The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for phrase side-channel (changed automatically) with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1991-2001 (25) 2002 (33) 2003 (39) 2004 (64) 2005 (70) 2006 (71) 2007 (92) 2008 (100) 2009 (98) 2010 (67) 2011 (80) 2012 (113) 2013 (118) 2014 (161) 2015 (150) 2016 (170) 2017 (244) 2018 (254) 2019 (301) 2020 (339) 2021 (370) 2022 (369) 2023 (375) 2024 (91)
Publication types (Num. hits)
article(1488) book(2) data(4) incollection(21) inproceedings(2162) phdthesis(104) proceedings(13)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 1042 occurrences of 277 keywords

Results
Found 3794 publication records. Showing 3794 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
96Kerstin Lemke-Rust, Christof Paar Analyzing Side Channel Leakage of Masked Implementations with Stochastic Methods. Search on Bibsonomy ESORICS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Boolean Masking, Multivariate Side Channel Analysis, Higher-Order Side Channel Analysis, Stochastic Methods, Side Channel Cryptanalysis
81Katsuyuki Okeya, Kouichi Sakurai On Insecurity of the Side Channel Attack Countermeasure Using Addition-Subtraction Chains under Distinguishability between Addition and Doubling. Search on Bibsonomy ACISP The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Randomized Addition-Subtraction Chains Countermeasure, SPA Attack, Side Channel Attacks, Elliptic Curve Cryptosystems, Timing Attack
76Lang Lin, Markus Kasper, Tim Güneysu, Christof Paar, Wayne P. Burleson Trojan Side-Channels: Lightweight Hardware Trojans through Side-Channel Engineering. Search on Bibsonomy CHES The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Trojan Hardware, Trojan Side-Channel, Hardware Trojan Detection, Covert Channel, Side-Channel Analysis
75Katsuyuki Okeya, Dong-Guk Han Side Channel Attack on Ha-Moon's Countermeasure of Randomized Signed Scalar Multiplication. Search on Bibsonomy INDOCRYPT The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Ha-Moons Countermeasure, Finite Markov Chain, Side Channel Attacks, DPA, Elliptic Curve Cryptosystem, SPA
68Kai Schramm, Gregor Leander, Patrick Felke, Christof Paar A Collision-Attack on AES: Combining Side Channel- and Differential-Attack. Search on Bibsonomy CHES The full citation details ... 2004 DBLP  DOI  BibTeX  RDF internal collisions, AES, side channel attacks, birthday paradox
62Raphael C.-W. Phan, Sung-Ming Yen Amplifying Side-Channel Attacks with Techniques from Block Cipher Cryptanalysis. Search on Bibsonomy CARDIS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Attacks and countermeasures in hardware and software, cryptanalysis, Advanced Encryption Standard, side-channel attacks, fault attacks
62Katsuyuki Okeya Side Channel Attacks Against HMACs Based on Block-Cipher Based Hash Functions. Search on Bibsonomy ACISP The full citation details ... 2006 DBLP  DOI  BibTeX  RDF (keyed) hash function, PGV construction, reverse DPA, side channel attacks, differential power analysis (DPA), HMAC
62Claire Whelan, Michael Scott Side Channel Analysis of Practical Pairing Implementations: Which Path Is More Secure? Search on Bibsonomy VIETCRYPT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Correlation Power Analysis (CPA), ?T Pairing, Side Channel Analysis (SCA), Tate Pairing, Pairing Based Cryptography, Ate Pairing
62Katsuyuki Okeya, Kouichi Sakurai A Second-Order DPA Attack Breaks a Window-Method Based Countermeasure against Side Channel Attacks. Search on Bibsonomy ISC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Higher-Order DPA Attack, Second-Order DPA Attack, Möller's Countermeasure, Side Channel Attacks, Differential Power Analysis, Elliptic Curve Cryptosystems
61Kanthakumar Pongaliur, Zubin Abraham, Alex X. Liu, Li Xiao 0001, Leo C. Kempel Securing Sensor Nodes Against Side Channel Attacks. Search on Bibsonomy HASE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
56Andrey Bogdanov, Ilya Kizhvatov, Andrei Pyshkin Algebraic Methods in Side-Channel Collision Attacks and Practical Collision Detection. Search on Bibsonomy INDOCRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF multiple-differential collision attacks, ternary voting, AES, Side-channel attacks, DPA, collision attacks, algebraic cryptanalysis
