The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for countermeasure with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1989-2000 (15) 2001-2002 (25) 2003 (20) 2004 (35) 2005 (65) 2006 (64) 2007 (47) 2008 (70) 2009 (50) 2010 (28) 2011 (27) 2012 (43) 2013 (37) 2014 (34) 2015 (47) 2016 (40) 2017 (60) 2018 (54) 2019 (73) 2020 (83) 2021 (77) 2022 (75) 2023 (62) 2024 (9)
Publication types (Num. hits)
article(395) book(1) incollection(4) inproceedings(735) phdthesis(5)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 472 occurrences of 223 keywords

Results
Found 1140 publication records. Showing 1140 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
130Katsuyuki Okeya, Dong-Guk Han Side Channel Attack on Ha-Moon's Countermeasure of Randomized Signed Scalar Multiplication. Search on Bibsonomy INDOCRYPT The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Ha-Moons Countermeasure, Finite Markov Chain, Side Channel Attacks, DPA, Elliptic Curve Cryptosystem, SPA
122Dong-Guk Han, Katsuyuki Okeya, Tae Hyun Kim 0003, Yoon Sung Hwang, Young-Ho Park 0001, Souhwan Jung Cryptanalysis of the Countermeasures Using Randomized Binary Signed Digits. Search on Bibsonomy ACNS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF BSD Representation, Ha-Moons Countermeasure, Ebeid-Hasans Countermeasure, Agagliates Countermeasure, Side Channel Attacks, DPA, Elliptic Curve Cryptosystem, SPA
98Kouichi Itoh, Tetsuya Izu, Masahiko Takenaka A Practical Countermeasure against Address-Bit Differential Power Analysis. Search on Bibsonomy CHES The full citation details ... 2003 DBLP  DOI  BibTeX  RDF address-bit DPA, RSA, ECC, Differential Power Analysis (DPA), exponentiation, countermeasure
98Katsuyuki Okeya, Kouichi Sakurai A Second-Order DPA Attack Breaks a Window-Method Based Countermeasure against Side Channel Attacks. Search on Bibsonomy ISC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Higher-Order DPA Attack, Second-Order DPA Attack, Möller's Countermeasure, Side Channel Attacks, Differential Power Analysis, Elliptic Curve Cryptosystems
87Katsuyuki Okeya, Kouichi Sakurai On Insecurity of the Side Channel Attack Countermeasure Using Addition-Subtraction Chains under Distinguishability between Addition and Doubling. Search on Bibsonomy ACISP The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Randomized Addition-Subtraction Chains Countermeasure, SPA Attack, Side Channel Attacks, Elliptic Curve Cryptosystems, Timing Attack
77Kouichi Itoh, Tetsuya Izu, Masahiko Takenaka Improving the Randomized Initial Point Countermeasure Against DPA. Search on Bibsonomy ACNS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF RPA, ZVA, Smart card, DPA, Elliptic Curve Cryptosystems (ECC), countermeasure, RIP
68Li-Chiou Chen, Kathleen M. Carley The impact of countermeasure propagation on the prevalence of computer viruses. Search on Bibsonomy IEEE Trans. Syst. Man Cybern. Part B The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
66Toru Akishita, Masanobu Katagi, Yoshikazu Miyato, Asami Mizuno, Kyoji Shibutani A Practical DPA Countermeasure with BDD Architecture. Search on Bibsonomy CARDIS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF dual-rail pre-charge logic, DPA, Binary Decision Diagram, countermeasure
66Yoshitaka Nagami, Daisuke Miyamoto, Hiroaki Hazeyama, Youki Kadobayashi An Independent Evaluation of Web Timing Attack and its Countermeasure. Search on Bibsonomy ARES The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Web Timing Attack, Countermeasure, Web Application Security
57Sung-Ming Yen, Seungjoo Kim, Seongan Lim, Sang-Jae Moon A Countermeasure against One Physical Cryptanalysis May Benefit Another Attack. Search on Bibsonomy ICISC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF Square-multiply exponentiation, Cryptography, Side channel attack, Exponentiation, Timing attack, Power analysis attack, Physical cryptanalysis, Hardware fault cryptanalysis
