The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for DPA with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1974-2000 (20) 2001-2002 (24) 2003 (19) 2004 (31) 2005 (39) 2006 (39) 2007 (46) 2008 (99) 2009 (31) 2010 (23) 2011 (19) 2012 (17) 2013 (19) 2014 (29) 2015 (30) 2016-2017 (34) 2018-2019 (24) 2020-2021 (19) 2022-2023 (19) 2024 (4)
Publication types (Num. hits)
article(147) incollection(1) inproceedings(433) phdthesis(3) proceedings(1)
Venues (Conferences, Journals, ...)
CHES(76) Euro-Par Workshops(51) IACR Cryptol. ePrint Arch.(41) CT-RSA(16) ISCAS(16) CoRR(10) WISA(10) HOST(9) DATE(8) ICISC(8) IEICE Trans. Fundam. Electron....(8) PATMOS(8) INDOCRYPT(7) ACISP(6) CARDIS(6) COSADE(6) More (+10 of total 203)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 576 occurrences of 189 keywords

Results
Found 585 publication records. Showing 585 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
35Guillaume Fumaroli, Emmanuel Mayer, Renaud Dubois First-Order Differential Power Analysis on the Duplication Method. Search on Bibsonomy INDOCRYPT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF zero attack, differential power analysis, spectral analysis, Side-channel analysis
35Elisabeth Oswald, Stefan Mangard Template Attacks on Masking - Resistance Is Futile. Search on Bibsonomy CT-RSA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
35Catherine H. Gebotys A table masking countermeasure for low-energy secure embedded systems. Search on Bibsonomy IEEE Trans. Very Large Scale Integr. Syst. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
35Catherine H. Gebotys A split-mask countermeasure for low-energy secure embedded systems. Search on Bibsonomy ACM Trans. Embed. Comput. Syst. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF EM analysis, Side channel analysis, countermeasures, power attacks
35Wen-Syan Li, Daniel C. Zilio, Vishal S. Batra, Mahadevan Subramanian, Calisto Zuzarte, Inderpal Narang Load Balancing for Multi-tiered Database Systems through Autonomic Placement of Materialized Views. Search on Bibsonomy ICDE The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
35Kwangil Lee, Tim S. Yao Dynamic Path Adaptation Routing Protocol for Mobile Ad Hoc Networks. Search on Bibsonomy VTC Spring The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
35Zhanrong Yang, Radu Muresan The Impact of the Implementation Style on Power Consumption and Security in Embedded Cryptosystems. Search on Bibsonomy CCECE The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
35Kay C. Wiese, Andrew Hendriks, Jagdeep Poonian Algorithms for RNA folding: a comparison of dynamic programming and parallel evolutionary algorithms. Search on Bibsonomy Congress on Evolutionary Computation The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
35Jiqiang Lv, Yongfei Han Enhanced DES Implementation Secure Against High-Order Differential Power Analysis in Smartcards. Search on Bibsonomy ACISP The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
35Pao-Lung Chen, Ching-Che Chung, Chen-Yi Lee An all-digital PLL with cascaded dynamic phase average loop for wide multiplication range applications. Search on Bibsonomy ISCAS (5) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
35Stefan Mangard, Thomas Popp, Berndt M. Gammel Side-Channel Leakage of Masked CMOS Gates. Search on Bibsonomy CT-RSA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
35Dakshi Agrawal, Josyula R. Rao, Pankaj Rohatgi, Kai Schramm Templates as Master Keys. Search on Bibsonomy CHES The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
35Stefan Mangard, Norbert Pramstaller, Elisabeth Oswald Successfully Attacking Masked AES Hardware Implementations. Search on Bibsonomy CHES The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
35Katsuyuki Okeya, Tsuyoshi Takagi, Camille Vuillaume On the Importance of Protecting Delta in SFLASH against Side Channel Attacks. Search on Bibsonomy ITCC (2) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Asymmetric Signature, C *, C *-, Hidden Monomial Problem, Side Channel Attacks, SHA-1, SFLASH
35Sung-Ming Yen Amplified Differential Power Cryptanalysis on Rijndael Implementations with Exponentially Fewer Power Traces. Search on Bibsonomy ACISP The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
