|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 576 occurrences of 189 keywords
|
|
|
Results
Found 585 publication records. Showing 585 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
35 | Guillaume Fumaroli, Emmanuel Mayer, Renaud Dubois |
First-Order Differential Power Analysis on the Duplication Method. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INDOCRYPT ![In: Progress in Cryptology - INDOCRYPT 2007, 8th International Conference on Cryptology in India, Chennai, India, December 9-13, 2007, Proceedings, pp. 210-223, 2007, Springer, 978-3-540-77025-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
zero attack, differential power analysis, spectral analysis, Side-channel analysis |
35 | Elisabeth Oswald, Stefan Mangard |
Template Attacks on Masking - Resistance Is Futile. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CT-RSA ![In: Topics in Cryptology - CT-RSA 2007, The Cryptographers' Track at the RSA Conference 2007, San Francisco, CA, USA, February 5-9, 2007, Proceedings, pp. 243-256, 2007, Springer, 3-540-69327-0. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
35 | Catherine H. Gebotys |
A table masking countermeasure for low-energy secure embedded systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Very Large Scale Integr. Syst. ![In: IEEE Trans. Very Large Scale Integr. Syst. 14(7), pp. 740-753, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
35 | Catherine H. Gebotys |
A split-mask countermeasure for low-energy secure embedded systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Embed. Comput. Syst. ![In: ACM Trans. Embed. Comput. Syst. 5(3), pp. 577-612, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
EM analysis, Side channel analysis, countermeasures, power attacks |
35 | Wen-Syan Li, Daniel C. Zilio, Vishal S. Batra, Mahadevan Subramanian, Calisto Zuzarte, Inderpal Narang |
Load Balancing for Multi-tiered Database Systems through Autonomic Placement of Materialized Views. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDE ![In: Proceedings of the 22nd International Conference on Data Engineering, ICDE 2006, 3-8 April 2006, Atlanta, GA, USA, pp. 102, 2006, IEEE Computer Society, 0-7695-2570-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
35 | Kwangil Lee, Tim S. Yao |
Dynamic Path Adaptation Routing Protocol for Mobile Ad Hoc Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
VTC Spring ![In: Proceedings of the 63rd IEEE Vehicular Technology Conference, VTC Spring 2006, 7-10 May 2006, Melbourne, Australia, pp. 767-771, 2006, IEEE. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
35 | Zhanrong Yang, Radu Muresan |
The Impact of the Implementation Style on Power Consumption and Security in Embedded Cryptosystems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCECE ![In: Proceedings of the Canadian Conference on Electrical and Computer Engineering, CCECE 2006, May 7-10, 2006, Ottawa Congress Centre, Ottawa, Canada, pp. 1325-1328, 2006, IEEE, 1-4244-0038-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
35 | Kay C. Wiese, Andrew Hendriks, Jagdeep Poonian |
Algorithms for RNA folding: a comparison of dynamic programming and parallel evolutionary algorithms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Congress on Evolutionary Computation ![In: Proceedings of the IEEE Congress on Evolutionary Computation, CEC 2005, 2-4 September 2005, Edinburgh, UK, pp. 475-483, 2005, IEEE, 0-7803-9363-5. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
35 | Jiqiang Lv, Yongfei Han |
Enhanced DES Implementation Secure Against High-Order Differential Power Analysis in Smartcards. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy, 10th Australasian Conference, ACISP 2005, Brisbane, Australia, July 4-6, 2005, Proceedings, pp. 195-206, 2005, Springer, 3-540-26547-3. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
35 | Pao-Lung Chen, Ching-Che Chung, Chen-Yi Lee |
An all-digital PLL with cascaded dynamic phase average loop for wide multiplication range applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCAS (5) ![In: International Symposium on Circuits and Systems (ISCAS 2005), 23-26 May 2005, Kobe, Japan, pp. 4875-4878, 2005, IEEE, 0-7803-8834-8. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
35 | Stefan Mangard, Thomas Popp, Berndt M. Gammel |
Side-Channel Leakage of Masked CMOS Gates. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CT-RSA ![In: Topics in Cryptology - CT-RSA 2005, The Cryptographers' Track at the RSA Conference 2005, San Francisco, CA, USA, February 14-18, 2005, Proceedings, pp. 351-365, 2005, Springer, 3-540-24399-2. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
35 | Dakshi Agrawal, Josyula R. Rao, Pankaj Rohatgi, Kai Schramm |
Templates as Master Keys. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHES ![In: Cryptographic Hardware and Embedded Systems - CHES 2005, 7th International Workshop, Edinburgh, UK, August 29 - September 1, 2005, Proceedings, pp. 15-29, 2005, Springer, 3-540-28474-5. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
35 | Stefan Mangard, Norbert Pramstaller, Elisabeth Oswald |
Successfully Attacking Masked AES Hardware Implementations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHES ![In: Cryptographic Hardware and Embedded Systems - CHES 2005, 7th International Workshop, Edinburgh, UK, August 29 - September 1, 2005, Proceedings, pp. 157-171, 2005, Springer, 3-540-28474-5. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
35 | Katsuyuki Okeya, Tsuyoshi Takagi, Camille Vuillaume |