56Kouichi Itoh, Masahiko Takenaka, Naoya Torii DPA Countermeasure Based on the "Masking Method". Search on Bibsonomy ICISC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF masking method, DPA, countermeasure, Rijndael
47Jean-Sébastien Coron, Ilya Kizhvatov Analysis of the split mask countermeasure for embedded systems. Search on Bibsonomy WESS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF cryptanalysis, DPA, side channel analysis, countermeasures, masking
47Thomas Plos Evaluation of the Detached Power Supply as Side-Channel Analysis Countermeasure for Passive UHF RFID Tags. Search on Bibsonomy CT-RSA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Deta-ched Power Supply, Parasitic Backscatter, RFID, Differential Power Analysis, Side-Channel Analysis, UHF
47Emmanuel Prouff, Robert P. McEvoy First-Order Side-Channel Attacks on the Permutation Tables Countermeasure. Search on Bibsonomy CHES The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Permutation Tables, MIA, Side-Channel Attacks, Masking, CPA
47Masaaki Shirase, Tsuyoshi Takagi, Eiji Okamoto An Efficient Countermeasure against Side Channel Attacks for Pairing Computation. Search on Bibsonomy ISPEC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF random value addition, side channel attacks, Tate pairing, ? T pairing
47Pierre-Alain Fouque, Denis Réal, Frédéric Valette, M'hamed Drissi The Carry Leakage on the Randomized Exponent Countermeasure. Search on Bibsonomy CHES The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
47JaeCheol Ha, JeaHoon Park, Sang-Jae Moon, Sung-Ming Yen Provably Secure Countermeasure Resistant to Several Types of Power Attack for ECC. Search on Bibsonomy WISA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Smart card, ECC, Side channel attack, Power analysis attack
47Catherine H. Gebotys A table masking countermeasure for low-energy secure embedded systems. Search on Bibsonomy IEEE Trans. Very Large Scale Integr. Syst. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
47Tae-Jun Park, Mun-Kyu Lee, Dowon Hong, Kyoil Chung A DPA Countermeasure by Randomized Frobenius Decomposition. Search on Bibsonomy WISA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
47Katsuyuki Okeya, Tsuyoshi Takagi, Camille Vuillaume On the Exact Flexibility of the Flexible Countermeasure Against Side Channel Attacks. Search on Bibsonomy ACISP The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Fractional Window, Side Channel Attacks, Flexibility, Elliptic Curve Cryptosystems, Smartcard, Discrete Logarithm Problem
45Yudistira Asnar, Paolo Giorgini Modelling Risk and Identifying Countermeasure in Organizations. Search on Bibsonomy CRITIS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF countermeasure identification, risk analysis, goal modelling
42Jean-Sébastien Coron, Christophe Giraud 0001, Emmanuel Prouff, Matthieu Rivain Attack and Improvement of a Secure S-Box Calculation Based on the Fourier Transform. Search on Bibsonomy CHES The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
42Hideyo Mamiya, Atsuko Miyaji, Hiroaki Morimoto Efficient Countermeasures against RPA, DPA, and SPA. Search on Bibsonomy CHES The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Elliptic curve exponentiation, ZPA, RPA, DPA, SPA
42Sung-Ming Yen, Sang-Jae Moon, JaeCheol Ha Hardware Fault Attackon RSA with CRT Revisited. Search on Bibsonomy ICISC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Computational fault, Memory access fault, Cryptography, Side channel attack, Factorization, Chinese remainder theorem (CRT), Transient fault, Permanent fault, Physical cryptanalysis, Hardware fault cryptanalysis
41David Vigilant RSA with CRT: A New Cost-Effective Solution to Thwart Fault Attacks. Search on Bibsonomy CHES The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Software countermeasure, RSA, Chinese Remainder Theorem, Fault attacks, Modular exponentiation, Bellcore attack