56Zhenghong Wang, Ruby B. Lee New cache designs for thwarting software cache-based side channel attacks. Search on Bibsonomy ISCA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF security, cache, computer architecture, processor, timing attacks, side channel
56Katsuyuki Okeya, Tetsu Iwata Side Channel Attacks on Message Authentication Codes. Search on Bibsonomy ESAS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Selective Forgery, MACs, Side Channel Attacks, DPA, SPA
56Werner Schindler On the Optimization of Side-Channel Attacks by Advanced Stochastic Methods. Search on Bibsonomy Public Key Cryptography The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Montgomerys multiplication algo-rithm, statistical decision problem, optimal decision strategy, Side-channel attack, stochastic process
56Dan Page, Martijn Stam On XTR and Side-Channel Analysis. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2004 DBLP  DOI  BibTeX  RDF LUC, finite field, side channel attack, power analysis, XTR
56Katsuyuki Okeya, Tsuyoshi Takagi, Camille Vuillaume On the Exact Flexibility of the Flexible Countermeasure Against Side Channel Attacks. Search on Bibsonomy ACISP The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Fractional Window, Side Channel Attacks, Flexibility, Elliptic Curve Cryptosystems, Smartcard, Discrete Logarithm Problem
55Zhimin Chen 0002, Syed Haider, Patrick Schaumont Side-Channel Leakage in Masked Circuits Caused by Higher-Order Circuit Effects. Search on Bibsonomy ISA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
54François-Xavier Standaert, Benedikt Gierlichs, Ingrid Verbauwhede Partition vs. Comparison Side-Channel Distinguishers: An Empirical Evaluation of Statistical Tests for Univariate Side-Channel Attacks against Two Unprotected CMOS Devices. Search on Bibsonomy ICISC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
52Yasuyuki Sakai, Kouichi Sakurai A New Attack with Side Channel Leakage During Exponent Recoding Computations. Search on Bibsonomy CHES The full citation details ... 2004 DBLP  DOI  BibTeX  RDF exponent recoding, Side channel attack, elliptic curve cryptosystems, RSA cryptosystems
51Onur Aciiçmez, Shay Gueron, Jean-Pierre Seifert New Branch Prediction Vulnerabilities in OpenSSL and Necessary Software Countermeasures. Search on Bibsonomy IMACC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF branch prediction attacks, cache eviction attacks, Binary Extended Euclidean Algorithm, software mitigation methods, OpenSSL, RSA, Side channel attacks, CRT, modular inversion
51Onur Aciiçmez, Çetin Kaya Koç, Jean-Pierre Seifert Predicting Secret Keys Via Branch Prediction. Search on Bibsonomy CT-RSA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Simultaneous Multi-threading, RSA, Branch Prediction, Side Channel Analysis, Montgomery Multiplication, Modular Exponentiation
50Jun Wu, Yong-Bin Kim, Minsu Choi Low-power side-channel attack-resistant asynchronous S-box design for AES cryptosystems. Search on Bibsonomy ACM Great Lakes Symposium on VLSI The full citation details ... 2010 DBLP  DOI  BibTeX  RDF substitution box, substitution box (S-box), differential power/noise analysis, power/noise measurement, security, advanced encryption standard, advanced encryption standard, side-channel attacks (SCA), null convention logic
50Ilya Kizhvatov Side channel analysis of AVR XMEGA crypto engine. Search on Bibsonomy WESS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF cryptography, DPA, side channel analysis
50Emmanuel Prouff, Robert P. McEvoy First-Order Side-Channel Attacks on the Permutation Tables Countermeasure. Search on Bibsonomy CHES The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Permutation Tables, MIA, Side-Channel Attacks, Masking, CPA
50Ryad Benadjila, Olivier Billet, Stanislas Francfort Drm to counter side-channel attacks? Search on Bibsonomy Digital Rights Management Workshop The full citation details ... 2007 DBLP  DOI  BibTeX  RDF white-box, AES, side-channel attacks, DRM
50Tae Hyun Kim 0003, Tsuyoshi Takagi, Dong-Guk Han, Ho Won Kim 0001, Jongin Lim 0001 Side Channel Attacks and Countermeasures on Pairing Based Cryptosystems over Binary Fields. Search on Bibsonomy CANS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Randomized projective coordinate systems, Eta pairing, Side channel attacks, Differential Power Analysis, Pairing based cryptosystems