On the Importance of Protecting Delta in SFLASH against Side Channel Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ITCC (2) ![In: International Conference on Information Technology: Coding and Computing (ITCC'04), Volume 2, April 5-7, 2004, Las Vegas, Nevada, USA, pp. 560-568, 2004, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
Asymmetric Signature, C *, C *-, Hidden Monomial Problem, Side Channel Attacks, SHA-1, SFLASH |
35 | Sung-Ming Yen |
Amplified Differential Power Cryptanalysis on Rijndael Implementations with Exponentially Fewer Power Traces. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy, 8th Australasian Conference, ACISP 2003, Wollongong, Australia, July 9-11, 2003, Proceedings, pp. 106-117, 2003, Springer, 3-540-40515-1. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
35 | Louis Goubin |
A Sound Method for Switching between Boolean and Arithmetic Masking. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHES ![In: Cryptographic Hardware and Embedded Systems - CHES 2001, Third International Workshop, Paris, France, May 14-16, 2001, Proceedings, pp. 3-15, 2001, Springer, 3-540-42521-7. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
Physical attacks, Masking Techniques, AES, Differential Power Analysis, Smartcards, IDEA, Electric consumption |
35 | Rita Mayer-Sommer |
Smartly Analyzing the Simplicity and the Power of Simple Power Analysis on Smartcards. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHES ![In: Cryptographic Hardware and Embedded Systems - CHES 2000, Second International Workshop, Worcester, MA, USA, August 17-18, 2000, Proceedings, pp. 78-92, 2000, Springer, 3-540-41455-X. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
35 | Jean-Sébastien Coron |
Resistance against Differential Power Analysis for Elliptic Curve Cryptosystems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHES ![In: Cryptographic Hardware and Embedded Systems, First International Workshop, CHES'99, Worcester, MA, USA, August 12-13, 1999, Proceedings, pp. 292-302, 1999, Springer, 3-540-66646-X. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
Elliptic curve, power consumption, Differential Power Analysis |
35 | Louis Goubin, Jacques Patarin |
DES and Differential Power Analysis (The "Duplication" Method). ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHES ![In: Cryptographic Hardware and Embedded Systems, First International Workshop, CHES'99, Worcester, MA, USA, August 12-13, 1999, Proceedings, pp. 158-172, 1999, Springer, 3-540-66646-X. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
|
35 | Xingbin Zhang, Andrew A. Chien |
Dynamic Pointer Alignment: Tiling and Communication Optimizations for Parallel Pointer-based Computations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PPoPP ![In: Proceedings of the Sixth ACM SIGPLAN Symposium on Principles & Practice of Parallel Programming (PPOPP), Las Vegas, Nevada, USA, June 18-21, 1997, pp. 37-47, 1997, ACM, 0-89791-906-8. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
|
34 | Jianping Quan, Guoqiang Bai 0001 |
A DPA-Resistant Digit-Parallel Modular Multiplier over GF (2m). ![Search on Bibsonomy](Pics/bibsonomy.png) |
ITNG ![In: Sixth International Conference on Information Technology: New Generations, ITNG 2009, Las Vegas, Nevada, USA, 27-29 April 2009, pp. 53-57, 2009, IEEE Computer Society, 978-0-7695-3596-8. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Modular multiplier, DPA-resistant, 1-bit masking, ECC, Architecture level |
30 | Minoru Saeki, Daisuke Suzuki, Koichi Shimizu, Akashi Satoh |
A Design Methodology for a DPA-Resistant Cryptographic LSI with RSL Techniques. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHES ![In: Cryptographic Hardware and Embedded Systems - CHES 2009, 11th International Workshop, Lausanne, Switzerland, September 6-9, 2009, Proceedings, pp. 189-204, 2009, Springer, 978-3-642-04137-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
30 | Alin Razafindraibe, Michel Robert, Philippe Maurine |
Formal Evaluation of the Robustness of Dual-Rail Logic Against DPA Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PATMOS ![In: Integrated Circuit and System Design. Power and Timing Modeling, Optimization and Simulation, 16th International Workshop, PATMOS 2006, Montpellier, France, September 13-15, 2006, Proceedings, pp. 634-644, 2006, Springer, 3-540-39094-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
30 | Alin Razafindraibe, Philippe Maurine, Michel Robert, Marc Renaudin |
Security evaluation of dual rail logic against DPA attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
VLSI-SoC ![In: IFIP VLSI-SoC 2006, IFIP WG 10.5 International Conference on Very Large Scale Integration of System-on-Chip, Nice, France, 16-18 October 2006, pp. 181-186, 2006, IEEE. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
30 | Yi Wang 0016, Jussipekka Leiwo, Thambipillai Srikanthan, Yu Yu |
FPGA based DPA-resistant Unified Architecture for Signcryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ITNG ![In: Third International Conference on Information Technology: New Generations (ITNG 2006), 10-12 April 2006, Las Vegas, Nevada, USA, pp. 571-572, 2006, IEEE Computer Society, 0-7695-2497-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
30 | Frédéric Amiel, Christophe Clavier, Michael Tunstall |
Fault Analysis of DPA-Resistant Algorithms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FDTC ![In: Fault Diagnosis and Tolerance in Cryptography, Third International Workshop, FDTC 2006, Yokohama, Japan, October 10, 2006, Proceedings, pp. 223-236, 2006, Springer, 3-540-46250-3. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