41Tai-Hoon Kim, Sun-myoung Hwang Intelligent Method for Building Security Countermeasures. Search on Bibsonomy KES (2) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Security countermeasure, security hole, security engineering
41Katsuyuki Okeya, Tsuyoshi Takagi, Camille Vuillaume Efficient Representations on Koblitz Curves with Resistance to Side Channel Attacks. Search on Bibsonomy ACISP The full citation details ... 2005 DBLP  DOI  BibTeX  RDF SPA countermeasure, side channel attacks, elliptic curve cryptosystems, smartcard, Koblitz curves
41Dong-Guk Han, Nam Su Chang, Seok Won Jung, Young-Ho Park 0001, Chang Han Kim, Heuisu Ryu Cryptanalysis of the Full Version Randomized Addition-Subtraction Chains. Search on Bibsonomy ACISP The full citation details ... 2003 DBLP  DOI  BibTeX  RDF SPA attack, Randomized addition-subtraction chains countermeasure, Side-channel attack, Elliptic curve cryptosystems
41John V. A. Janeri, Daylan B. Darby, Daniel D. Schnackenberg Building higher resolution synthetic clocks for signaling in covert timing channels. Search on Bibsonomy CSFW The full citation details ... 1995 DBLP  DOI  BibTeX  RDF higher resolution synthetic clocks, timing channel countermeasure, Boeing multilevel secure local area network, secure network server, internal timing channels, time reference clock granularity, fine-grained signaling clock, timing channel throughput, timing channel capacities, local area networks, security of data, worst-case analysis, covert timing channels
36Majid Khabbazian, Hugues Mercier, Vijay K. Bhargava Severity analysis and countermeasure for the wormhole attack in wireless ad hoc networks. Search on Bibsonomy IEEE Trans. Wirel. Commun. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
36Marc Joye On the Security of a Unified Countermeasure. Search on Bibsonomy FDTC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
36Jean-Sébastien Coron A New DPA Countermeasure Based on Permutation Tables. Search on Bibsonomy SCN The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
36Sun-Myung Hwang Intelligent Methods and Procedures of Countermeasure Design. Search on Bibsonomy MUE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
36Karthik Baddam, Mark Zwolinski Evaluation of Dynamic Voltage and Frequency Scaling as a Differential Power Analysis Countermeasure. Search on Bibsonomy VLSI Design The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
36Catherine H. Gebotys A split-mask countermeasure for low-energy secure embedded systems. Search on Bibsonomy ACM Trans. Embed. Comput. Syst. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF EM analysis, Side channel analysis, countermeasures, power attacks
36ChangKyun Kim, JaeCheol Ha, Sang-Jae Moon, Sung-Ming Yen, Sung-Hyun Kim A CRT-Based RSA Countermeasure Against Physical Cryptanalysis. Search on Bibsonomy HPCC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
36Dong-Guk Han, Tsuyoshi Takagi, Tae Hyun Kim 0003, Howon Kim 0001, Kyoil Chung Collision Attack on XTR and a Countermeasure with a Fixed Pattern. Search on Bibsonomy EUC Workshops The full citation details ... 2005 DBLP  DOI  BibTeX  RDF XTR public key system, XTR Exponentiation Algorithms, Ubiquitous computer, Side Channel Attacks, Collision Attack
36Catherine H. Gebotys, C. C. Tiu, X. Chen A Countermeasure for EM Attack of a Wireless PDA. Search on Bibsonomy ITCC (1) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
36Girish B. Ratanpal, Ronald D. Williams, Travis N. Blalock An On-Chip Signal Suppression Countermeasure to Power Analysis Attacks. Search on Bibsonomy IEEE Trans. Dependable Secur. Comput. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF VLSI, smartcards, DES, security and protection, Power analysis attacks, code breaking