35Louis Goubin A Sound Method for Switching between Boolean and Arithmetic Masking. Search on Bibsonomy CHES The full citation details ... 2001 DBLP  DOI  BibTeX  RDF Physical attacks, Masking Techniques, AES, Differential Power Analysis, Smartcards, IDEA, Electric consumption
35Rita Mayer-Sommer Smartly Analyzing the Simplicity and the Power of Simple Power Analysis on Smartcards. Search on Bibsonomy CHES The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
35Jean-Sébastien Coron Resistance against Differential Power Analysis for Elliptic Curve Cryptosystems. Search on Bibsonomy CHES The full citation details ... 1999 DBLP  DOI  BibTeX  RDF Elliptic curve, power consumption, Differential Power Analysis
35Louis Goubin, Jacques Patarin DES and Differential Power Analysis (The "Duplication" Method). Search on Bibsonomy CHES The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
35Xingbin Zhang, Andrew A. Chien Dynamic Pointer Alignment: Tiling and Communication Optimizations for Parallel Pointer-based Computations. Search on Bibsonomy PPoPP The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
34Jianping Quan, Guoqiang Bai 0001 A DPA-Resistant Digit-Parallel Modular Multiplier over GF (2m). Search on Bibsonomy ITNG The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Modular multiplier, DPA-resistant, 1-bit masking, ECC, Architecture level
30Minoru Saeki, Daisuke Suzuki, Koichi Shimizu, Akashi Satoh A Design Methodology for a DPA-Resistant Cryptographic LSI with RSL Techniques. Search on Bibsonomy CHES The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
30Alin Razafindraibe, Michel Robert, Philippe Maurine Formal Evaluation of the Robustness of Dual-Rail Logic Against DPA Attacks. Search on Bibsonomy PATMOS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
30Alin Razafindraibe, Philippe Maurine, Michel Robert, Marc Renaudin Security evaluation of dual rail logic against DPA attacks. Search on Bibsonomy VLSI-SoC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
30Yi Wang 0016, Jussipekka Leiwo, Thambipillai Srikanthan, Yu Yu FPGA based DPA-resistant Unified Architecture for Signcryption. Search on Bibsonomy ITNG The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
30Frédéric Amiel, Christophe Clavier, Michael Tunstall Fault Analysis of DPA-Resistant Algorithms. Search on Bibsonomy FDTC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
30Yoo-Jin Baek, Mi-Jung Noh DPA-Resistant Finite Field Multipliers and Secure AES Design. Search on Bibsonomy ISPEC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
30G. Fraidy Bouesse, Gilles Sicard, Marc Renaudin Path Swapping Method to Improve DPA Resistance of Quasi Delay Insensitive Asynchronous Circuits. Search on Bibsonomy CHES The full citation details ... 2006 DBLP  DOI  BibTeX  RDF QDI Asynchronous circuits, Path Swapping (PS), Power analysis
30Daniel Mesquita, Jean-Denis Techer, Lionel Torres, Michel Robert, Guy Cathébras, Gilles Sassatelli, Fernando Gehm Moraes Current Mask Generation: an Analog Circuit to Thwart DPA Attacks. Search on Bibsonomy VLSI-SoC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
30Kris Tiri, Ingrid Verbauwhede A Logic Level Design Methodology for a Secure DPA Resistant ASIC or FPGA Implementation. Search on Bibsonomy DATE The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
30Kris Tiri, Ingrid Verbauwhede Securing Encryption Algorithms against DPA at the Logic Level: Next Generation Smart Card Technology. Search on Bibsonomy CHES The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
30Kouichi Itoh, Jun Yajima, Masahiko Takenaka, Naoya Torii DPA Countermeasures by Improving the Window Method. Search on Bibsonomy CHES The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
30Rainer Steinwandt, Willi Geiselmann, Thomas Beth A Theoretical DPA-Based Cryptanalysis of the NESSIE Candidates FLASH and SFLASH. Search on Bibsonomy ISC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
30David May 0001, Henk L. Muller, Nigel P. Smart Random Register Renaming to Foil DPA. Search on Bibsonomy CHES The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
28Laurent Sauvage, Sylvain Guilley, Yves Mathieu Electromagnetic Radiations of FPGAs: High Spatial Resolution Cartography and Attack on a Cryptographic Module. Search on Bibsonomy ACM Trans. Reconfigurable Technol. Syst. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF EMA, security, FPGA, DPA, SCA, cartography