30 | Yoo-Jin Baek, Mi-Jung Noh |
DPA-Resistant Finite Field Multipliers and Secure AES Design. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISPEC ![In: Information Security Practice and Experience, Second International Conference, ISPEC 2006, Hangzhou, China, April 11-14, 2006, Proceedings, pp. 1-12, 2006, Springer, 3-540-33052-6. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
30 | G. Fraidy Bouesse, Gilles Sicard, Marc Renaudin |
Path Swapping Method to Improve DPA Resistance of Quasi Delay Insensitive Asynchronous Circuits. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHES ![In: Cryptographic Hardware and Embedded Systems - CHES 2006, 8th International Workshop, Yokohama, Japan, October 10-13, 2006, Proceedings, pp. 384-398, 2006, Springer, 3-540-46559-6. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
QDI Asynchronous circuits, Path Swapping (PS), Power analysis |
30 | Daniel Mesquita, Jean-Denis Techer, Lionel Torres, Michel Robert, Guy Cathébras, Gilles Sassatelli, Fernando Gehm Moraes |
Current Mask Generation: an Analog Circuit to Thwart DPA Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
VLSI-SoC ![In: VLSI-SoC: From Systems To Silicon, Proceedings of IFIP TC 10, WG 10.5, Thirteenth International Conference on Very Large Scale Integration of System on Chip (VLSI-SoC 2005), October 17-19, 2005, Perth, Australia, pp. 317-330, 2005, Springer, 978-0-387-73660-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
30 | Kris Tiri, Ingrid Verbauwhede |
A Logic Level Design Methodology for a Secure DPA Resistant ASIC or FPGA Implementation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DATE ![In: 2004 Design, Automation and Test in Europe Conference and Exposition (DATE 2004), 16-20 February 2004, Paris, France, pp. 246-251, 2004, IEEE Computer Society, 0-7695-2085-5. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
30 | Kris Tiri, Ingrid Verbauwhede |
Securing Encryption Algorithms against DPA at the Logic Level: Next Generation Smart Card Technology. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHES ![In: Cryptographic Hardware and Embedded Systems - CHES 2003, 5th International Workshop, Cologne, Germany, September 8-10, 2003, Proceedings, pp. 125-136, 2003, Springer, 3-540-40833-9. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
30 | Kouichi Itoh, Jun Yajima, Masahiko Takenaka, Naoya Torii |
DPA Countermeasures by Improving the Window Method. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHES ![In: Cryptographic Hardware and Embedded Systems - CHES 2002, 4th International Workshop, Redwood Shores, CA, USA, August 13-15, 2002, Revised Papers, pp. 303-317, 2002, Springer, 3-540-00409-2. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
30 | Rainer Steinwandt, Willi Geiselmann, Thomas Beth |
A Theoretical DPA-Based Cryptanalysis of the NESSIE Candidates FLASH and SFLASH. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 4th International Conference, ISC 2001, Malaga, Spain, October 1-3, 2001, Proceedings, pp. 280-293, 2001, Springer, 3-540-42662-0. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
30 | David May 0001, Henk L. Muller, Nigel P. Smart |
Random Register Renaming to Foil DPA. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHES ![In: Cryptographic Hardware and Embedded Systems - CHES 2001, Third International Workshop, Paris, France, May 14-16, 2001, Proceedings, pp. 28-38, 2001, Springer, 3-540-42521-7. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
28 | Laurent Sauvage, Sylvain Guilley, Yves Mathieu |
Electromagnetic Radiations of FPGAs: High Spatial Resolution Cartography and Attack on a Cryptographic Module. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Reconfigurable Technol. Syst. ![In: ACM Trans. Reconfigurable Technol. Syst. 2(1), pp. 4:1-4:24, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
EMA, security, FPGA, DPA, SCA, cartography |
28 | Felipe Ghellar, Marcelo Lubaszewski |
A novel AES cryptographic core highly resistant to differential power analysis attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SBCCI ![In: Proceedings of the 21st Annual Symposium on Integrated Circuits and Systems Design, SBCCI 2008, Gramado, Brazil, September 1-4, 2008, pp. 140-145, 2008, ACM, 978-1-60558-231-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
dpa, rijndael, isomorphisms, aes |
28 | Marco Bucci, Luca Giancane, Raimondo Luzzi, Alessandro Trifiletti |
A Dynamic and Differential CMOS Lookup Table with Data-Independent Power Consumption for Cryptographic Applications on Chip Cards. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Dependable Secur. Comput. ![In: IEEE Trans. Dependable Secur. Comput. 4(4), pp. 245-251, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
differential logic, dual rail logic, chip-cards, cryptography, differential power analysis, DPA, power analysis |
28 | Amir Moradi 0001, Mahmoud Salmasizadeh, Mohammad T. Manzuri Shalmani |
Power Analysis Attacks on MDPL and DRSL Implementations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISC ![In: Information Security and Cryptology - ICISC 2007, 10th International Conference, Seoul, Korea, November 29-30, 2007, Proceedings, pp. 259-272, 2007, Springer, 978-3-540-76787-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
DRSL, MDPL, Side-Channel Attacks, DPA, flip-flop |
28 | Wieland Fischer, Berndt M. Gammel, O. Kniffler, Joachim Velten |