36Marco Bucci, Michele Guglielmo, Raimondo Luzzi, Alessandro Trifiletti A Power Consumption Randomization Countermeasure for DPA-Resistant Cryptographic Processors. Search on Bibsonomy PATMOS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF chipcards, cryptography, Differential power analysis, DPA, power analysis, countermeasures
36MahnKi Ahn, JaeCheol Ha, Hoon-Jae Lee 0001, Sang-Jae Moon A Random M-ary Method Based Countermeasure against Side Channel Attacks. Search on Bibsonomy ICCSA (2) The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Random m-ary Recoding Algorithm, Side Channel Attacks, DPA, Elliptic Curve Cryptosystems, SPA, Power Analysis Attacks
35Marcel Medwed, Jörn-Marc Schmidt A Continuous Fault Countermeasure for AES Providing a Constant Error Detection Rate. Search on Bibsonomy FDTC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF EAN+B codes, redundant table lookups, AES, Fault attacks, countermeasure
32Nele Mentens, Benedikt Gierlichs, Ingrid Verbauwhede Power and Fault Analysis Resistance in Hardware through Dynamic Reconfiguration. Search on Bibsonomy CHES The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
32HeeSeok Kim, Tae Hyun Kim 0003, Jeong Choon Ryoo, Dong-Guk Han, Howon Kim 0001, Jongin Lim 0001 Enhanced Doubling Attacks on Signed-All-Bits Set Recoding. Search on Bibsonomy WISTP The full citation details ... 2007 DBLP  DOI  BibTeX  RDF sABS recoding, SPA-based analysis, Doubling Attack, Side Channel Attacks, scalar multiplication
32Byoung-Joon Min, Seung Hwan Yoo, Jongho Ryu, Dong Il Seo Return on Security Investment Against Cyber Attacks on Availability. Search on Bibsonomy ICCSA (2) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
32Toru Akishita, Tsuyoshi Takagi On the Optimal Parameter Choice for Elliptic Curve Cryptosystems Using Isogeny. Search on Bibsonomy Public Key Cryptography The full citation details ... 2004 DBLP  DOI  BibTeX  RDF zero-value point attack, side channel attack, elliptic curve cryptosystems, isomorphism, isogeny
30Michael Tunstall Random Order m-ary Exponentiation. Search on Bibsonomy ACISP The full citation details ... 2009 DBLP  DOI  BibTeX  RDF random order countermeasure, side channel analysis, Exponentiation algorithms
30Fabrizio Baiardi, S. Suin, Claudio Telmon, M. Pioli Assessing the Risk of an Information Infrastructure Through Security Dependencies. Search on Bibsonomy CRITIS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF mitigation plan, ranking, risk assessment, vulnerability, countermeasure
30ManKi Ahn, Hoon-Jae Lee 0001 Experiments and Hardware Countermeasures on Power Analysis Attacks. Search on Bibsonomy ICCSA (3) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF SPA/DPA, Side Channel Attacks, Power Analysis, SmartCard, Countermeasure
30Kai Schramm, Christof Paar Higher Order Masking of the AES. Search on Bibsonomy CT-RSA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Higher Order DPA, Masking Countermeasure, AES
30Emmanuel Prouff, Christophe Giraud 0001, Sébastien Aumônier Provably Secure S-Box Implementation Based on Fourier Transform. Search on Bibsonomy CHES The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Provably Secure Countermeasure, Symmetric Cryptosystems, FOX, AES, Differential Power Analysis, Fourier Transform, S-Box
30Hua Yu, Dan Dou E-commerce application in the electric utility industry of China. Search on Bibsonomy ICEC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF advantage countermeasure, electric utility industry, e-commerce
30Eric Peeters, François-Xavier Standaert, Nicolas Donckers, Jean-Jacques Quisquater Improved Higher-Order Side-Channel Attacks with FPGA Experiments. Search on Bibsonomy CHES The full citation details ... 2005 DBLP  DOI  BibTeX  RDF cryptographic devices, high-order power analysis, masking countermeasure, FPGA, block cipher, DPA, side-channel analysis