28Felipe Ghellar, Marcelo Lubaszewski A novel AES cryptographic core highly resistant to differential power analysis attacks. Search on Bibsonomy SBCCI The full citation details ... 2008 DBLP  DOI  BibTeX  RDF dpa, rijndael, isomorphisms, aes
28Marco Bucci, Luca Giancane, Raimondo Luzzi, Alessandro Trifiletti A Dynamic and Differential CMOS Lookup Table with Data-Independent Power Consumption for Cryptographic Applications on Chip Cards. Search on Bibsonomy IEEE Trans. Dependable Secur. Comput. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF differential logic, dual rail logic, chip-cards, cryptography, differential power analysis, DPA, power analysis
28Amir Moradi 0001, Mahmoud Salmasizadeh, Mohammad T. Manzuri Shalmani Power Analysis Attacks on MDPL and DRSL Implementations. Search on Bibsonomy ICISC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF DRSL, MDPL, Side-Channel Attacks, DPA, flip-flop
28Wieland Fischer, Berndt M. Gammel, O. Kniffler, Joachim Velten Differential Power Analysis of Stream Ciphers. Search on Bibsonomy CT-RSA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF stream cipher, side-channel attack, DPA, power analysis, Trivium, Grain
28Toru Akishita, Tsuyoshi Takagi Power Analysis to ECC Using Differential Power Between Multiplication and Squaring. Search on Bibsonomy CARDIS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Smart cards, DPA, elliptic curve cryptosystems, power analysis, modular multiplication
28Zhimin Chen, Yujie Zhou Dual-Rail Random Switching Logic: A Countermeasure to Reduce Side Channel Leakage. Search on Bibsonomy CHES The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Gate Level Masking, DRSL, Dual-Rail, Pre-charge, Side Channel Attacks, DPA
28Marco Bucci, Luca Giancane, Raimondo Luzzi, Alessandro Trifiletti Three-Phase Dual-Rail Pre-charge Logic. Search on Bibsonomy CHES The full citation details ... 2006 DBLP  DOI  BibTeX  RDF dual-rail logic, SABL, security, DPA
28Katsuyuki Okeya, Tetsu Iwata Side Channel Attacks on Message Authentication Codes. Search on Bibsonomy ESAS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Selective Forgery, MACs, Side Channel Attacks, DPA, SPA
28Werner Schindler, Kerstin Lemke, Christof Paar A Stochastic Model for Differential Side Channel Cryptanalysis. Search on Bibsonomy CHES The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Differential Side Channel Cryptanalysis, Minimum Principle, Maximum Likelihood Principle, Stochastic Model, DPA, Power Analysis, DEMA, Template Attack, Electromagnetic Analysis
28Dong-Guk Han, Katsuyuki Okeya, Tae Hyun Kim 0003, Yoon Sung Hwang, Young-Ho Park 0001, Souhwan Jung Cryptanalysis of the Countermeasures Using Randomized Binary Signed Digits. Search on Bibsonomy ACNS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF BSD Representation, Ha-Moons Countermeasure, Ebeid-Hasans Countermeasure, Agagliates Countermeasure, Side Channel Attacks, DPA, Elliptic Curve Cryptosystem, SPA
28ChangKyun Kim, JaeCheol Ha, Sung-Hyun Kim, Seokyu Kim, Sung-Ming Yen, Sang-Jae Moon A Secure and Practical CRT-Based RSA to Resist Side Channel Attacks. Search on Bibsonomy ICCSA (1) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Smart card, RSA, Side channel attack, DPA, CRT, Fault attack
28Colin D. Walter Issues of Security with the Oswald-Aigner Exponentiation Algorithm. Search on Bibsonomy CT-RSA The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Addition-subtraction chains, randomized exponentiation, elliptic curve cryptography, ECC, DPA, blinding, power analysis, smartcard, SPA, DEMA, point multiplication, SEMA
28Eric Brier, Christophe Clavier, Francis Olivier Correlation Power Analysis with a Leakage Model. Search on Bibsonomy CHES The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Correlation factor, secure cryptographic device, AES, DPA, power analysis, DES, Hamming distance, side channel, CPA
28Colin D. Walter Longer Keys May Facilitate Side Channel Attacks. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Key Length, Side Channel Attacks, DPA, Power Analysis, Timing Attack, RSA Cryptosystem
28Mehdi-Laurent Akkar, Nicolas T. Courtois, Romain Duteuil, Louis Goubin A Fast and Secure Implementation of Sflash. Search on Bibsonomy Public Key Cryptography The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Matsumoto-Imai cryptosystem C*, C*- trapdoor function, Digital Signatures, Smart cards, DPA, PKI, Power Analysis, SPA, portable devices, Addition Chains, Multivariate Cryptography, HFE