Differential Power Analysis of Stream Ciphers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CT-RSA ![In: Topics in Cryptology - CT-RSA 2007, The Cryptographers' Track at the RSA Conference 2007, San Francisco, CA, USA, February 5-9, 2007, Proceedings, pp. 257-270, 2007, Springer, 3-540-69327-0. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
stream cipher, side-channel attack, DPA, power analysis, Trivium, Grain |
28 | Toru Akishita, Tsuyoshi Takagi |
Power Analysis to ECC Using Differential Power Between Multiplication and Squaring. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CARDIS ![In: Smart Card Research and Advanced Applications, 7th IFIP WG 8.8/11.2 International Conference, CARDIS 2006, Tarragona, Spain, April 19-21, 2006, Proceedings, pp. 151-164, 2006, Springer, 3-540-33311-8. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Smart cards, DPA, elliptic curve cryptosystems, power analysis, modular multiplication |
28 | Zhimin Chen, Yujie Zhou |
Dual-Rail Random Switching Logic: A Countermeasure to Reduce Side Channel Leakage. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHES ![In: Cryptographic Hardware and Embedded Systems - CHES 2006, 8th International Workshop, Yokohama, Japan, October 10-13, 2006, Proceedings, pp. 242-254, 2006, Springer, 3-540-46559-6. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Gate Level Masking, DRSL, Dual-Rail, Pre-charge, Side Channel Attacks, DPA |
28 | Marco Bucci, Luca Giancane, Raimondo Luzzi, Alessandro Trifiletti |
Three-Phase Dual-Rail Pre-charge Logic. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHES ![In: Cryptographic Hardware and Embedded Systems - CHES 2006, 8th International Workshop, Yokohama, Japan, October 10-13, 2006, Proceedings, pp. 232-241, 2006, Springer, 3-540-46559-6. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
dual-rail logic, SABL, security, DPA |
28 | Katsuyuki Okeya, Tetsu Iwata |
Side Channel Attacks on Message Authentication Codes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESAS ![In: Security and Privacy in Ad-hoc and Sensor Networks, Second European Workshop, ESAS 2005, Visegrad, Hungary, July 13-14, 2005, Revised Selected Papers, pp. 205-217, 2005, Springer, 3-540-30912-8. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Selective Forgery, MACs, Side Channel Attacks, DPA, SPA |
28 | Werner Schindler, Kerstin Lemke, Christof Paar |
A Stochastic Model for Differential Side Channel Cryptanalysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHES ![In: Cryptographic Hardware and Embedded Systems - CHES 2005, 7th International Workshop, Edinburgh, UK, August 29 - September 1, 2005, Proceedings, pp. 30-46, 2005, Springer, 3-540-28474-5. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Differential Side Channel Cryptanalysis, Minimum Principle, Maximum Likelihood Principle, Stochastic Model, DPA, Power Analysis, DEMA, Template Attack, Electromagnetic Analysis |
28 | Dong-Guk Han, Katsuyuki Okeya, Tae Hyun Kim 0003, Yoon Sung Hwang, Young-Ho Park 0001, Souhwan Jung |
Cryptanalysis of the Countermeasures Using Randomized Binary Signed Digits. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACNS ![In: Applied Cryptography and Network Security, Second International Conference, ACNS 2004, Yellow Mountain, China, June 8-11, 2004, Proceedings, pp. 398-413, 2004, Springer, 3-540-22217-0. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
BSD Representation, Ha-Moons Countermeasure, Ebeid-Hasans Countermeasure, Agagliates Countermeasure, Side Channel Attacks, DPA, Elliptic Curve Cryptosystem, SPA |
28 | ChangKyun Kim, JaeCheol Ha, Sung-Hyun Kim, Seokyu Kim, Sung-Ming Yen, Sang-Jae Moon |
A Secure and Practical CRT-Based RSA to Resist Side Channel Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSA (1) ![In: Computational Science and Its Applications - ICCSA 2004, International Conference, Assisi, Italy, May 14-17, 2004, Proceedings, Part I, pp. 150-158, 2004, Springer, 3-540-22054-2. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
Smart card, RSA, Side channel attack, DPA, CRT, Fault attack |
28 | Colin D. Walter |
Issues of Security with the Oswald-Aigner Exponentiation Algorithm. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CT-RSA ![In: Topics in Cryptology - CT-RSA 2004, The Cryptographers' Track at the RSA Conference 2004, San Francisco, CA, USA, February 23-27, 2004, Proceedings, pp. 208-221, 2004, Springer, 3-540-20996-4. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
Addition-subtraction chains, randomized exponentiation, elliptic curve cryptography, ECC, DPA, blinding, power analysis, smartcard, SPA, DEMA, point multiplication, SEMA |
28 | Eric Brier, Christophe Clavier, Francis Olivier |
Correlation Power Analysis with a Leakage Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHES ![In: Cryptographic Hardware and Embedded Systems - CHES 2004: 6th International Workshop Cambridge, MA, USA, August 11-13, 2004. Proceedings, pp. 16-29, 2004, Springer, 3-540-22666-4. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
Correlation factor, secure cryptographic device, AES, DPA, power analysis, DES, Hamming distance, side channel, CPA |
28 | Colin D. Walter |
Longer Keys May Facilitate Side Channel Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Selected Areas in Cryptography ![In: Selected Areas in Cryptography, 10th Annual International Workshop, SAC 2003, Ottawa, Canada, August 14-15, 2003, Revised Papers, pp. 42-57, 2003, Springer, 3-540-21370-8. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
Key Length, Side Channel Attacks, DPA, Power Analysis, Timing Attack, RSA Cryptosystem |