50Zhimin Chen, Yujie Zhou Dual-Rail Random Switching Logic: A Countermeasure to Reduce Side Channel Leakage. Search on Bibsonomy CHES The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Gate Level Masking, DRSL, Dual-Rail, Pre-charge, Side Channel Attacks, DPA
50Naofumi Homma, Sei Nagashima, Yuichi Imai, Takafumi Aoki, Akashi Satoh High-Resolution Side-Channel Attack Using Phase-Based Waveform Matching. Search on Bibsonomy CHES The full citation details ... 2006 DBLP  DOI  BibTeX  RDF cryptographic module, waveform matching, phase-only correlation, side-channel attacks, DPA, DEMA
50Svetla Nikova, Christian Rechberger, Vincent Rijmen Threshold Implementations Against Side-Channel Attacks and Glitches. Search on Bibsonomy ICICS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF side-channel attacks, secret sharing, Masking
50Katsuyuki Okeya, Tsuyoshi Takagi, Camille Vuillaume Efficient Representations on Koblitz Curves with Resistance to Side Channel Attacks. Search on Bibsonomy ACISP The full citation details ... 2005 DBLP  DOI  BibTeX  RDF SPA countermeasure, side channel attacks, elliptic curve cryptosystems, smartcard, Koblitz curves
50Katsuyuki Takashima Practical Modifications of Leadbitter et al.'s Repeated-Bits Side-Channel Analysis on (EC)DSA. Search on Bibsonomy WISA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF (EC)DSA, Side-channel analysis (attack), Lattice basis reduction algorithm, Window method
50Hoon-Jae Lee 0001, ManKi Ahn, Seongan Lim, Sang-Jae Moon A Study on Smart Card Security Evaluation Criteria for Side Channel Attacks. Search on Bibsonomy ICCSA (1) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Protection Profiles, Vulnerability Assessment Activities, SPA/DPA, Smart Card, Side Channel Attacks, Common Criteria
50Marc Joye, Jean-Jacques Quisquater Hessian Elliptic Curves and Side-Channel Attacks. Search on Bibsonomy CHES The full citation details ... 2001 DBLP  DOI  BibTeX  RDF Cryptography, Implementation, Smart-cards, Side-channel attacks, Elliptic curves
50David Molnar, Matt Piotrowski, David Schultz, David A. Wagner 0001 The Program Counter Security Model: Automatic Detection and Removal of Control-Flow Side Channel Attacks. Search on Bibsonomy ICISC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
49Shafi Goldwasser Cryptography without (Hardly Any) Secrets ? Search on Bibsonomy EUROCRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
48Nachiketh R. Potlapally, Anand Raghunathan, Srivaths Ravi 0001, Niraj K. Jha, Ruby B. Lee Satisfiability-based framework for enabling side-channel attacks on cryptographic software. Search on Bibsonomy DATE Designers' Forum The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
48Douglas Stebila, Nicolas Thériault Unified Point Addition Formulæ and Side-Channel Attacks. Search on Bibsonomy CHES The full citation details ... 2006 DBLP  DOI  BibTeX  RDF unified point addition formulæ, projective coordinates, elliptic-curve cryptography, side-channel attacks
46Dakshi Agrawal, Josyula R. Rao, Pankaj Rohatgi Multi-channel Attacks. Search on Bibsonomy CHES The full citation details ... 2003 DBLP  DOI  BibTeX  RDF EM Analysis, Side-channel attacks, DPA, Power Analysis, DEMA
45David Jao, S. Ramesh Raju, Ramarathnam Venkatesan Digit Set Randomization in Elliptic Curve Cryptography. Search on Bibsonomy SAGA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF randomized representations, non-adjacent form representations, side channel attack countermeasures, elliptic curve cryptography
45Dong-Guk Han, Katsuyuki Okeya, Tae Hyun Kim 0003, Yoon Sung Hwang, Young-Ho Park 0001, Souhwan Jung Cryptanalysis of the Countermeasures Using Randomized Binary Signed Digits. Search on Bibsonomy ACNS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF BSD Representation, Ha-Moons Countermeasure, Ebeid-Hasans Countermeasure, Agagliates Countermeasure, Side Channel Attacks, DPA, Elliptic Curve Cryptosystem, SPA
45Colin D. Walter Simple Power Analysis of Unified Code for ECC Double and Add. Search on Bibsonomy CHES The full citation details ... 2004 DBLP  DOI  BibTeX  RDF unified code, elliptic curve cryptography, ECC, simple power analysis, SPA, Side channel leakage, Montgomery modular multiplication
