|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 472 occurrences of 223 keywords
|
|
|
Results
Found 1140 publication records. Showing 1140 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
130 | Katsuyuki Okeya, Dong-Guk Han |
Side Channel Attack on Ha-Moon's Countermeasure of Randomized Signed Scalar Multiplication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INDOCRYPT ![In: Progress in Cryptology - INDOCRYPT 2003, 4th International Conference on Cryptology in India, New Delhi, India, December 8-10, 2003, Proceedings, pp. 334-348, 2003, Springer, 3-540-20609-4. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
Ha-Moons Countermeasure, Finite Markov Chain, Side Channel Attacks, DPA, Elliptic Curve Cryptosystem, SPA |
122 | Dong-Guk Han, Katsuyuki Okeya, Tae Hyun Kim 0003, Yoon Sung Hwang, Young-Ho Park 0001, Souhwan Jung |
Cryptanalysis of the Countermeasures Using Randomized Binary Signed Digits. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACNS ![In: Applied Cryptography and Network Security, Second International Conference, ACNS 2004, Yellow Mountain, China, June 8-11, 2004, Proceedings, pp. 398-413, 2004, Springer, 3-540-22217-0. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
BSD Representation, Ha-Moons Countermeasure, Ebeid-Hasans Countermeasure, Agagliates Countermeasure, Side Channel Attacks, DPA, Elliptic Curve Cryptosystem, SPA |
98 | Kouichi Itoh, Tetsuya Izu, Masahiko Takenaka |
A Practical Countermeasure against Address-Bit Differential Power Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHES ![In: Cryptographic Hardware and Embedded Systems - CHES 2003, 5th International Workshop, Cologne, Germany, September 8-10, 2003, Proceedings, pp. 382-396, 2003, Springer, 3-540-40833-9. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
address-bit DPA, RSA, ECC, Differential Power Analysis (DPA), exponentiation, countermeasure |
98 | Katsuyuki Okeya, Kouichi Sakurai |
A Second-Order DPA Attack Breaks a Window-Method Based Countermeasure against Side Channel Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 5th International Conference, ISC 2002 Sao Paulo, Brazil, September 30 - October 2, 2002, Proceedings, pp. 389-401, 2002, Springer, 3-540-44270-7. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
Higher-Order DPA Attack, Second-Order DPA Attack, Möller's Countermeasure, Side Channel Attacks, Differential Power Analysis, Elliptic Curve Cryptosystems |
87 | Katsuyuki Okeya, Kouichi Sakurai |
On Insecurity of the Side Channel Attack Countermeasure Using Addition-Subtraction Chains under Distinguishability between Addition and Doubling. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy, 7th Australian Conference, ACISP 2002, Melbourne, Australia, July 3-5, 2002, Proceedings, pp. 420-435, 2002, Springer, 3-540-43861-0. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
Randomized Addition-Subtraction Chains Countermeasure, SPA Attack, Side Channel Attacks, Elliptic Curve Cryptosystems, Timing Attack |
77 | Kouichi Itoh, Tetsuya Izu, Masahiko Takenaka |
Improving the Randomized Initial Point Countermeasure Against DPA. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACNS ![In: Applied Cryptography and Network Security, 4th International Conference, ACNS 2006, Singapore, June 6-9, 2006, Proceedings, pp. 459-469, 2006, 3-540-34703-8. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
RPA, ZVA, Smart card, DPA, Elliptic Curve Cryptosystems (ECC), countermeasure, RIP |
68 | Li-Chiou Chen, Kathleen M. Carley |
The impact of countermeasure propagation on the prevalence of computer viruses. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Syst. Man Cybern. Part B ![In: IEEE Trans. Syst. Man Cybern. Part B 34(2), pp. 823-833, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
66 | Toru Akishita, Masanobu Katagi, Yoshikazu Miyato, Asami Mizuno, Kyoji Shibutani |
A Practical DPA Countermeasure with BDD Architecture. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CARDIS ![In: Smart Card Research and Advanced Applications, 8th IFIP WG 8.8/11.2 International Conference, CARDIS 2008, London, UK, September 8-11, 2008. Proceedings, pp. 206-217, 2008, Springer, 978-3-540-85892-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
dual-rail pre-charge logic, DPA, Binary Decision Diagram, countermeasure |
66 | Yoshitaka Nagami, Daisuke Miyamoto, Hiroaki Hazeyama, Youki Kadobayashi |
An Independent Evaluation of Web Timing Attack and its Countermeasure. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the The Third International Conference on Availability, Reliability and Security, ARES 2008, March 4-7, 2008, Technical University of Catalonia, Barcelona , Spain, pp. 1319-1324, 2008, IEEE Computer Society, 978-0-7695-3102-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Web Timing Attack, Countermeasure, Web Application Security |
57 | Sung-Ming Yen, Seungjoo Kim, Seongan Lim, Sang-Jae Moon |
A Countermeasure against One Physical Cryptanalysis May Benefit Another Attack. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISC ![In: Information Security and Cryptology - ICISC 2001, 4th International Conference Seoul, Korea, December 6-7, 2001, Proceedings, pp. 414-427, 2001, Springer, 3-540-43319-8. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
Square-multiply exponentiation, Cryptography, Side channel attack, Exponentiation, Timing attack, Power analysis attack, Physical cryptanalysis, Hardware fault cryptanalysis |
56 | Kouichi Itoh, Masahiko Takenaka, Naoya Torii |
DPA Countermeasure Based on the "Masking Method". ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISC ![In: Information Security and Cryptology - ICISC 2001, 4th International Conference Seoul, Korea, December 6-7, 2001, Proceedings, pp. 440-456, 2001, Springer, 3-540-43319-8. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
masking method, DPA, countermeasure, Rijndael |
47 | Jean-Sébastien Coron, Ilya Kizhvatov |