28 | Mehdi-Laurent Akkar, Nicolas T. Courtois, Romain Duteuil, Louis Goubin |
A Fast and Secure Implementation of Sflash. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public Key Cryptography - PKC 2003, 6th International Workshop on Theory and Practice in Public Key Cryptography, Miami, FL, USA, January 6-8, 2003, Proceedings, pp. 267-278, 2003, Springer, 3-540-00324-X. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
Matsumoto-Imai cryptosystem C*, C*- trapdoor function, Digital Signatures, Smart cards, DPA, PKI, Power Analysis, SPA, portable devices, Addition Chains, Multivariate Cryptography, HFE |
28 | Katsuyuki Okeya, Dong-Guk Han |
Side Channel Attack on Ha-Moon's Countermeasure of Randomized Signed Scalar Multiplication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INDOCRYPT ![In: Progress in Cryptology - INDOCRYPT 2003, 4th International Conference on Cryptology in India, New Delhi, India, December 8-10, 2003, Proceedings, pp. 334-348, 2003, Springer, 3-540-20609-4. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
Ha-Moons Countermeasure, Finite Markov Chain, Side Channel Attacks, DPA, Elliptic Curve Cryptosystem, SPA |
28 | Colin D. Walter |
Seeing through MIST Given a Small Fraction of an RSA Private Key. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CT-RSA ![In: Topics in Cryptology - CT-RSA 2003, The Cryptographers' Track at the RSA Conference 2003, San Francisco, CA, USA, April 13-17, 2003, Proceedings, pp. 391-402, 2003, Springer, 3-540-00847-0. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
division chains, randomized exponentiation, Mist, randomary exponentiation, RSA, DPA, blinding, power analysis, smartcard, SPA, Addition chains, DEMA, side channel leakage, SEMA |
28 | Colin D. Walter |
MIST: An Efficient, Randomized Exponentiation Algorithm for Resisting Power Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CT-RSA ![In: Topics in Cryptology - CT-RSA 2002, The Cryptographer's Track at the RSA Conference, 2002, San Jose, CA, USA, February 18-22, 2002, Proceedings, pp. 53-66, 2002, Springer, 3-540-43224-8. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
Mist exponentiation algorithm, division chains, smart card, DPA, blinding, power analysis, addition chains |
28 | Colin D. Walter |
Precise Bounds for Montgomery Modular Multiplication and Some Potentially Insecure RSA Moduli. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CT-RSA ![In: Topics in Cryptology - CT-RSA 2002, The Cryptographer's Track at the RSA Conference, 2002, San Jose, CA, USA, February 18-22, 2002, Proceedings, pp. 30-39, 2002, Springer, 3-540-43224-8. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
Cryptography, differential power analysis, DPA, RSA cryptosystem, Montgomery modular multiplication |
28 | Colin D. Walter |
Some Security Aspects of the M IST Randomized Exponentiation Algorithm. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHES ![In: Cryptographic Hardware and Embedded Systems - CHES 2002, 4th International Workshop, Redwood Shores, CA, USA, August 13-15, 2002, Revised Papers, pp. 276-290, 2002, Springer, 3-540-00409-2. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
Randomary exponentiation, Mist exponentiation algorithm, division chains, DPA, blinding, power analysis, smartcard, addition chains, DEMA |
28 | Jean-Jacques Quisquater, David Samyde |
ElectroMagnetic Analysis (EMA): Measures and Counter-Measures for Smart Cards. ![Search on Bibsonomy](Pics/bibsonomy.png) |
E-smart ![In: Smart Card Programming and Security, International Conference on Research in Smart Cards, E-smart 2001, Cannes, France, September 19-21, 2001, Proceedings, pp. 200-210, 2001, Springer, 3-540-42610-8. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
electromagnetic and power analysis, DPA, smartcard, SPA, tamper resistance, DEMA, SEMA |
28 | Karine Gandolfi, Christophe Mourtel, Francis Olivier |
Electromagnetic Analysis: Concrete Results. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHES ![In: Cryptographic Hardware and Embedded Systems - CHES 2001, Third International Workshop, Paris, France, May 14-16, 2001, Proceedings, pp. 251-261, 2001, Springer, 3-540-42521-7. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
smart cards, DPA, SPA, DEMA, side channel leakage, SEMA, electromagnetic analysis |
28 | Mehdi-Laurent Akkar, Régis Bevan, Paul Dischamp, Didier Moyart |
Power Analysis, What Is Now Possible.... ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT ![In: Advances in Cryptology - ASIACRYPT 2000, 6th International Conference on the Theory and Application of Cryptology and Information Security, Kyoto, Japan, December 3-7, 2000, Proceedings, pp. 489-502, 2000, Springer, 3-540-41404-5. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
dpa, spa, smart-cards, power analysis |
28 | Adi Shamir |
Protecting Smart Cards from Passive Power Analysis with Detached Power Supplies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHES ![In: Cryptographic Hardware and Embedded Systems - CHES 2000, Second International Workshop, Worcester, MA, USA, August 17-18, 2000, Proceedings, pp. 71-77, 2000, Springer, 3-540-41455-X. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
Smart cards, DPA, power analysis, SPA |
28 | Paul C. Kocher, Joshua Jaffe, Benjamin Jun |
Differential Power Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO '99, 19th Annual International Cryptology Conference, Santa Barbara, California, USA, August 15-19, 1999, Proceedings, pp. 388-397, 1999, Springer, 3-540-66347-9. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