44Thomas Plos Evaluation of the Detached Power Supply as Side-Channel Analysis Countermeasure for Passive UHF RFID Tags. Search on Bibsonomy CT-RSA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Deta-ched Power Supply, Parasitic Backscatter, RFID, Differential Power Analysis, Side-Channel Analysis, UHF
44Jingfei Kong, Onur Aciiçmez, Jean-Pierre Seifert, Huiyang Zhou Deconstructing new cache designs for thwarting software cache-based side channel attacks. Search on Bibsonomy CSAW The full citation details ... 2008 DBLP  DOI  BibTeX  RDF microarchitectural analysis, cryptanalysis, side-channel analysis, timing attack, cache architecture, cache attack
44Santosh Ghosh, Monjur Alam, Dipanwita Roy Chowdhury, Indranil Sengupta 0001 A GF(p) elliptic curve group operator resistant against side channel attacks. Search on Bibsonomy ACM Great Lakes Symposium on VLSI The full citation details ... 2008 DBLP  DOI  BibTeX  RDF gf(p) elliptic curve, elliptic curve cryptosystem, side-channel analysis, timing attack, power analysis attack
44Manuel Koschuch, Johann Großschädl, Udo Payer, Matthias Hudler, Michael Krüger Workload Characterization of a Lightweight SSL Implementation Resistant to Side-Channel Attacks. Search on Bibsonomy CANS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Performance Evaluation, Network Security, Elliptic Curve Cryptography, Side-Channel Analysis, Efficient Implementation
44Praveen Gauravaram, Katsuyuki Okeya An Update on the Side Channel Cryptanalysis of MACs Based on Cryptographic Hash Functions. Search on Bibsonomy INDOCRYPT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF M-NMAC, MDx-MAC, Side channel attacks, DPA, HMAC
44Kazuo Sakiyama, Elke De Mulder, Bart Preneel, Ingrid Verbauwhede Side-channel resistant system-level design flow for public-key cryptography. Search on Bibsonomy ACM Great Lakes Symposium on VLSI The full citation details ... 2007 DBLP  DOI  BibTeX  RDF elliptic curve cryptography, side-channel attack, system-level modeling
44Kerstin Lemke-Rust, Christof Paar Gaussian Mixture Models for Higher-Order Side Channel Analysis. Search on Bibsonomy CHES The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Higher-Order Analysis, Boolean Masking, Second-Order DPA, EM Algorithm, Gaussian Mixture Models, Templates, Side Channel Cryptanalysis
44Camille Vuillaume, Katsuyuki Okeya Flexible Exponentiation with Resistance to Side Channel Attacks. Search on Bibsonomy ACNS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF fractional width, RSA, side channel attacks, simple power analysis
44Eric Peeters, François-Xavier Standaert, Nicolas Donckers, Jean-Jacques Quisquater Improved Higher-Order Side-Channel Attacks with FPGA Experiments. Search on Bibsonomy CHES The full citation details ... 2005 DBLP  DOI  BibTeX  RDF cryptographic devices, high-order power analysis, masking countermeasure, FPGA, block cipher, DPA, side-channel analysis
44Werner Schindler, Kerstin Lemke, Christof Paar A Stochastic Model for Differential Side Channel Cryptanalysis. Search on Bibsonomy CHES The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Differential Side Channel Cryptanalysis, Minimum Principle, Maximum Likelihood Principle, Stochastic Model, DPA, Power Analysis, DEMA, Template Attack, Electromagnetic Analysis
44Kris Tiri, David D. Hwang, Alireza Hodjat, Bo-Cheng Lai, Shenglin Yang, Patrick Schaumont, Ingrid Verbauwhede A side-channel leakage free coprocessor IC in 0.18µm CMOS for embedded AES-based cryptographic and biometric processing. Search on Bibsonomy DAC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF security IC, encryption, smart card, side-channel attack, differential power analysis, countermeasure
44Kris Tiri, Ingrid Verbauwhede Simulation models for side-channel information leaks. Search on Bibsonomy DAC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF security IC, encryption, smart card, side-channel attack, differential power analysis, simulation model, countermeasure
44Abhik Majumdar, Jiajun Wang, Kannan Ramchandran Drift reduction in predictive video transmission using a distributed source coded side-channel. Search on Bibsonomy ACM Multimedia The full citation details ... 2004 DBLP  DOI  BibTeX  RDF drift reduction, distributed source coding, side-channel