28Katsuyuki Okeya, Dong-Guk Han Side Channel Attack on Ha-Moon's Countermeasure of Randomized Signed Scalar Multiplication. Search on Bibsonomy INDOCRYPT The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Ha-Moons Countermeasure, Finite Markov Chain, Side Channel Attacks, DPA, Elliptic Curve Cryptosystem, SPA
28Colin D. Walter Seeing through MIST Given a Small Fraction of an RSA Private Key. Search on Bibsonomy CT-RSA The full citation details ... 2003 DBLP  DOI  BibTeX  RDF division chains, randomized exponentiation, Mist, randomary exponentiation, RSA, DPA, blinding, power analysis, smartcard, SPA, Addition chains, DEMA, side channel leakage, SEMA
28Colin D. Walter MIST: An Efficient, Randomized Exponentiation Algorithm for Resisting Power Analysis. Search on Bibsonomy CT-RSA The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Mist exponentiation algorithm, division chains, smart card, DPA, blinding, power analysis, addition chains
28Colin D. Walter Precise Bounds for Montgomery Modular Multiplication and Some Potentially Insecure RSA Moduli. Search on Bibsonomy CT-RSA The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Cryptography, differential power analysis, DPA, RSA cryptosystem, Montgomery modular multiplication
28Colin D. Walter Some Security Aspects of the M IST Randomized Exponentiation Algorithm. Search on Bibsonomy CHES The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Randomary exponentiation, Mist exponentiation algorithm, division chains, DPA, blinding, power analysis, smartcard, addition chains, DEMA
28Jean-Jacques Quisquater, David Samyde ElectroMagnetic Analysis (EMA): Measures and Counter-Measures for Smart Cards. Search on Bibsonomy E-smart The full citation details ... 2001 DBLP  DOI  BibTeX  RDF electromagnetic and power analysis, DPA, smartcard, SPA, tamper resistance, DEMA, SEMA
28Karine Gandolfi, Christophe Mourtel, Francis Olivier Electromagnetic Analysis: Concrete Results. Search on Bibsonomy CHES The full citation details ... 2001 DBLP  DOI  BibTeX  RDF smart cards, DPA, SPA, DEMA, side channel leakage, SEMA, electromagnetic analysis
28Mehdi-Laurent Akkar, Régis Bevan, Paul Dischamp, Didier Moyart Power Analysis, What Is Now Possible.... Search on Bibsonomy ASIACRYPT The full citation details ... 2000 DBLP  DOI  BibTeX  RDF dpa, spa, smart-cards, power analysis
28Adi Shamir Protecting Smart Cards from Passive Power Analysis with Detached Power Supplies. Search on Bibsonomy CHES The full citation details ... 2000 DBLP  DOI  BibTeX  RDF Smart cards, DPA, power analysis, SPA
28Paul C. Kocher, Joshua Jaffe, Benjamin Jun Differential Power Analysis. Search on Bibsonomy CRYPTO The full citation details ... 1999 DBLP  DOI  BibTeX  RDF cryptanalysis, differential power analysis, DPA, DES, SPA
28Colin D. Walter Montgomery's Multiplication Technique: How to Make It Smaller and Faster. Search on Bibsonomy CHES The full citation details ... 1999 DBLP  DOI  BibTeX  RDF higher radix methods, checker function, fault tolerance, testing, cryptography, RSA, Computer arithmetic, systolic arrays, error correction, differential power analysis, DPA, Montgomery modular multiplication
27Omid Mirmotahari, Yngvar Berg Low Voltage Design against Power Analysis Attacks. Search on Bibsonomy DELTA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Low Voltage (LV), Floating-Gate (FG) and supply current analysis, Differential Power Analysis (DPA), Ultra Low Voltage (ULV)
27Benedikt Gierlichs, Lejla Batina, Pim Tuyls, Bart Preneel Mutual Information Analysis. Search on Bibsonomy CHES The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Differential Side-Channel Analysis (DSCA), DPA-resistant logic, Information Theory, Mutual Information
27ManKi Ahn, Hoon-Jae Lee 0001 Experiments and Hardware Countermeasures on Power Analysis Attacks. Search on Bibsonomy ICCSA (3) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF SPA/DPA, Side Channel Attacks, Power Analysis, SmartCard, Countermeasure
27Sung-Ming Yen, Chien-Ning Chen, Sang-Jae Moon, JaeCheol Ha Improvement on Ha-Moon Randomized Exponentiation Algorithm. Search on Bibsonomy ICISC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Randomized recoding, Signed-digit recoding, Side-channel attack, Differential power analysis (DPA), Simple power analysis (SPA), Modular exponentiation, Physical cryptanalysis