30Kris Tiri, David D. Hwang, Alireza Hodjat, Bo-Cheng Lai, Shenglin Yang, Patrick Schaumont, Ingrid Verbauwhede Prototype IC with WDDL and Differential Routing - DPA Resistance Assessment. Search on Bibsonomy CHES The full citation details ... 2005 DBLP  DOI  BibTeX  RDF dual rail with precharge, wave dynamic differential logic (WDDL), differential routing, parasitic capacitance matching, side-channel attack (SCA), differential power analysis (DPA), countermeasure
30Kris Tiri, Ingrid Verbauwhede Simulation models for side-channel information leaks. Search on Bibsonomy DAC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF security IC, encryption, smart card, side-channel attack, differential power analysis, simulation model, countermeasure
30Christophe Clavier, Jean-Sébastien Coron, Nora Dabbous Differential Power Analysis in the Presence of Hardware Countermeasures. Search on Bibsonomy CHES The full citation details ... 2000 DBLP  DOI  BibTeX  RDF hardware countermeasure, random process interrupt, smart card, Power analysis
30Paul Ammann, Sushil Jajodia, Catherine D. McCollum, Barbara T. Blaustein Surviving information warfare attacks on databases. Search on Bibsonomy S&P The full citation details ... 1997 DBLP  DOI  BibTeX  RDF information warfare attack survival, fault tolerance approach, damaged data, partially repaired data, snapshot algorithm, damage markings, consistency preserving normal transactions, countermeasure transactions, databases, protocol, security of data, integrity constraints, data security, database consistency
30Steffen Wendzel, Daniela Eller, Wojciech Mazurczyk One Countermeasure, Multiple Patterns: Countermeasure Variation for Covert Channels. Search on Bibsonomy CECC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
30Arpan Roy, Dong Seong Kim 0001, Kishor S. Trivedi Scalable optimal countermeasure selection using implicit enumeration on attack countermeasure trees. Search on Bibsonomy DSN The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
26Amir Moradi 0001, Mehrdad Khatir, Mahmoud Salmasizadeh, Mohammad T. Manzuri Shalmani Charge recovery logic as a side channel attack countermeasure. Search on Bibsonomy ISQED The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
26Fan Zhang 0010, Zhijie Jerry Shi An Efficient Window-Based Countermeasure to Power Analysis of ECC Algorithms. Search on Bibsonomy ITNG The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
26Marcel Medwed, Jörn-Marc Schmidt A Generic Fault Countermeasure Providing Data and Program Flow Integrity. Search on Bibsonomy FDTC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
26Alin Razafindraibe, Michel Robert, Philippe Maurine Analysis and Improvement of Dual Rail Logic as a Countermeasure Against DPA. Search on Bibsonomy PATMOS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
26Alin Razafindraibe, Michel Robert, Philippe Maurine Improvement of dual rail logic as a countermeasure against DPA. Search on Bibsonomy VLSI-SoC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
26Stefano Bistarelli, Fabio Fioravanti, Pamela Peretti Using CP-nets as a guide for countermeasure selection. Search on Bibsonomy SAC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
26Sei Nagashima, Naofumi Homma, Yuichi Imai, Takafumi Aoki, Akashi Satoh DPA Using Phase-Based Waveform Matching against Random-Delay Countermeasure. Search on Bibsonomy ISCAS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
26Shin Yokoyama, Yoshikazu Nakane, Osamu Takahashi, Eiichi Miyamoto Evaluation of the Impact of Selfish Nodes in Ad Hoc Networks and Detection and Countermeasure Methods. Search on Bibsonomy MDM The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
26Pasquale Corsonello, Stefania Perri, Martin Margala An integrated countermeasure against differential power analysis for secure smart-cards. Search on Bibsonomy ISCAS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