Analysis of the split mask countermeasure for embedded systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WESS ![In: Proceedings of the 4th Workshop on Embedded Systems Security, WESS 2009, Grenoble, France, October 15, 2009, 2009, ACM, 978-1-60558-700-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
cryptanalysis, DPA, side channel analysis, countermeasures, masking |
47 | Thomas Plos |
Evaluation of the Detached Power Supply as Side-Channel Analysis Countermeasure for Passive UHF RFID Tags. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CT-RSA ![In: Topics in Cryptology - CT-RSA 2009, The Cryptographers' Track at the RSA Conference 2009, San Francisco, CA, USA, April 20-24, 2009. Proceedings, pp. 444-458, 2009, Springer, 978-3-642-00861-0. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Deta-ched Power Supply, Parasitic Backscatter, RFID, Differential Power Analysis, Side-Channel Analysis, UHF |
47 | Emmanuel Prouff, Robert P. McEvoy |
First-Order Side-Channel Attacks on the Permutation Tables Countermeasure. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHES ![In: Cryptographic Hardware and Embedded Systems - CHES 2009, 11th International Workshop, Lausanne, Switzerland, September 6-9, 2009, Proceedings, pp. 81-96, 2009, Springer, 978-3-642-04137-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Permutation Tables, MIA, Side-Channel Attacks, Masking, CPA |
47 | Masaaki Shirase, Tsuyoshi Takagi, Eiji Okamoto |
An Efficient Countermeasure against Side Channel Attacks for Pairing Computation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISPEC ![In: Information Security Practice and Experience, 4th International Conference, ISPEC 2008, Sydney, Australia, April 21-23, 2008, Proceedings, pp. 290-303, 2008, Springer, 978-3-540-79103-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
random value addition, side channel attacks, Tate pairing, ? T pairing |
47 | Pierre-Alain Fouque, Denis Réal, Frédéric Valette, M'hamed Drissi |
The Carry Leakage on the Randomized Exponent Countermeasure. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHES ![In: Cryptographic Hardware and Embedded Systems - CHES 2008, 10th International Workshop, Washington, D.C., USA, August 10-13, 2008. Proceedings, pp. 198-213, 2008, Springer, 978-3-540-85052-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
47 | JaeCheol Ha, JeaHoon Park, Sang-Jae Moon, Sung-Ming Yen |
Provably Secure Countermeasure Resistant to Several Types of Power Attack for ECC. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISA ![In: Information Security Applications, 8th International Workshop, WISA 2007, Jeju Island, Korea, August 27-29, 2007, Revised Selected Papers, pp. 333-344, 2007, Springer, 978-3-540-77534-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Smart card, ECC, Side channel attack, Power analysis attack |
47 | Catherine H. Gebotys |
A table masking countermeasure for low-energy secure embedded systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Very Large Scale Integr. Syst. ![In: IEEE Trans. Very Large Scale Integr. Syst. 14(7), pp. 740-753, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
47 | Tae-Jun Park, Mun-Kyu Lee, Dowon Hong, Kyoil Chung |
A DPA Countermeasure by Randomized Frobenius Decomposition. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISA ![In: Information Security Applications, 6th International Workshop, WISA 2005, Jeju Island, Korea, August 22-24, 2005, Revised Selected Papers, pp. 271-282, 2005, Springer, 3-540-31012-6. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
47 | Katsuyuki Okeya, Tsuyoshi Takagi, Camille Vuillaume |
On the Exact Flexibility of the Flexible Countermeasure Against Side Channel Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy: 9th Australasian Conference, ACISP 2004, Sydney, Australia, July 13-15, 2004. Proceedings, pp. 466-477, 2004, Springer, 3-540-22379-7. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
Fractional Window, Side Channel Attacks, Flexibility, Elliptic Curve Cryptosystems, Smartcard, Discrete Logarithm Problem |
45 | Yudistira Asnar, Paolo Giorgini |
Modelling Risk and Identifying Countermeasure in Organizations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRITIS ![In: Critical Information Infrastructures Security, First International Workshop, CRITIS 2006, Samos, Greece, August 31 - September 1, 2006, Revised Papers, pp. 55-66, 2006, Springer, 3-540-69083-2. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
countermeasure identification, risk analysis, goal modelling |
42 | Jean-Sébastien Coron, Christophe Giraud 0001, Emmanuel Prouff, Matthieu Rivain |
Attack and Improvement of a Secure S-Box Calculation Based on the Fourier Transform. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHES ![In: Cryptographic Hardware and Embedded Systems - CHES 2008, 10th International Workshop, Washington, D.C., USA, August 10-13, 2008. Proceedings, pp. 1-14, 2008, Springer, 978-3-540-85052-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
42 | Hideyo Mamiya, Atsuko Miyaji, Hiroaki Morimoto |
Efficient Countermeasures against RPA, DPA, and SPA. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHES ![In: Cryptographic Hardware and Embedded Systems - CHES 2004: 6th International Workshop Cambridge, MA, USA, August 11-13, 2004. Proceedings, pp. 343-356, 2004, Springer, 3-540-22666-4. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
Elliptic curve exponentiation, ZPA, RPA, DPA, SPA |
42 | Sung-Ming Yen, Sang-Jae Moon, JaeCheol Ha |
Hardware Fault Attackon RSA with CRT Revisited. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISC ![In: Information Security and Cryptology - ICISC 2002, 5th International Conference Seoul, Korea, November 28-29, 2002, Revised Papers, pp. 374-388, 2002, Springer, 3-540-00716-4. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