44Dong-Guk Han, Jongin Lim 0001, Kouichi Sakurai On Security of XTR Public Key Cryptosystems Against Side Channel Attacks. Search on Bibsonomy ACISP The full citation details ... 2004 DBLP  DOI  BibTeX  RDF XTR Public Key Cryptosystem, Data-bit DPA, Address-bit DPA, doubling attack, Side Channel Attacks, SPA
44HyungSo Yoo, ChangKyun Kim, JaeCheol Ha, Sang-Jae Moon, IlHwan Park Side Channel Cryptanalysis on SEED. Search on Bibsonomy WISA The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Fault insertion analysis, block cipher, Side channel attack, Differential power analysis, SEED
44ChangKyun Kim, JaeCheol Ha, Sung-Hyun Kim, Seokyu Kim, Sung-Ming Yen, Sang-Jae Moon A Secure and Practical CRT-Based RSA to Resist Side Channel Attacks. Search on Bibsonomy ICCSA (1) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Smart card, RSA, Side channel attack, DPA, CRT, Fault attack
44Katsuyuki Okeya, Tsuyoshi Takagi, Camille Vuillaume On the Importance of Protecting Delta in SFLASH against Side Channel Attacks. Search on Bibsonomy ITCC (2) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Asymmetric Signature, C *, C *-, Hidden Monomial Problem, Side Channel Attacks, SHA-1, SFLASH
44Loren D. Olson Side-Channel Attacks in ECC: A General Technique for Varying the Parametrization of the Elliptic Curve. Search on Bibsonomy CHES The full citation details ... 2004 DBLP  DOI  BibTeX  RDF weighted projective curves, uniform addition formula, cryptography, ECC, side-channel attacks, Elliptic curves
44Jerry den Hartog, Erik P. de Vink Virtual Analysis and Reduction of Side-Channel Vulnerabilities of Smartcards. Search on Bibsonomy Formal Aspects in Security and Trust The full citation details ... 2004 DBLP  DOI  BibTeX  RDF systematic hardening, simulation, side-channel attack, DPA, power analysis, smartcard, countermeasures, fault analysis
44Colin D. Walter Longer Keys May Facilitate Side Channel Attacks. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Key Length, Side Channel Attacks, DPA, Power Analysis, Timing Attack, RSA Cryptosystem
44MahnKi Ahn, JaeCheol Ha, Hoon-Jae Lee 0001, Sang-Jae Moon A Random M-ary Method Based Countermeasure against Side Channel Attacks. Search on Bibsonomy ICCSA (2) The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Random m-ary Recoding Algorithm, Side Channel Attacks, DPA, Elliptic Curve Cryptosystems, SPA, Power Analysis Attacks
44Katsuyuki Okeya, Tsuyoshi Takagi The Width-w NAF Method Provides Small Memory and Fast Elliptic Scalar Multiplications Secure against Side Channel Attacks. Search on Bibsonomy CT-RSA The full citation details ... 2003 DBLP  DOI  BibTeX  RDF width-w NAF, pre-computation table, smart card, side channel attacks, Elliptic curve cryptosystem, memory constraint
44Katsuyuki Okeya, Tsuyoshi Takagi A More Flexible Countermeasure against Side Channel Attacks Using Window Method. Search on Bibsonomy CHES The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Width-w NAF, Fractional window, Pre-computation Table, Smart Card, Side Channel Attacks, Elliptic Curve Cryptosystem, Memory Constraint
44Tetsuya Izu, Bodo Möller, Tsuyoshi Takagi Improved Elliptic Curve Multiplication Methods Resistant against Side Channel Attacks. Search on Bibsonomy INDOCRYPT The full citation details ... 2002 DBLP  DOI  BibTeX  RDF side channel attacks, elliptic curve cryptosystems, scalar multiplication, window method, memory constraints
44Katsuyuki Okeya, Kunihiko Miyazaki, Kouichi Sakurai A Fast Scalar Multiplication Method with Randomized Projective Coordinates on a Montgomery-Form Elliptic Curve Secure against Side Channel Attacks. Search on Bibsonomy ICISC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF Montgomery Form, Randomized Projective Coordinates, Side Channel Attacks, Elliptic Curve Cryptosystem
42François-Xavier Standaert, François Koeune, Werner Schindler How to Compare Profiled Side-Channel Attacks?. Search on Bibsonomy ACNS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
42Denis Réal, Cécile Canovas, Jessy Clédière, M'hamed Drissi, Frédéric Valette Defeating classical Hardware Countermeasures: a new processing for Side Channel Analysis. Search on Bibsonomy DATE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