cryptanalysis, differential power analysis, DPA, DES, SPA |
28 | Colin D. Walter |
Montgomery's Multiplication Technique: How to Make It Smaller and Faster. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHES ![In: Cryptographic Hardware and Embedded Systems, First International Workshop, CHES'99, Worcester, MA, USA, August 12-13, 1999, Proceedings, pp. 80-93, 1999, Springer, 3-540-66646-X. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
higher radix methods, checker function, fault tolerance, testing, cryptography, RSA, Computer arithmetic, systolic arrays, error correction, differential power analysis, DPA, Montgomery modular multiplication |
27 | Omid Mirmotahari, Yngvar Berg |
Low Voltage Design against Power Analysis Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DELTA ![In: 4th IEEE International Symposium on Electronic Design, Test and Applications, DELTA 2008, Hong Kong, January 23-25, 2008, pp. 545-548, 2008, IEEE Computer Society, 978-0-7695-3110-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Low Voltage (LV), Floating-Gate (FG) and supply current analysis, Differential Power Analysis (DPA), Ultra Low Voltage (ULV) |
27 | Benedikt Gierlichs, Lejla Batina, Pim Tuyls, Bart Preneel |
Mutual Information Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHES ![In: Cryptographic Hardware and Embedded Systems - CHES 2008, 10th International Workshop, Washington, D.C., USA, August 10-13, 2008. Proceedings, pp. 426-442, 2008, Springer, 978-3-540-85052-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Differential Side-Channel Analysis (DSCA), DPA-resistant logic, Information Theory, Mutual Information |
27 | ManKi Ahn, Hoon-Jae Lee 0001 |
Experiments and Hardware Countermeasures on Power Analysis Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSA (3) ![In: Computational Science and Its Applications - ICCSA 2006, International Conference, Glasgow, UK, May 8-11, 2006, Proceedings, Part III, pp. 48-53, 2006, Springer, 3-540-34075-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
SPA/DPA, Side Channel Attacks, Power Analysis, SmartCard, Countermeasure |
27 | Sung-Ming Yen, Chien-Ning Chen, Sang-Jae Moon, JaeCheol Ha |
Improvement on Ha-Moon Randomized Exponentiation Algorithm. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISC ![In: Information Security and Cryptology - ICISC 2004, 7th International Conference, Seoul, Korea, December 2-3, 2004, Revised Selected Papers, pp. 154-167, 2004, Springer, 3-540-26226-1. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
Randomized recoding, Signed-digit recoding, Side-channel attack, Differential power analysis (DPA), Simple power analysis (SPA), Modular exponentiation, Physical cryptanalysis |
27 | Hoon-Jae Lee 0001, ManKi Ahn, Seongan Lim, Sang-Jae Moon |
A Study on Smart Card Security Evaluation Criteria for Side Channel Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSA (1) ![In: Computational Science and Its Applications - ICCSA 2004, International Conference, Assisi, Italy, May 14-17, 2004, Proceedings, Part I, pp. 517-526, 2004, Springer, 3-540-22054-2. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
Protection Profiles, Vulnerability Assessment Activities, SPA/DPA, Smart Card, Side Channel Attacks, Common Criteria |
27 | Roberto Maria Avanzi |
Countermeasures against Differential Power Analysis for Hyperelliptic Curve Cryptosystems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHES ![In: Cryptographic Hardware and Embedded Systems - CHES 2003, 5th International Workshop, Cologne, Germany, September 8-10, 2003, Proceedings, pp. 366-381, 2003, Springer, 3-540-40833-9. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
Smart cards, Side-channel attacks, Public-key cryptography, Differential power analysis (DPA), Timing attacks, Hyperelliptic curves |
27 | Pierre-Alain Fouque, Frédéric Valette |
The Doubling Attack - Why Upwards Is Better than Downwards. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHES ![In: Cryptographic Hardware and Embedded Systems - CHES 2003, 5th International Workshop, Cologne, Germany, September 8-10, 2003, Proceedings, pp. 269-280, 2003, Springer, 3-540-40833-9. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
SPA-based analysis, DPA countermeasures, multiple exponent single data attack, scalar multiplication, modular exponentiation |
27 | Marc Joye, Christophe Tymen |
Protections against Differential Analysis for Elliptic Curve Cryptography. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHES ![In: Cryptographic Hardware and Embedded Systems - CHES 2001, Third International Workshop, Paris, France, May 14-16, 2001, Proceedings, pp. 377-390, 2001, Springer, 3-540-42521-7. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
Smart-cards, Side-channel attacks, Public-key cryptography, Elliptic curves, Differential power analysis (DPA), Timing attacks |
23 | Yuan Yao 0004, Kailong Zhang, Xingshe Zhou 0001 |
A Novel Parameter Learning Algorithm for a Self-constructing Fuzzy Neural Network Design. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACIS-ICIS ![In: 8th IEEE/ACIS International Conference on Computer and Information Science, IEEE/ACIS ICIS 2009, June 1-3, 2009, Shanghai, China, pp. 77-81, 2009, IEEE Computer Society, 978-0-7695-3641-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
23 | Philipp Grabher, Johann Großschädl, Dan Page |
Non-deterministic processors: FPGA-based analysis of area, performance and security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WESS ![In: Proceedings of the 4th Workshop on Embedded Systems Security, WESS 2009, Grenoble, France, October 15, 2009, 2009, ACM, 978-1-60558-700-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