Computational fault, Memory access fault, Cryptography, Side channel attack, Factorization, Chinese remainder theorem (CRT), Transient fault, Permanent fault, Physical cryptanalysis, Hardware fault cryptanalysis |
41 | David Vigilant |
RSA with CRT: A New Cost-Effective Solution to Thwart Fault Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHES ![In: Cryptographic Hardware and Embedded Systems - CHES 2008, 10th International Workshop, Washington, D.C., USA, August 10-13, 2008. Proceedings, pp. 130-145, 2008, Springer, 978-3-540-85052-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Software countermeasure, RSA, Chinese Remainder Theorem, Fault attacks, Modular exponentiation, Bellcore attack |
41 | Tai-Hoon Kim, Sun-myoung Hwang |
Intelligent Method for Building Security Countermeasures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
KES (2) ![In: Knowledge-Based Intelligent Information and Engineering Systems, 10th International Conference, KES 2006, Bournemouth, UK, October 9-11, 2006, Proceedings, Part II, pp. 745-750, 2006, Springer, 3-540-46537-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Security countermeasure, security hole, security engineering |
41 | Katsuyuki Okeya, Tsuyoshi Takagi, Camille Vuillaume |
Efficient Representations on Koblitz Curves with Resistance to Side Channel Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy, 10th Australasian Conference, ACISP 2005, Brisbane, Australia, July 4-6, 2005, Proceedings, pp. 218-229, 2005, Springer, 3-540-26547-3. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
SPA countermeasure, side channel attacks, elliptic curve cryptosystems, smartcard, Koblitz curves |
41 | Dong-Guk Han, Nam Su Chang, Seok Won Jung, Young-Ho Park 0001, Chang Han Kim, Heuisu Ryu |
Cryptanalysis of the Full Version Randomized Addition-Subtraction Chains. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy, 8th Australasian Conference, ACISP 2003, Wollongong, Australia, July 9-11, 2003, Proceedings, pp. 67-78, 2003, Springer, 3-540-40515-1. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
SPA attack, Randomized addition-subtraction chains countermeasure, Side-channel attack, Elliptic curve cryptosystems |
41 | John V. A. Janeri, Daylan B. Darby, Daniel D. Schnackenberg |
Building higher resolution synthetic clocks for signaling in covert timing channels. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSFW ![In: The Eighth IEEE Computer Security Foundations Workshop (CSFW '95), March 13-15, 1995, Kenmare, County Kerry, Ireland, pp. 85-, 1995, IEEE Computer Society, 0-8186-7033-9. The full citation details ...](Pics/full.jpeg) |
1995 |
DBLP DOI BibTeX RDF |
higher resolution synthetic clocks, timing channel countermeasure, Boeing multilevel secure local area network, secure network server, internal timing channels, time reference clock granularity, fine-grained signaling clock, timing channel throughput, timing channel capacities, local area networks, security of data, worst-case analysis, covert timing channels |
36 | Majid Khabbazian, Hugues Mercier, Vijay K. Bhargava |
Severity analysis and countermeasure for the wormhole attack in wireless ad hoc networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Wirel. Commun. ![In: IEEE Trans. Wirel. Commun. 8(2), pp. 736-745, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
36 | Marc Joye |
On the Security of a Unified Countermeasure. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FDTC ![In: Fifth International Workshop on Fault Diagnosis and Tolerance in Cryptography, 2008, FDTC 2008, Washington, DC, USA, 10 August 2008, pp. 87-91, 2008, IEEE Computer Society, 978-0-7695-3314-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
36 | Jean-Sébastien Coron |
A New DPA Countermeasure Based on Permutation Tables. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCN ![In: Security and Cryptography for Networks, 6th International Conference, SCN 2008, Amalfi, Italy, September 10-12, 2008. Proceedings, pp. 278-292, 2008, Springer, 978-3-540-85854-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
36 | Sun-Myung Hwang |
Intelligent Methods and Procedures of Countermeasure Design. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MUE ![In: 2007 International Conference on Multimedia and Ubiquitous Engineering (MUE 2007), 26-28 April 2007, Seoul, Korea, pp. 1168-1171, 2007, IEEE Computer Society, 978-0-7695-2777-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
36 | Karthik Baddam, Mark Zwolinski |
Evaluation of Dynamic Voltage and Frequency Scaling as a Differential Power Analysis Countermeasure. ![Search on Bibsonomy](Pics/bibsonomy.png) |
VLSI Design ![In: 20th International Conference on VLSI Design (VLSI Design 2007), Sixth International Conference on Embedded Systems (ICES 2007), 6-10 January 2007, Bangalore, India, pp. 854-862, 2007, IEEE Computer Society, 0-7695-2762-0. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
36 | Catherine H. Gebotys |
A split-mask countermeasure for low-energy secure embedded systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Embed. Comput. Syst. ![In: ACM Trans. Embed. Comput. Syst. 5(3), pp. 577-612, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
EM analysis, Side channel analysis, countermeasures, power attacks |
36 | ChangKyun Kim, JaeCheol Ha, Sang-Jae Moon, Sung-Ming Yen, Sung-Hyun Kim |
A CRT-Based RSA Countermeasure Against Physical Cryptanalysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HPCC ![In: High Performance Computing and Communications, First International Conference, HPCC 2005, Sorrento, Italy, September 21-23, 2005, Proceedings, pp. 549-554, 2005, Springer, 3-540-29031-1. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
36 | Dong-Guk Han, Tsuyoshi Takagi, Tae Hyun Kim 0003, Howon Kim 0001, Kyoil Chung |