42Kris Tiri, Patrick Schaumont, Ingrid Verbauwhede Side-Channel Leakage Tolerant Architectures. Search on Bibsonomy ITNG The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
42Wieland Fischer, Berndt M. Gammel, O. Kniffler, Joachim Velten Differential Power Analysis of Stream Ciphers. Search on Bibsonomy CT-RSA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF stream cipher, side-channel attack, DPA, power analysis, Trivium, Grain
42Yuval Ishai, Amit Sahai, David A. Wagner 0001 Private Circuits: Securing Hardware against Probing Attacks. Search on Bibsonomy CRYPTO The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Cryptanalysis, provable security, side channel attacks, secure multi-party computation, circuit complexity
41Ulrich Kühn 0001 Side-Channel Attacks on Textbook RSA and ElGamal Encryption. Search on Bibsonomy Public Key Cryptography The full citation details ... 2003 DBLP  DOI  BibTeX  RDF RSA encryption, Side-channel attack, ElGamal encryption
41Yasuyuki Sakai, Kouichi Sakurai Simple Power Analysis on Fast Modular Reduction with NIST Recommended Elliptic Curves. Search on Bibsonomy ICICS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF generalized Mersenne prime, unified code, elliptic curve cryptosystem, Side channel analysis, modular reduction
40Thanh-Ha Le, Jessy Clédière, Christine Servière, Jean-Louis Lacoume Noise Reduction in Side Channel Attack Using Fourth-Order Cumulant. Search on Bibsonomy IEEE Trans. Inf. Forensics Secur. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
38Liting Zhang, Wenling Wu, Peng Wang 0009 Extended Models for Message Authentication. Search on Bibsonomy ICISC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Provable Security, Side Channel Attack, Security Model, Message Authentication
38Pascal Delaunay, Antoine Joux Yet Another Attack on Vest. Search on Bibsonomy AFRICACRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF VEST, Stream Ciphers, Side Channel Attacks, Fourier Transform
38Benedikt Gierlichs, Lejla Batina, Pim Tuyls, Bart Preneel Mutual Information Analysis. Search on Bibsonomy CHES The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Differential Side-Channel Analysis (DSCA), DPA-resistant logic, Information Theory, Mutual Information
38Colin D. Walter Longer Randomly Blinded RSA Keys May Be Weaker Than Shorter Ones. Search on Bibsonomy WISA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF RSA, DPA, power analysis, SPA, Side channel leakage
38Dong-Guk Han, Tsuyoshi Takagi, Tae Hyun Kim 0003, Howon Kim 0001, Kyoil Chung Collision Attack on XTR and a Countermeasure with a Fixed Pattern. Search on Bibsonomy EUC Workshops The full citation details ... 2005 DBLP  DOI  BibTeX  RDF XTR public key system, XTR Exponentiation Algorithms, Ubiquitous computer, Side Channel Attacks, Collision Attack
38Thomas Popp, Stefan Mangard Masked Dual-Rail Pre-charge Logic: DPA-Resistance Without Routing Constraints. Search on Bibsonomy CHES The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Hardware Countermeasures, MDPL, Masking Logic, Dual-Rail Pre-Charge Logic, DPA, Side-Channel Analysis
38Wieland Fischer, Berndt M. Gammel Masking at Gate Level in the Presence of Glitches. Search on Bibsonomy CHES The full citation details ... 2005 DBLP  DOI  BibTeX  RDF random masking, masked logic circuits, Cryptanalysis, side-channel attacks, DPA, power analysis, logic circuits, digital circuits, masking, glitches
38Sung-Ming Yen, Chien-Ning Chen, Sang-Jae Moon, JaeCheol Ha Improvement on Ha-Moon Randomized Exponentiation Algorithm. Search on Bibsonomy ICISC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Randomized recoding, Signed-digit recoding, Side-channel attack, Differential power analysis (DPA), Simple power analysis (SPA), Modular exponentiation, Physical cryptanalysis
38Colin D. Walter Seeing through MIST Given a Small Fraction of an RSA Private Key. Search on Bibsonomy CT-RSA The full citation details ... 2003 DBLP  DOI  BibTeX  RDF division chains, randomized exponentiation, Mist, randomary exponentiation, RSA, DPA, blinding, power analysis, smartcard, SPA, Addition chains, DEMA, side channel leakage, SEMA
38Tanja Römer, Jean-Pierre Seifert Information Leakage Attacks against Smart Card Implementations of the Elliptic Curve Digital Signature Algorithm. Search on Bibsonomy E-smart The full citation details ... 2001 DBLP  DOI  BibTeX  RDF successive minimum, Cryptanalysis, side-channel-attacks, Lattice, ECDSA, Lattice basis reduction, LLL