micro-architectural countermeasures, non-deterministic processors, side-channel attack, processor design |
23 | Amir Moradi 0001, Mehrdad Khatir, Mahmoud Salmasizadeh, Mohammad T. Manzuri Shalmani |
Charge recovery logic as a side channel attack countermeasure. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISQED ![In: 10th International Symposium on Quality of Electronic Design (ISQED 2009), 16-18 March 2009, San Jose, CA, USA, pp. 686-691, 2009, IEEE Computer Society, 978-1-4244-2952-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
23 | Chun-Fan Tsai, Chung-Ju Chang, Fang-Ching Ren, Chin-Ming Yen |
Adaptive radio resource allocation for downlink OFDMA/SDMA systems with multimedia traffic. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Wirel. Commun. ![In: IEEE Trans. Wirel. Commun. 7(5-1), pp. 1734-1743, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
23 | Song Sun, Zijun Yan, Joseph Zambreno |
Experiments in attacking FPGA-based embedded systems using differential power analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EIT ![In: 2008 IEEE International Conference on Electro/Information Technology, EIT 2008, held at Iowa State University, Ames, Iowa, USA, May 18-20, 2008, pp. 7-12, 2008, IEEE, 978-1-4244-2030-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
23 | Furuzan Atay Onat, Ivan Stojmenovic |
Generating Random Graphs for Wireless Actuator Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WOWMOM ![In: 2007 International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM 2007), 18-21 June 2007, Helsinki, Finland, Proceedings, pp. 1-12, 2007, IEEE Computer Society, 1-4244-0992-6. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
23 | Robert P. McEvoy, Michael Tunstall, Colin C. Murphy, William P. Marnane |
Differential Power Analysis of HMAC Based on SHA-2, and Countermeasures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISA ![In: Information Security Applications, 8th International Workshop, WISA 2007, Jeju Island, Korea, August 27-29, 2007, Revised Selected Papers, pp. 317-332, 2007, Springer, 978-3-540-77534-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
23 | Chong Hee Kim, Jean-Jacques Quisquater |
How can we overcome both side channel analysis and fault attacks on RSA-CRT? ![Search on Bibsonomy](Pics/bibsonomy.png) |
FDTC ![In: Fourth International Workshop on Fault Diagnosis and Tolerance in Cryptography, 2007, FDTC 2007: Vienna, Austria, 10 September 2007, pp. 21-29, 2007, IEEE Computer Society, 0-7695-2982-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
23 | Jude Angelo Ambrose, Roshan G. Ragel, Sri Parameswaran |
RIJID: Random Code Injection to Mask Power Analysis based Side Channel Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DAC ![In: Proceedings of the 44th Design Automation Conference, DAC 2007, San Diego, CA, USA, June 4-8, 2007, pp. 489-492, 2007, IEEE. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
23 | Tae Hyun Kim 0003, Dong-Guk Han, Katsuyuki Okeya, Jongin Lim 0001 |
Generic Cryptanalysis of Combined Countermeasures with Randomized BSD Representations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CARDIS ![In: Smart Card Research and Advanced Applications, 7th IFIP WG 8.8/11.2 International Conference, CARDIS 2006, Tarragona, Spain, April 19-21, 2006, Proceedings, pp. 119-134, 2006, Springer, 3-540-33311-8. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
23 | Nicolas T. Courtois, Louis Goubin |
An Algebraic Masking Method to Protect AES Against Power Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISC ![In: Information Security and Cryptology - ICISC 2005, 8th International Conference, Seoul, Korea, December 1-2, 2005, Revised Selected Papers, pp. 199-209, 2005, Springer, 3-540-33354-1. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
23 | Huiyun Li, A. Theodore Markettos, Simon W. Moore |
Security Evaluation Against Electromagnetic Analysis at Design Time. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHES ![In: Cryptographic Hardware and Embedded Systems - CHES 2005, 7th International Workshop, Edinburgh, UK, August 29 - September 1, 2005, Proceedings, pp. 280-292, 2005, Springer, 3-540-28474-5. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
EM side-channel analysis, design time security evaluation, smart card |
23 | Kris Tiri, David D. Hwang, Alireza Hodjat, Bo-Cheng Lai, Shenglin Yang, Patrick Schaumont, Ingrid Verbauwhede |
A side-channel leakage free coprocessor IC in 0.18µm CMOS for embedded AES-based cryptographic and biometric processing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DAC ![In: Proceedings of the 42nd Design Automation Conference, DAC 2005, San Diego, CA, USA, June 13-17, 2005, pp. 222-227, 2005, ACM, 1-59593-058-2. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
security IC, encryption, smart card, side-channel attack, differential power analysis, countermeasure |
23 | Girish B. Ratanpal, Ronald D. Williams, Travis N. Blalock |
An On-Chip Signal Suppression Countermeasure to Power Analysis Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Dependable Secur. Comput. ![In: IEEE Trans. Dependable Secur. Comput. 1(3), pp. 179-189, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
VLSI, smartcards, DES, security and protection, Power analysis attacks, code breaking |
23 | François-Xavier Standaert, Siddika Berna Örs, Jean-Jacques Quisquater, Bart Preneel |