Collision Attack on XTR and a Countermeasure with a Fixed Pattern. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUC Workshops ![In: Embedded and Ubiquitous Computing - EUC 2005 Workshops, EUC 2005 Workshops: UISW, NCUS, SecUbiq, USN, and TAUES, Nagasaki, Japan, December 6-9, 2005, Proceedings, pp. 864-873, 2005, Springer, 3-540-30803-2. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
XTR public key system, XTR Exponentiation Algorithms, Ubiquitous computer, Side Channel Attacks, Collision Attack |
36 | Catherine H. Gebotys, C. C. Tiu, X. Chen |
A Countermeasure for EM Attack of a Wireless PDA. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ITCC (1) ![In: International Symposium on Information Technology: Coding and Computing (ITCC 2005), Volume 1, 4-6 April 2005, Las Vegas, Nevada, USA, pp. 544-549, 2005, IEEE Computer Society, 0-7695-2315-3. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
36 | Girish B. Ratanpal, Ronald D. Williams, Travis N. Blalock |
An On-Chip Signal Suppression Countermeasure to Power Analysis Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Dependable Secur. Comput. ![In: IEEE Trans. Dependable Secur. Comput. 1(3), pp. 179-189, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
VLSI, smartcards, DES, security and protection, Power analysis attacks, code breaking |
36 | Marco Bucci, Michele Guglielmo, Raimondo Luzzi, Alessandro Trifiletti |
A Power Consumption Randomization Countermeasure for DPA-Resistant Cryptographic Processors. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PATMOS ![In: Integrated Circuit and System Design, Power and Timing Modeling, Optimization and Simulation; 14th International Workshop, PATMOS 2004, Santorini, Greece, September 15-17, 2004, Proceedings, pp. 481-490, 2004, Springer, 3-540-23095-5. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
chipcards, cryptography, Differential power analysis, DPA, power analysis, countermeasures |
36 | MahnKi Ahn, JaeCheol Ha, Hoon-Jae Lee 0001, Sang-Jae Moon |
A Random M-ary Method Based Countermeasure against Side Channel Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSA (2) ![In: Computational Science and Its Applications - ICCSA 2003, International Conference, Montreal, Canada, May 18-21, 2003, Proceedings, Part II, pp. 338-347, 2003, Springer, 3-540-40161-X. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
Random m-ary Recoding Algorithm, Side Channel Attacks, DPA, Elliptic Curve Cryptosystems, SPA, Power Analysis Attacks |
35 | Marcel Medwed, Jörn-Marc Schmidt |
A Continuous Fault Countermeasure for AES Providing a Constant Error Detection Rate. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FDTC ![In: 2010 Workshop on Fault Diagnosis and Tolerance in Cryptography, FDTC 2010, Santa Barbara, California, USA, 21 August 2010, pp. 66-71, 2010, IEEE Computer Society, 978-0-7695-4169-3. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
EAN+B codes, redundant table lookups, AES, Fault attacks, countermeasure |
32 | Nele Mentens, Benedikt Gierlichs, Ingrid Verbauwhede |
Power and Fault Analysis Resistance in Hardware through Dynamic Reconfiguration. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHES ![In: Cryptographic Hardware and Embedded Systems - CHES 2008, 10th International Workshop, Washington, D.C., USA, August 10-13, 2008. Proceedings, pp. 346-362, 2008, Springer, 978-3-540-85052-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
32 | HeeSeok Kim, Tae Hyun Kim 0003, Jeong Choon Ryoo, Dong-Guk Han, Howon Kim 0001, Jongin Lim 0001 |
Enhanced Doubling Attacks on Signed-All-Bits Set Recoding. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISTP ![In: Information Security Theory and Practices. Smart Cards, Mobile and Ubiquitous Computing Systems, First IFIP TC6 / WG 8.8 / WG 11.2 International Workshop, WISTP 2007, Heraklion, Crete, Greece, May 9-11, 2007, Proceedings, pp. 39-52, 2007, Springer, 978-3-540-72353-0. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
sABS recoding, SPA-based analysis, Doubling Attack, Side Channel Attacks, scalar multiplication |
32 | Byoung-Joon Min, Seung Hwan Yoo, Jongho Ryu, Dong Il Seo |
Return on Security Investment Against Cyber Attacks on Availability. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSA (2) ![In: Computational Science and Its Applications - ICCSA 2006, International Conference, Glasgow, UK, May 8-11, 2006, Proceedings, Part II, pp. 270-278, 2006, Springer, 3-540-34072-6. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
32 | Toru Akishita, Tsuyoshi Takagi |
On the Optimal Parameter Choice for Elliptic Curve Cryptosystems Using Isogeny. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public Key Cryptography - PKC 2004, 7th International Workshop on Theory and Practice in Public Key Cryptography, Singapore, March 1-4, 2004, pp. 346-359, 2004, Springer, 3-540-21018-0. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
zero-value point attack, side channel attack, elliptic curve cryptosystems, isomorphism, isogeny |
30 | Michael Tunstall |
Random Order m-ary Exponentiation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy, 14th Australasian Conference, ACISP 2009, Brisbane, Australia, July 1-3, 2009, Proceedings, pp. 437-451, 2009, Springer, 978-3-642-02619-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
random order countermeasure, side channel analysis, Exponentiation algorithms |
30 | Fabrizio Baiardi, S. Suin, Claudio Telmon, M. Pioli |
Assessing the Risk of an Information Infrastructure Through Security Dependencies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRITIS ![In: Critical Information Infrastructures Security, First International Workshop, CRITIS 2006, Samos, Greece, August 31 - September 1, 2006, Revised Papers, pp. 42-54, 2006, Springer, 3-540-69083-2. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
mitigation plan, ranking, risk assessment, vulnerability, countermeasure |
30 | ManKi Ahn, Hoon-Jae Lee 0001 |