27Hoon-Jae Lee 0001, ManKi Ahn, Seongan Lim, Sang-Jae Moon A Study on Smart Card Security Evaluation Criteria for Side Channel Attacks. Search on Bibsonomy ICCSA (1) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Protection Profiles, Vulnerability Assessment Activities, SPA/DPA, Smart Card, Side Channel Attacks, Common Criteria
27Roberto Maria Avanzi Countermeasures against Differential Power Analysis for Hyperelliptic Curve Cryptosystems. Search on Bibsonomy CHES The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Smart cards, Side-channel attacks, Public-key cryptography, Differential power analysis (DPA), Timing attacks, Hyperelliptic curves
27Pierre-Alain Fouque, Frédéric Valette The Doubling Attack - Why Upwards Is Better than Downwards. Search on Bibsonomy CHES The full citation details ... 2003 DBLP  DOI  BibTeX  RDF SPA-based analysis, DPA countermeasures, multiple exponent single data attack, scalar multiplication, modular exponentiation
27Marc Joye, Christophe Tymen Protections against Differential Analysis for Elliptic Curve Cryptography. Search on Bibsonomy CHES The full citation details ... 2001 DBLP  DOI  BibTeX  RDF Smart-cards, Side-channel attacks, Public-key cryptography, Elliptic curves, Differential power analysis (DPA), Timing attacks
23Yuan Yao 0004, Kailong Zhang, Xingshe Zhou 0001 A Novel Parameter Learning Algorithm for a Self-constructing Fuzzy Neural Network Design. Search on Bibsonomy ACIS-ICIS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
23Philipp Grabher, Johann Großschädl, Dan Page Non-deterministic processors: FPGA-based analysis of area, performance and security. Search on Bibsonomy WESS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF micro-architectural countermeasures, non-deterministic processors, side-channel attack, processor design
23Amir Moradi 0001, Mehrdad Khatir, Mahmoud Salmasizadeh, Mohammad T. Manzuri Shalmani Charge recovery logic as a side channel attack countermeasure. Search on Bibsonomy ISQED The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
23Chun-Fan Tsai, Chung-Ju Chang, Fang-Ching Ren, Chin-Ming Yen Adaptive radio resource allocation for downlink OFDMA/SDMA systems with multimedia traffic. Search on Bibsonomy IEEE Trans. Wirel. Commun. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
23Song Sun, Zijun Yan, Joseph Zambreno Experiments in attacking FPGA-based embedded systems using differential power analysis. Search on Bibsonomy EIT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
23Furuzan Atay Onat, Ivan Stojmenovic Generating Random Graphs for Wireless Actuator Networks. Search on Bibsonomy WOWMOM The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
23Robert P. McEvoy, Michael Tunstall, Colin C. Murphy, William P. Marnane Differential Power Analysis of HMAC Based on SHA-2, and Countermeasures. Search on Bibsonomy WISA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
23Chong Hee Kim, Jean-Jacques Quisquater How can we overcome both side channel analysis and fault attacks on RSA-CRT? Search on Bibsonomy FDTC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
23Jude Angelo Ambrose, Roshan G. Ragel, Sri Parameswaran RIJID: Random Code Injection to Mask Power Analysis based Side Channel Attacks. Search on Bibsonomy DAC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
23Tae Hyun Kim 0003, Dong-Guk Han, Katsuyuki Okeya, Jongin Lim 0001 Generic Cryptanalysis of Combined Countermeasures with Randomized BSD Representations. Search on Bibsonomy CARDIS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
23Nicolas T. Courtois, Louis Goubin An Algebraic Masking Method to Protect AES Against Power Attacks. Search on Bibsonomy ICISC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
23Huiyun Li, A. Theodore Markettos, Simon W. Moore Security Evaluation Against Electromagnetic Analysis at Design Time. Search on Bibsonomy CHES The full citation details ... 2005 DBLP  DOI  BibTeX  RDF EM side-channel analysis, design time security evaluation, smart card