38Onur Aciiçmez, Jean-Pierre Seifert Cheap Hardware Parallelism Implies Cheap Security. Search on Bibsonomy FDTC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
38Werner Schindler, Colin D. Walter Optimal Recovery of Secret Keys from Weak Side Channel Traces. Search on Bibsonomy IMACC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF power analysis, Side channel leakage, optimal strategy
38Lin Yang, Meiqin Wang, Siyuan Qiao Side Channel Cube Attack on PRESENT. Search on Bibsonomy CANS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Cube attack, Cryptanalysis, Side channel attack, PRESENT
38Thomas Finke, Max Gebhardt, Werner Schindler A New Side-Channel Attack on RSA Prime Generation. Search on Bibsonomy CHES The full citation details ... 2009 DBLP  DOI  BibTeX  RDF RSA prime generation, Side-channel attack, key generation
38Thanh-Ha Le, Cécile Canovas, Jessy Clédière An overview of side channel analysis attacks. Search on Bibsonomy AsiaCCS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF side channel attacks, stochastic model, DPA, DEMA, CPA, template attack
38Masaaki Shirase, Tsuyoshi Takagi, Eiji Okamoto An Efficient Countermeasure against Side Channel Attacks for Pairing Computation. Search on Bibsonomy ISPEC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF random value addition, side channel attacks, Tate pairing, ? T pairing
38Colin D. Walter Recovering Secret Keys from Weak Side Channel Traces of Differing Lengths. Search on Bibsonomy CHES The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Hidden Markov Models, simple power analysis, SPA, Viterbi Algorithm, Forward-Backward Algorithm, Side channel leakage
38Praveen Gauravaram, Katsuyuki Okeya Side Channel Analysis of Some Hash Based MACs: A Response to SHA-3 Requirements. Search on Bibsonomy ICICS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF hash functions, side channel attacks, HMAC, Applied cryptography
38Andrey Bogdanov Improved Side-Channel Collision Attacks on AES. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2007 DBLP  DOI  BibTeX  RDF generalized collisions, AES, side-channel attacks, random graphs, connected components, collision attacks
38Jude Angelo Ambrose, Roshan G. Ragel, Sri Parameswaran A smart random code injection to mask power analysis based side channel attacks. Search on Bibsonomy CODES+ISSS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF random instruction injection, signture identification, side channel attack, power analysis, cross correlation
38Michael Neve, Jean-Pierre Seifert, Zhenghong Wang A refined look at Bernstein's AES side-channel analysis. Search on Bibsonomy AsiaCCS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF cache-state analysis, s-box tables, AES, computer security, timing analysis, side-channel analysis, information leakage
38Olivier Billet, Marc Joye The Jacobi Model of an Elliptic Curve and Side-Channel Analysis. Search on Bibsonomy AAECC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF unified addition formula, SPA-like attacks, smart cards, elliptic curve cryptosystems, side-channel analysis
37Tanja Lange 0001, Pradeep Kumar Mishra SCA Resistant Parallel Explicit Formula for Addition and Doubling of Divisors in the Jacobian of Hyperelliptic Curves of Genus 2. Search on Bibsonomy INDOCRYPT The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
36Amir Khatib Zadeh, Catherine H. Gebotys Side channel aware leakage management in nanoscale Cryptosystem-on-Chip (CoC). Search on Bibsonomy ISQED The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
36Christophe Petit 0001, François-Xavier Standaert, Olivier Pereira, Tal Malkin, Moti Yung A block cipher based pseudo random number generator secure against side-channel key recovery. Search on Bibsonomy AsiaCCS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
36Wei Li 0013, Dawu Gu An Approach for Symmetric Encryption Against Side Channel Attacks in Provable Security. Search on Bibsonomy ProvSec The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #100 of 3794 (100 per page; Change: )
Pages: [1][2][3][4][5][6][7][8][9][10][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license