Experiments and Hardware Countermeasures on Power Analysis Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSA (3) ![In: Computational Science and Its Applications - ICCSA 2006, International Conference, Glasgow, UK, May 8-11, 2006, Proceedings, Part III, pp. 48-53, 2006, Springer, 3-540-34075-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
SPA/DPA, Side Channel Attacks, Power Analysis, SmartCard, Countermeasure |
30 | Kai Schramm, Christof Paar |
Higher Order Masking of the AES. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CT-RSA ![In: Topics in Cryptology - CT-RSA 2006, The Cryptographers' Track at the RSA Conference 2006, San Jose, CA, USA, February 13-17, 2006, Proceedings, pp. 208-225, 2006, Springer, 3-540-31033-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Higher Order DPA, Masking Countermeasure, AES |
30 | Emmanuel Prouff, Christophe Giraud 0001, Sébastien Aumônier |
Provably Secure S-Box Implementation Based on Fourier Transform. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHES ![In: Cryptographic Hardware and Embedded Systems - CHES 2006, 8th International Workshop, Yokohama, Japan, October 10-13, 2006, Proceedings, pp. 216-230, 2006, Springer, 3-540-46559-6. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Provably Secure Countermeasure, Symmetric Cryptosystems, FOX, AES, Differential Power Analysis, Fourier Transform, S-Box |
30 | Hua Yu, Dan Dou |
E-commerce application in the electric utility industry of China. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICEC ![In: Proceedings of the 7th International Conference on Electronic Commerce, ICEC 2005, Xi'an, China, August 15-17, 2005, pp. 824-826, 2005, ACM, 1-59593-112-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
advantage countermeasure, electric utility industry, e-commerce |
30 | Eric Peeters, François-Xavier Standaert, Nicolas Donckers, Jean-Jacques Quisquater |
Improved Higher-Order Side-Channel Attacks with FPGA Experiments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHES ![In: Cryptographic Hardware and Embedded Systems - CHES 2005, 7th International Workshop, Edinburgh, UK, August 29 - September 1, 2005, Proceedings, pp. 309-323, 2005, Springer, 3-540-28474-5. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
cryptographic devices, high-order power analysis, masking countermeasure, FPGA, block cipher, DPA, side-channel analysis |
30 | Kris Tiri, David D. Hwang, Alireza Hodjat, Bo-Cheng Lai, Shenglin Yang, Patrick Schaumont, Ingrid Verbauwhede |
Prototype IC with WDDL and Differential Routing - DPA Resistance Assessment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHES ![In: Cryptographic Hardware and Embedded Systems - CHES 2005, 7th International Workshop, Edinburgh, UK, August 29 - September 1, 2005, Proceedings, pp. 354-365, 2005, Springer, 3-540-28474-5. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
dual rail with precharge, wave dynamic differential logic (WDDL), differential routing, parasitic capacitance matching, side-channel attack (SCA), differential power analysis (DPA), countermeasure |
30 | Kris Tiri, Ingrid Verbauwhede |
Simulation models for side-channel information leaks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DAC ![In: Proceedings of the 42nd Design Automation Conference, DAC 2005, San Diego, CA, USA, June 13-17, 2005, pp. 228-233, 2005, ACM, 1-59593-058-2. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
security IC, encryption, smart card, side-channel attack, differential power analysis, simulation model, countermeasure |
30 | Christophe Clavier, Jean-Sébastien Coron, Nora Dabbous |
Differential Power Analysis in the Presence of Hardware Countermeasures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHES ![In: Cryptographic Hardware and Embedded Systems - CHES 2000, Second International Workshop, Worcester, MA, USA, August 17-18, 2000, Proceedings, pp. 252-263, 2000, Springer, 3-540-41455-X. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
hardware countermeasure, random process interrupt, smart card, Power analysis |
30 | Paul Ammann, Sushil Jajodia, Catherine D. McCollum, Barbara T. Blaustein |
Surviving information warfare attacks on databases. ![Search on Bibsonomy](Pics/bibsonomy.png) |
S&P ![In: 1997 IEEE Symposium on Security and Privacy, May 4-7, 1997, Oakland, CA, USA, pp. 164-174, 1997, IEEE Computer Society, 0-8186-7828-3. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
information warfare attack survival, fault tolerance approach, damaged data, partially repaired data, snapshot algorithm, damage markings, consistency preserving normal transactions, countermeasure transactions, databases, protocol, security of data, integrity constraints, data security, database consistency |
30 | Steffen Wendzel, Daniela Eller, Wojciech Mazurczyk |
One Countermeasure, Multiple Patterns: Countermeasure Variation for Covert Channels. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CECC ![In: Proceedings of the Central European Cybersecurity Conference 2018, CECC 2018, Ljubljana, Slovenia, November 15-16, 2018, pp. 1:1-1:6, 2018, ACM, 978-1-4503-6515-4. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
30 | Arpan Roy, Dong Seong Kim 0001, Kishor S. Trivedi |
Scalable optimal countermeasure selection using implicit enumeration on attack countermeasure trees. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DSN ![In: IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2012, Boston, MA, USA, June 25-28, 2012, pp. 1-12, 2012, IEEE Computer Society, 978-1-4673-1624-8. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
26 | Amir Moradi 0001, Mehrdad Khatir, Mahmoud Salmasizadeh, Mohammad T. Manzuri Shalmani |
Charge recovery logic as a side channel attack countermeasure. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISQED ![In: 10th International Symposium on Quality of Electronic Design (ISQED 2009), 16-18 March 2009, San Jose, CA, USA, pp. 686-691, 2009, IEEE Computer Society, 978-1-4244-2952-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
26 | Fan Zhang 0010, Zhijie Jerry Shi |