26Jakob Eriksson, Srikanth V. Krishnamurthy, Michalis Faloutsos TrueLink: A Practical Countermeasure to the Wormhole Attack in Wireless Networks. Search on Bibsonomy ICNP The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
26Zhaoyu Liu, Roopesh Uppala A Dynamic Countermeasure Method for Large-Scale Network Attacks. Search on Bibsonomy DASC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
26Issa M. Khalil, Saurabh Bagchi, Ness B. Shroff LITEWORP: A Lightweight Countermeasure for the Wormhole Attack in Multihop Wireless Networks. Search on Bibsonomy DSN The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
26Yanyun Zhou, Maixiu Hu E-commerce ethics problem and countermeasure of China on the basis of systematic thinking. Search on Bibsonomy ICEC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF e-commerce (system), e-commerce ethics, the morals containing by oneself (conscientious)
26P. Vinod 0002, Prabin Kumar Bora A New Inter-frame Collusion Attack and a Countermeasure. Search on Bibsonomy IWDW The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
26Marco Bucci, Raimondo Luzzi, Michele Guglielmo, Alessandro Trifiletti A countermeasure against differential power analysis based on random delay insertion. Search on Bibsonomy ISCAS (4) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
26Guido Bertoni, Vittorio Zaccaria, Luca Breveglieri, Matteo Monchiero, Gianluca Palermo AES Power Attack Based on Induced Cache Miss and Countermeasure. Search on Bibsonomy ITCC (1) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Cache, Block Cipher, AES, Power Analysis, Cache Miss
26Michiharu Niimi, Hideki Noda, Bruce Segee A Study on Visual Attack to BPCS-Steganography and Countermeasure. Search on Bibsonomy VLBV The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
26Michiharu Niimi, Tomohito Ei, Hideki Noda, Eiji Kawaguchi, Bruce Segee An attack to BPCS-steganography using complexity histogram and countermeasure. Search on Bibsonomy ICIP The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
26Jianhua Yang, Zhaohui Wu 0001, Siliang Tang, Xiaosheng Guo Virtual Battlefield Attack-Defense Countermeasure Simulation on the Grid. Search on Bibsonomy GCC Workshops The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
26DongGook Park, JungJoon Kim, Colin Boyd, Ed Dawson Cryptographic Salt: A Countermeasure against Denial-of-Service Attacks. Search on Bibsonomy ACISP The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
26Elisabeth Oswald, Manfred Josef Aigner Randomized Addition-Subtraction Chains as a Countermeasure against Power Attacks. Search on Bibsonomy CHES The full citation details ... 2001 DBLP  DOI  BibTeX  RDF Elliptic Curve Cryptosystems, Power Analysis
21Kazuo Sakiyama, Tatsuya Yagi, Kazuo Ohta Fault Analysis Attack against an AES Prototype Chip Using RSL. Search on Bibsonomy CT-RSA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Random Switching Logic, Clock-based Attack, AES, Fault Analysis
21Jean-Sébastien Coron, Ilya Kizhvatov An Efficient Method for Random Delay Generation in Embedded Software. Search on Bibsonomy CHES The full citation details ... 2009 DBLP  DOI  BibTeX  RDF random delays, Side channel attacks, countermeasures
21Stamatios V. Kartalopoulos Differentiating Data Security and Network Security. Search on Bibsonomy ICC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
21Felipe Ghellar, Marcelo Lubaszewski A novel AES cryptographic core highly resistant to differential power analysis attacks. Search on Bibsonomy SBCCI The full citation details ... 2008 DBLP  DOI  BibTeX  RDF dpa, rijndael, isomorphisms, aes
21Fernando C. Colón Osorio Using Byzantine Agreement in the Design Of IPS Systems. Search on Bibsonomy IPCCC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