23Kris Tiri, David D. Hwang, Alireza Hodjat, Bo-Cheng Lai, Shenglin Yang, Patrick Schaumont, Ingrid Verbauwhede A side-channel leakage free coprocessor IC in 0.18µm CMOS for embedded AES-based cryptographic and biometric processing. Search on Bibsonomy DAC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF security IC, encryption, smart card, side-channel attack, differential power analysis, countermeasure
23Girish B. Ratanpal, Ronald D. Williams, Travis N. Blalock An On-Chip Signal Suppression Countermeasure to Power Analysis Attacks. Search on Bibsonomy IEEE Trans. Dependable Secur. Comput. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF VLSI, smartcards, DES, security and protection, Power analysis attacks, code breaking
23François-Xavier Standaert, Siddika Berna Örs, Jean-Jacques Quisquater, Bart Preneel Power Analysis Attacks Against FPGA Implementations of the DES. Search on Bibsonomy FPL The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
23Mehdi-Laurent Akkar, Régis Bevan, Louis Goubin Two Power Analysis Attacks against One-Mask Methods. Search on Bibsonomy FSE The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
23Toru Akishita, Tsuyoshi Takagi Zero-Value Point Attacks on Elliptic Curve Cryptosystem. Search on Bibsonomy ISC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF addition formula, zero-value register, side channel attack, differential power analysis, elliptic curve cryptosystem
23Roman Novak Sign-Based Differential Power Analysis. Search on Bibsonomy WISA The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
23Katsuyuki Okeya, Tsuyoshi Takagi A More Flexible Countermeasure against Side Channel Attacks Using Window Method. Search on Bibsonomy CHES The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Width-w NAF, Fractional window, Pre-computation Table, Smart Card, Side Channel Attacks, Elliptic Curve Cryptosystem, Memory Constraint
23Suresh Chari, Josyula R. Rao, Pankaj Rohatgi Template Attacks. Search on Bibsonomy CHES The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
23Leigh J. Fitzgibbon, Lloyd Allison, David L. Dowe Minimum Message Length Grouping of Ordered Data. Search on Bibsonomy ALT The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
23Fu-Chiung Cheng, Huei-Huang Chen, Jiin-Hwai Perng Parallel execution on production systems. Search on Bibsonomy SPDP The full citation details ... 1990 DBLP  DOI  BibTeX  RDF
18Fenggen Yu, Yiming Qian, Xu Zhang, Francisca Gil-Ureta, Brian Jackson, Eric Bennett, Hao Zhang DPA-Net: Structured 3D Abstraction from Sparse Views via Differentiable Primitive Assembly. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
18Estuardo Alpirez Bock, Gustavo Banegas, Chris Brzuska, Lukasz Chmielewski, Kirthivaasan Puniamurthy, Milan Sorf Breaking DPA-Protected Kyber via the Pair-Pointwise Multiplication. Search on Bibsonomy ACNS (2) The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
18Zhongyi Shui, Sunyi Zheng, Chenglu Zhu, Shichuan Zhang, Xiaoxuan Yu, Honglin Li 0001, Jingxiong Li, Pingyi Chen, Lin Yang DPA-P2PNet: Deformable Proposal-Aware P2PNet for Accurate Point-Based Cell Detection. Search on Bibsonomy AAAI The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
18Ruizhi Yu, Yan Li PICT-DPA: A Quality-Compliance Data Processing Architecture. Search on Bibsonomy HICSS The full citation details ... 2024 DBLP  BibTeX  RDF
18Yuqian Wang, JianWei Ma, Axyonov Sergey, Shaofei Zang, Miao Zhang DPA-UNet rectal cancer image segmentation based on visual attention. Search on Bibsonomy Concurr. Comput. Pract. Exp. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Daniel Heinz, Thomas Pöppelmann Combined Fault and DPA Protection for Lattice-Based Cryptography. Search on Bibsonomy IEEE Trans. Computers The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Renuka Chowdary Bheemana, Aditya Japa, Siva Sankar Yellampalli, Ramesh Vaddi Negative capacitance FET based energy efficient and DPA attack resilient ultra-light weight block cipher design. Search on Bibsonomy Microelectron. J. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Ziheng Wang, Atem Aguer, Amir Ziai DPA Load Balancer: Load balancing for Data Parallel Actor-based systems. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Mohammad Gholamzadeh, Behrooz Khadem A Hybrid Image Encryption Scheme based on Chaos and a DPA-Resistant Sbox. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
Displaying result #101 - #200 of 585 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license