An Efficient Window-Based Countermeasure to Power Analysis of ECC Algorithms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ITNG ![In: Fifth International Conference on Information Technology: New Generations (ITNG 2008), 7-8 April 2008, Las Vegas, Nevada, USA, pp. 120-126, 2008, IEEE Computer Society, 978-0-7695-3099-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
26 | Marcel Medwed, Jörn-Marc Schmidt |
A Generic Fault Countermeasure Providing Data and Program Flow Integrity. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FDTC ![In: Fifth International Workshop on Fault Diagnosis and Tolerance in Cryptography, 2008, FDTC 2008, Washington, DC, USA, 10 August 2008, pp. 68-73, 2008, IEEE Computer Society, 978-0-7695-3314-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
26 | Alin Razafindraibe, Michel Robert, Philippe Maurine |
Analysis and Improvement of Dual Rail Logic as a Countermeasure Against DPA. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PATMOS ![In: Integrated Circuit and System Design. Power and Timing Modeling, Optimization and Simulation, 17th International Workshop, PATMOS 2007, Gothenburg, Sweden, September 3-5, 2007, Proceedings, pp. 340-351, 2007, Springer, 978-3-540-74441-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
26 | Alin Razafindraibe, Michel Robert, Philippe Maurine |
Improvement of dual rail logic as a countermeasure against DPA. ![Search on Bibsonomy](Pics/bibsonomy.png) |
VLSI-SoC ![In: IFIP VLSI-SoC 2007, IFIP WG 10.5 International Conference on Very Large Scale Integration of System-on-Chip, Atlanta, GA, USA, 15-17 October 2007, pp. 270-275, 2007, IEEE. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
26 | Stefano Bistarelli, Fabio Fioravanti, Pamela Peretti |
Using CP-nets as a guide for countermeasure selection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAC ![In: Proceedings of the 2007 ACM Symposium on Applied Computing (SAC), Seoul, Korea, March 11-15, 2007, pp. 300-304, 2007, ACM, 1-59593-480-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
26 | Sei Nagashima, Naofumi Homma, Yuichi Imai, Takafumi Aoki, Akashi Satoh |
DPA Using Phase-Based Waveform Matching against Random-Delay Countermeasure. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCAS ![In: International Symposium on Circuits and Systems (ISCAS 2007), 27-20 May 2007, New Orleans, Louisiana, USA, pp. 1807-1810, 2007, IEEE, 1-4244-0920-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
26 | Shin Yokoyama, Yoshikazu Nakane, Osamu Takahashi, Eiichi Miyamoto |
Evaluation of the Impact of Selfish Nodes in Ad Hoc Networks and Detection and Countermeasure Methods. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MDM ![In: 7th International Conference on Mobile Data Management (MDM 2006), Nara, Japan, May 9-13, 2006, pp. 95, 2006, IEEE Computer Society, 0-7695-2526-1. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
26 | Pasquale Corsonello, Stefania Perri, Martin Margala |
An integrated countermeasure against differential power analysis for secure smart-cards. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCAS ![In: International Symposium on Circuits and Systems (ISCAS 2006), 21-24 May 2006, Island of Kos, Greece, 2006, IEEE, 0-7803-9389-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
26 | Jakob Eriksson, Srikanth V. Krishnamurthy, Michalis Faloutsos |
TrueLink: A Practical Countermeasure to the Wormhole Attack in Wireless Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICNP ![In: Proceedings of the 14th IEEE International Conference on Network Protocols, ICNP 2006, November 12-15, 2006, Santa Barbara, California, USA, pp. 75-84, 2006, IEEE Computer Society, 1-4244-0593-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
26 | Zhaoyu Liu, Roopesh Uppala |
A Dynamic Countermeasure Method for Large-Scale Network Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DASC ![In: Second International Symposium on Dependable Autonomic and Secure Computing (DASC 2006), 29 September - 1 October 2006, Indianapolis, Indiana, USA, pp. 163-170, 2006, IEEE Computer Society, 0-7695-2539-3. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
26 | Issa M. Khalil, Saurabh Bagchi, Ness B. Shroff |
LITEWORP: A Lightweight Countermeasure for the Wormhole Attack in Multihop Wireless Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DSN ![In: 2005 International Conference on Dependable Systems and Networks (DSN 2005), 28 June - 1 July 2005, Yokohama, Japan, Proceedings, pp. 612-621, 2005, IEEE Computer Society, 0-7695-2282-3. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
26 | Yanyun Zhou, Maixiu Hu |
E-commerce ethics problem and countermeasure of China on the basis of systematic thinking. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICEC ![In: Proceedings of the 7th International Conference on Electronic Commerce, ICEC 2005, Xi'an, China, August 15-17, 2005, pp. 733-737, 2005, ACM, 1-59593-112-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
e-commerce (system), e-commerce ethics, the morals containing by oneself (conscientious) |
26 | P. Vinod 0002, Prabin Kumar Bora |
A New Inter-frame Collusion Attack and a Countermeasure. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWDW ![In: Digital Watermarking, 4th International Workshop, IWDW 2005, Siena, Italy, September 15-17, 2005, Proceedings, pp. 147-157, 2005, Springer, 3-540-28768-X. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
26 | Marco Bucci, Raimondo Luzzi, Michele Guglielmo, Alessandro Trifiletti |
A countermeasure against differential power analysis based on random delay insertion. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCAS (4) ![In: International Symposium on Circuits and Systems (ISCAS 2005), 23-26 May 2005, Kobe, Japan, pp. 3547-3550, 2005, IEEE, 0-7803-8834-8. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
26 | Guido Bertoni, Vittorio Zaccaria, Luca Breveglieri, Matteo Monchiero, Gianluca Palermo |