21Chong Hee Kim, Jean-Jacques Quisquater How can we overcome both side channel analysis and fault attacks on RSA-CRT? Search on Bibsonomy FDTC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
21Young-Geun Choi, Jeonil Kang, DaeHun Nyang Proactive Code Verification Protocol in Wireless Sensor Network. Search on Bibsonomy ICCSA (2) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
21Tae Hyun Kim 0003, Dong-Guk Han, Katsuyuki Okeya, Jongin Lim 0001 Generic Cryptanalysis of Combined Countermeasures with Randomized BSD Representations. Search on Bibsonomy CARDIS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
21Camille Vuillaume, Katsuyuki Okeya Flexible Exponentiation with Resistance to Side Channel Attacks. Search on Bibsonomy ACNS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF fractional width, RSA, side channel attacks, simple power analysis
21Yongjin Kim, Ahmed Helmy Attacker traceback with cross-layer monitoring in wireless multi-hop networks. Search on Bibsonomy SASN The full citation details ... 2006 DBLP  DOI  BibTeX  RDF DoS/DDoS attack, attacker traceback, cross-layer monitoring, wireless multi-hop networks
21Yves Younan, Davide Pozza, Frank Piessens, Wouter Joosen Extended Protection against Stack Smashing Attacks without Performance Loss. Search on Bibsonomy ACSAC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
21Randy Smith, Cristian Estan, Somesh Jha Backtracking Algorithmic Complexity Attacks against a NIDS. Search on Bibsonomy ACSAC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
21G. Fraidy Bouesse, Marc Renaudin, Gilles Sicard Improving DPA Resistance of Quasi Delay Insensitive Circuits Using Randomly Time-shifted Acknowledgment Signals. Search on Bibsonomy VLSI-SoC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
21Sung-Ming Yen, Wei-Chih Lien, Sang-Jae Moon, JaeCheol Ha Power Analysis by Exploiting Chosen Message and Internal Collisions - Vulnerability of Checking Mechanism for RSA-Decryption. Search on Bibsonomy Mycrypt The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Cryptography, Smart card, Side-channel attack, Simple power analysis (SPA), Chosen-message attack
21Régis Bevan Improved Zero Value Attack on XTR. Search on Bibsonomy ACISP The full citation details ... 2005 DBLP  DOI  BibTeX  RDF MRPA, smart cards, Power Analysis, DFA, XTR
21Jong Hoon Shin, Dong Jin Park, Pil Joong Lee DPA Attack on the Improved Ha-Moon Algorithm. Search on Bibsonomy WISA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Ha-Moon algorithm, randomized exponentiation algorithm, side-channel attack
21Sung-Ming Yen, Lee-Chun Ko, Sang-Jae Moon, JaeCheol Ha Relative Doubling Attack Against Montgomery Ladder. Search on Bibsonomy ICISC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Doubling attack, Cryptography, Smart card, Side-channel attack, Scalar multiplication, Exponentiation, Simple power analysis (SPA), Chosen-message attack
21Mustapha Hedabou, Pierre Pinel, Lucien Bénéteau Countermeasures for Preventing Comb Method Against SCA Attacks. Search on Bibsonomy ISPEC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF comb method, pre-computed table, memory space, side channel attacks, Elliptic curve, scalar multiplication
21SangCheol Hwang, Namhoon Lee, Kouichi Sakurai, Joong Gil Park, Jaecheol Ryou 0001 The Improved Risk Analysis Mechanism in the Practical Risk Analysis System. Search on Bibsonomy ICOIN The full citation details ... 2005 DBLP  DOI  BibTeX  RDF praha, risk management, risk analysis
21David A. Wagner 0001 Cryptanalysis of a provably secure CRT-RSA algorithm. Search on Bibsonomy CCS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF cryptanalysis, RSA, chinese remainder theorem, fault attacks
Displaying result #1 - #100 of 1140 (100 per page; Change: )
Pages: [1][2][3][4][5][6][7][8][9][10][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license