raimondo Luzzi, Michele Guglielmo, Alessandro Trifiletti |
A countermeasure against differential power analysis based on random delay insertion. |
ISCAS (4) |
2005 |
DBLP DOI BibTeX RDF |
|
26 | Guido Bertoni, Vittorio Zaccaria, Luca Breveglieri, Matteo Monchiero, Gianluca Palermo |
AES Power Attack Based on Induced Cache Miss and Countermeasure. |
ITCC (1) |
2005 |
DBLP DOI BibTeX RDF |
Cache, Block Cipher, AES, Power Analysis, Cache Miss |
26 | Michiharu Niimi, Hideki Noda, Bruce Segee |
A Study on Visual Attack to BPCS-Steganography and Countermeasure. |
VLBV |
2005 |
DBLP DOI BibTeX RDF |
|
26 | Michiharu Niimi, Tomohito Ei, Hideki Noda, Eiji Kawaguchi, Bruce Segee |
An attack to BPCS-steganography using complexity histogram and countermeasure. |
ICIP |
2004 |
DBLP DOI BibTeX RDF |
|
26 | Jianhua Yang, Zhaohui Wu 0001, Siliang Tang, Xiaosheng Guo |
Virtual Battlefield Attack-Defense Countermeasure Simulation on the Grid. |
GCC Workshops |
2004 |
DBLP DOI BibTeX RDF |
|
26 | DongGook Park, JungJoon Kim, Colin Boyd, Ed Dawson |
Cryptographic Salt: A Countermeasure against Denial-of-Service Attacks. |
ACISP |
2001 |
DBLP DOI BibTeX RDF |
|
26 | Elisabeth Oswald, Manfred Josef Aigner |
Randomized Addition-Subtraction Chains as a Countermeasure against Power Attacks. |
CHES |
2001 |
DBLP DOI BibTeX RDF |
Elliptic Curve Cryptosystems, Power Analysis |
21 | Kazuo Sakiyama, Tatsuya Yagi, Kazuo Ohta |
Fault Analysis Attack against an AES Prototype Chip Using RSL. |
CT-RSA |
2009 |
DBLP DOI BibTeX RDF |
Random Switching Logic, Clock-based Attack, AES, Fault Analysis |
21 | Jean-Sébastien Coron, Ilya Kizhvatov |
An Efficient Method for Random Delay Generation in Embedded Software. |
CHES |
2009 |
DBLP DOI BibTeX RDF |
random delays, Side channel attacks, countermeasures |
21 | Stamatios V. Kartalopoulos |
Differentiating Data Security and Network Security. |
ICC |
2008 |
DBLP DOI BibTeX RDF |
|
21 | Felipe Ghellar, Marcelo Lubaszewski |
A novel AES cryptographic core highly resistant to differential power analysis attacks. |
SBCCI |
2008 |
DBLP DOI BibTeX RDF |
dpa, rijndael, isomorphisms, aes |
21 | Fernando C. Colón Osorio |
Using Byzantine Agreement in the Design Of IPS Systems. |
IPCCC |
2007 |
DBLP DOI BibTeX RDF |
|
21 | Chong Hee Kim, Jean-Jacques Quisquater |
How can we overcome both side channel analysis and fault attacks on RSA-CRT? |
FDTC |
2007 |
DBLP DOI BibTeX RDF |
|
21 | Young-Geun Choi, Jeonil Kang, DaeHun Nyang |
Proactive Code Verification Protocol in Wireless Sensor Network. |
ICCSA (2) |
2007 |
DBLP DOI BibTeX RDF |
|
21 | Tae Hyun Kim 0003, Dong-Guk Han, Katsuyuki Okeya, Jongin Lim 0001 |
Generic Cryptanalysis of Combined Countermeasures with Randomized BSD Representations. |
CARDIS |
2006 |
DBLP DOI BibTeX RDF |
|
21 | Camille Vuillaume, Katsuyuki Okeya |
Flexible Exponentiation with Resistance to Side Channel Attacks. |
ACNS |
2006 |
DBLP DOI BibTeX RDF |
fractional width, RSA, side channel attacks, simple power analysis |
21 | Yongjin Kim, Ahmed Helmy |
Attacker traceback with cross-layer monitoring in wireless multi-hop networks. |
SASN |
2006 |
DBLP DOI BibTeX RDF |
DoS/DDoS attack, attacker traceback, cross-layer monitoring, wireless multi-hop networks |
21 | Yves Younan, Davide Pozza, Frank Piessens, Wouter Joosen |
Extended Protection against Stack Smashing Attacks without Performance Loss. |
ACSAC |
2006 |
DBLP DOI BibTeX RDF |
|
21 | Randy Smith, Cristian Estan, Somesh Jha |
Backtracking Algorithmic Complexity Attacks against a NIDS. |
ACSAC |
2006 |
DBLP DOI BibTeX RDF |
|
21 | G. Fraidy Bouesse, Marc Renaudin, Gilles Sicard |
Improving DPA Resistance of Quasi Delay Insensitive Circuits Using Randomly Time-shifted Acknowledgment Signals. |
VLSI-SoC |
2005 |
DBLP DOI BibTeX RDF |
|
21 | Sung-Ming Yen, Wei-Chih Lien, Sang-Jae Moon, JaeCheol Ha |
Power Analysis by Exploiting Chosen Message and Internal Collisions - Vulnerability of Checking Mechanism for RSA-Decryption. |
Mycrypt |
2005 |
DBLP DOI BibTeX RDF |
Cryptography, Smart card, Side-channel attack, Simple power analysis (SPA), Chosen-message attack |
21 | Régis Bevan |
Improved Zero Value Attack on XTR. |
ACISP |
2005 |
DBLP DOI BibTeX RDF |
MRPA, smart cards, Power Analysis, DFA, XTR |
21 | Jong Hoon Shin, Dong Jin Park, Pil Joong Lee |
DPA Attack on the Improved Ha-Moon Algorithm. |
WISA |
2005 |
DBLP DOI BibTeX RDF |
Ha-Moon algorithm, randomized exponentiation algorithm, side-channel attack |
21 | Sung-Ming Yen, Lee-Chun Ko, Sang-Jae Moon, JaeCheol Ha |
Relative Doubling Attack Against Montgomery Ladder. |
ICISC |
2005 |
DBLP DOI BibTeX RDF |
Doubling attack, Cryptography, Smart card, Side-channel attack, Scalar multiplication, Exponentiation, Simple power analysis (SPA), Chosen-message attack |
21 | Mustapha Hedabou, Pierre Pinel, Lucien Bénéteau |
Countermeasures for Preventing Comb Method Against SCA Attacks. |
ISPEC |
2005 |
DBLP DOI BibTeX RDF |
comb method, pre-computed table, memory space, side channel attacks, Elliptic curve, scalar multiplication |
21 | SangCheol Hwang, Namhoon Lee, Kouichi Sakurai, Joong Gil Park, Jaecheol Ryou 0001 |
The Improved Risk Analysis Mechanism in the Practical Risk Analysis System. |
ICOIN |
2005 |
DBLP DOI BibTeX RDF |
praha, risk management, risk analysis |
21 | David A. Wagner 0001 |
Cryptanalysis of a provably secure CRT-RSA algorithm. |
CCS |
2004 |
DBLP DOI BibTeX RDF |
cryptanalysis, RSA, chinese remainder theorem, fault attacks |
Displaying result #1 - #100 of 1140 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ >>] |
|