AES Power Attack Based on Induced Cache Miss and Countermeasure. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ITCC (1) ![In: International Symposium on Information Technology: Coding and Computing (ITCC 2005), Volume 1, 4-6 April 2005, Las Vegas, Nevada, USA, pp. 586-591, 2005, IEEE Computer Society, 0-7695-2315-3. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Cache, Block Cipher, AES, Power Analysis, Cache Miss |
26 | Michiharu Niimi, Hideki Noda, Bruce Segee |
A Study on Visual Attack to BPCS-Steganography and Countermeasure. ![Search on Bibsonomy](Pics/bibsonomy.png) |
VLBV ![In: Visual Content Processing and Representation, 9th International Workshop, VLBV 2005, Sardinia, Italy, September 15-16, 2005, Revised Selected Papers, pp. 29-36, 2005, Springer, 3-540-33578-1. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
26 | Michiharu Niimi, Tomohito Ei, Hideki Noda, Eiji Kawaguchi, Bruce Segee |
An attack to BPCS-steganography using complexity histogram and countermeasure. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICIP ![In: Proceedings of the 2004 International Conference on Image Processing, ICIP 2004, Singapore, October 24-27, 2004, pp. 733-736, 2004, IEEE, 0-7803-8554-3. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
26 | Jianhua Yang, Zhaohui Wu 0001, Siliang Tang, Xiaosheng Guo |
Virtual Battlefield Attack-Defense Countermeasure Simulation on the Grid. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GCC Workshops ![In: Grid and Cooperative Computing - GCC 2004 Workshops: GCC 2004 International Workshops, IGKG, SGT, GISS, AAC-GEVO, and VVS, Wuhan, China, October 21-24, 2004. Proceedings, pp. 164-172, 2004, Springer, 3-540-23578-7. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
26 | DongGook Park, JungJoon Kim, Colin Boyd, Ed Dawson |
Cryptographic Salt: A Countermeasure against Denial-of-Service Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy, 6th Australasian Conference, ACISP 2001, Sydney, Australia, July 11-13, 2001, Proceedings, pp. 334-343, 2001, Springer, 3-540-42300-1. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
26 | Elisabeth Oswald, Manfred Josef Aigner |
Randomized Addition-Subtraction Chains as a Countermeasure against Power Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHES ![In: Cryptographic Hardware and Embedded Systems - CHES 2001, Third International Workshop, Paris, France, May 14-16, 2001, Proceedings, pp. 39-50, 2001, Springer, 3-540-42521-7. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
Elliptic Curve Cryptosystems, Power Analysis |
21 | Kazuo Sakiyama, Tatsuya Yagi, Kazuo Ohta |
Fault Analysis Attack against an AES Prototype Chip Using RSL. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CT-RSA ![In: Topics in Cryptology - CT-RSA 2009, The Cryptographers' Track at the RSA Conference 2009, San Francisco, CA, USA, April 20-24, 2009. Proceedings, pp. 429-443, 2009, Springer, 978-3-642-00861-0. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Random Switching Logic, Clock-based Attack, AES, Fault Analysis |
21 | Jean-Sébastien Coron, Ilya Kizhvatov |
An Efficient Method for Random Delay Generation in Embedded Software. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHES ![In: Cryptographic Hardware and Embedded Systems - CHES 2009, 11th International Workshop, Lausanne, Switzerland, September 6-9, 2009, Proceedings, pp. 156-170, 2009, Springer, 978-3-642-04137-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
random delays, Side channel attacks, countermeasures |
21 | Stamatios V. Kartalopoulos |
Differentiating Data Security and Network Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICC ![In: Proceedings of IEEE International Conference on Communications, ICC 2008, Beijing, China, 19-23 May 2008, pp. 1469-1473, 2008, IEEE. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
21 | Felipe Ghellar, Marcelo Lubaszewski |
A novel AES cryptographic core highly resistant to differential power analysis attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SBCCI ![In: Proceedings of the 21st Annual Symposium on Integrated Circuits and Systems Design, SBCCI 2008, Gramado, Brazil, September 1-4, 2008, pp. 140-145, 2008, ACM, 978-1-60558-231-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
dpa, rijndael, isomorphisms, aes |
21 | Fernando C. Colón Osorio |
Using Byzantine Agreement in the Design Of IPS Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IPCCC ![In: Proceedings of the 26th IEEE International Performance Computing and Communications Conference, IPCCC 2007, April 11-13, 2007, New Orleans, Louisiana, USA, pp. 528-537, 2007, IEEE Computer Society, 1-4244-1138-6. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
21 | Chong Hee Kim, Jean-Jacques Quisquater |
How can we overcome both side channel analysis and fault attacks on RSA-CRT? ![Search on Bibsonomy](Pics/bibsonomy.png) |
FDTC ![In: Fourth International Workshop on Fault Diagnosis and Tolerance in Cryptography, 2007, FDTC 2007: Vienna, Austria, 10 September 2007, pp. 21-29, 2007, IEEE Computer Society, 0-7695-2982-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
21 | Young-Geun Choi, Jeonil Kang, DaeHun Nyang |
Proactive Code Verification Protocol in Wireless Sensor Network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSA (2) ![In: Computational Science and Its Applications - ICCSA 2007, International Conference, Kuala Lumpur, Malaysia, August 26-29, 2007. Proceedings, Part II, pp. 1085-1096, 2007, Springer, 978-3-540-74475-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
21 | Tae Hyun Kim 0003, Dong-Guk Han, Katsuyuki Okeya, Jongin Lim 0001 |
Generic Cryptanalysis of Combined Countermeasures with Randomized BSD Representations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CARDIS ![In: Smart Card Research and Advanced Applications, 7th IFIP WG 8.8/11.2 International Conference, CARDIS 2006, Tarragona, Spain, April 19-21, 2006, Proceedings, pp. 119-134, 2006, Springer, 3-540-33311-8. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
21 | Camille Vuillaume, Katsuyuki Okeya |
Flexible Exponentiation with Resistance to Side Channel Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACNS ![In: Applied Cryptography and Network Security, 4th International Conference, ACNS 2006, Singapore, June 6-9, 2006, Proceedings, pp. 268-283, 2006, 3-540-34703-8. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
fractional width, RSA, side channel attacks, simple power analysis |
21 | Yongjin Kim, Ahmed Helmy |
Attacker traceback with cross-layer monitoring in wireless multi-hop networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SASN ![In: Proceedings of the 4th ACM Workshop on Security of ad hoc and Sensor Networks, SASN 2006, Alexandria, VA, USA, October 30, 2006, pp. 123-134, 2006, ACM, 1-59593-554-1. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
DoS/DDoS attack, attacker traceback, cross-layer monitoring, wireless multi-hop networks |
21 | Yves Younan, Davide Pozza, Frank Piessens, Wouter Joosen |
Extended Protection against Stack Smashing Attacks without Performance Loss. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 22nd Annual Computer Security Applications Conference (ACSAC 2006), 11-15 December 2006, Miami Beach, Florida, USA, pp. 429-438, 2006, IEEE Computer Society, 0-7695-2716-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
21 | Randy Smith, Cristian Estan, Somesh Jha |
Backtracking Algorithmic Complexity Attacks against a NIDS. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 22nd Annual Computer Security Applications Conference (ACSAC 2006), 11-15 December 2006, Miami Beach, Florida, USA, pp. 89-98, 2006, IEEE Computer Society, 0-7695-2716-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
21 | G. Fraidy Bouesse, Marc Renaudin, Gilles Sicard |
Improving DPA Resistance of Quasi Delay Insensitive Circuits Using Randomly Time-shifted Acknowledgment Signals. ![Search on Bibsonomy](Pics/bibsonomy.png) |
VLSI-SoC ![In: VLSI-SoC: From Systems To Silicon, Proceedings of IFIP TC 10, WG 10.5, Thirteenth International Conference on Very Large Scale Integration of System on Chip (VLSI-SoC 2005), October 17-19, 2005, Perth, Australia, pp. 11-24, 2005, Springer, 978-0-387-73660-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
21 | Sung-Ming Yen, Wei-Chih Lien, Sang-Jae Moon, JaeCheol Ha |
Power Analysis by Exploiting Chosen Message and Internal Collisions - Vulnerability of Checking Mechanism for RSA-Decryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Mycrypt ![In: Progress in Cryptology - Mycrypt 2005, First International Conference on Cryptology in Malaysia, Kuala Lumpur, Malaysia, September 28-30, 2005, Proceedings, pp. 183-195, 2005, Springer, 3-540-28938-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Cryptography, Smart card, Side-channel attack, Simple power analysis (SPA), Chosen-message attack |
21 | Régis Bevan |
Improved Zero Value Attack on XTR. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy, 10th Australasian Conference, ACISP 2005, Brisbane, Australia, July 4-6, 2005, Proceedings, pp. 207-217, 2005, Springer, 3-540-26547-3. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
MRPA, smart cards, Power Analysis, DFA, XTR |
21 | Jong Hoon Shin, Dong Jin Park, Pil Joong Lee |
DPA Attack on the Improved Ha-Moon Algorithm. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISA ![In: Information Security Applications, 6th International Workshop, WISA 2005, Jeju Island, Korea, August 22-24, 2005, Revised Selected Papers, pp. 283-291, 2005, Springer, 3-540-31012-6. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Ha-Moon algorithm, randomized exponentiation algorithm, side-channel attack |
21 | Sung-Ming Yen, Lee-Chun Ko, Sang-Jae Moon, JaeCheol Ha |
Relative Doubling Attack Against Montgomery Ladder. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISC ![In: Information Security and Cryptology - ICISC 2005, 8th International Conference, Seoul, Korea, December 1-2, 2005, Revised Selected Papers, pp. 117-128, 2005, Springer, 3-540-33354-1. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Doubling attack, Cryptography, Smart card, Side-channel attack, Scalar multiplication, Exponentiation, Simple power analysis (SPA), Chosen-message attack |
21 | Mustapha Hedabou, Pierre Pinel, Lucien Bénéteau |
Countermeasures for Preventing Comb Method Against SCA Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISPEC ![In: Information Security Practice and Experience, First International Conference, ISPEC 2005, Singapore, April 11-14, 2005, Proceedings, pp. 85-96, 2005, Springer, 3-540-25584-2. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
comb method, pre-computed table, memory space, side channel attacks, Elliptic curve, scalar multiplication |
21 | SangCheol Hwang, Namhoon Lee, Kouichi Sakurai, Joong Gil Park, Jaecheol Ryou 0001 |
The Improved Risk Analysis Mechanism in the Practical Risk Analysis System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICOIN ![In: Information Networking, Convergence in Broadband and Mobile Networking, International Conference, ICOIN 2005, Jeju Island, Korea, January 31- February 2, 2005, Proceedings, pp. 835-842, 2005, Springer, 3-540-24467-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
praha, risk management, risk analysis |
21 | David A. Wagner 0001 |
Cryptanalysis of a provably secure CRT-RSA algorithm. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 11th ACM Conference on Computer and Communications Security, CCS 2004, Washington, DC, USA, October 25-29, 2004, pp. 92-97, 2004, ACM, 1-58113-961-6. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
cryptanalysis, RSA, chinese remainder theorem, fault attacks |
Displaying result #1 - #100 of 1140 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ >>] |
|