Power Analysis Attacks Against FPGA Implementations of the DES. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FPL ![In: Field Programmable Logic and Application, 14th International Conference , FPL 2004, Leuven, Belgium, August 30-September 1, 2004, Proceedings, pp. 84-94, 2004, Springer, 3-540-22989-2. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
23 | Mehdi-Laurent Akkar, Régis Bevan, Louis Goubin |
Two Power Analysis Attacks against One-Mask Methods. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FSE ![In: Fast Software Encryption, 11th International Workshop, FSE 2004, Delhi, India, February 5-7, 2004, Revised Papers, pp. 332-347, 2004, Springer, 3-540-22171-9. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
23 | Toru Akishita, Tsuyoshi Takagi |
Zero-Value Point Attacks on Elliptic Curve Cryptosystem. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 6th International Conference, ISC 2003, Bristol, UK, October 1-3, 2003, Proceedings, pp. 218-233, 2003, Springer, 3-540-20176-9. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
addition formula, zero-value register, side channel attack, differential power analysis, elliptic curve cryptosystem |
23 | Roman Novak |
Sign-Based Differential Power Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISA ![In: Information Security Applications, 4th International Workshop, WISA 2003, Jeju Island, Korea, August 25-27, 2003, Revised Papers, pp. 203-216, 2003, Springer, 3-540-20827-5. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
23 | Katsuyuki Okeya, Tsuyoshi Takagi |
A More Flexible Countermeasure against Side Channel Attacks Using Window Method. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHES ![In: Cryptographic Hardware and Embedded Systems - CHES 2003, 5th International Workshop, Cologne, Germany, September 8-10, 2003, Proceedings, pp. 397-410, 2003, Springer, 3-540-40833-9. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
Width-w NAF, Fractional window, Pre-computation Table, Smart Card, Side Channel Attacks, Elliptic Curve Cryptosystem, Memory Constraint |
23 | Suresh Chari, Josyula R. Rao, Pankaj Rohatgi |
Template Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHES ![In: Cryptographic Hardware and Embedded Systems - CHES 2002, 4th International Workshop, Redwood Shores, CA, USA, August 13-15, 2002, Revised Papers, pp. 13-28, 2002, Springer, 3-540-00409-2. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
23 | Leigh J. Fitzgibbon, Lloyd Allison, David L. Dowe |
Minimum Message Length Grouping of Ordered Data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ALT ![In: Algorithmic Learning Theory, 11th International Conference, ALT 2000, Sydney, Australia, December 11-13, 2000, Proceedings, pp. 56-70, 2000, Springer, 3-540-41237-9. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
23 | Fu-Chiung Cheng, Huei-Huang Chen, Jiin-Hwai Perng |
Parallel execution on production systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SPDP ![In: Proceedings of the Second IEEE Symposium on Parallel and Distributed Processing, SPDP 1990, Dallas, Texas, USA, December 9-13, 1990., pp. 463-470, 1990, IEEE Computer Society, 0-8186-2087-0. The full citation details ...](Pics/full.jpeg) |
1990 |
DBLP DOI BibTeX RDF |
|
18 | Fenggen Yu, Yiming Qian, Xu Zhang, Francisca Gil-Ureta, Brian Jackson, Eric Bennett, Hao Zhang |
DPA-Net: Structured 3D Abstraction from Sparse Views via Differentiable Primitive Assembly. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2404.00875, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
18 | Estuardo Alpirez Bock, Gustavo Banegas, Chris Brzuska, Lukasz Chmielewski, Kirthivaasan Puniamurthy, Milan Sorf |
Breaking DPA-Protected Kyber via the Pair-Pointwise Multiplication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACNS (2) ![In: Applied Cryptography and Network Security - 22nd International Conference, ACNS 2024, Abu Dhabi, United Arab Emirates, March 5-8, 2024, Proceedings, Part II, pp. 101-130, 2024, Springer, 978-3-031-54772-0. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
18 | Zhongyi Shui, Sunyi Zheng, Chenglu Zhu, Shichuan Zhang, Xiaoxuan Yu, Honglin Li 0001, Jingxiong Li, Pingyi Chen, Lin Yang |
DPA-P2PNet: Deformable Proposal-Aware P2PNet for Accurate Point-Based Cell Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AAAI ![In: Thirty-Eighth AAAI Conference on Artificial Intelligence, AAAI 2024, Thirty-Sixth Conference on Innovative Applications of Artificial Intelligence, IAAI 2024, Fourteenth Symposium on Educational Advances in Artificial Intelligence, EAAI 2014, February 20-27, 2024, Vancouver, Canada, pp. 4864-4872, 2024, AAAI Press. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
18 | Ruizhi Yu, Yan Li |
PICT-DPA: A Quality-Compliance Data Processing Architecture. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HICSS ![In: 57th Hawaii International Conference on System Sciences, HICSS 2024, Hilton Hawaiian Village Waikiki Beach Resort, Hawaii, USA, January 3-6, 2024, pp. 5731-5740, 2024, ScholarSpace, 978-0-9981331-7-1. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP BibTeX RDF |
|
18 | Yuqian Wang, JianWei Ma, Axyonov Sergey, Shaofei Zang, Miao Zhang |
DPA-UNet rectal cancer image segmentation based on visual attention. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Concurr. Comput. Pract. Exp. ![In: Concurr. Comput. Pract. Exp. 35(21), 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Daniel Heinz, Thomas Pöppelmann |
Combined Fault and DPA Protection for Lattice-Based Cryptography. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Computers ![In: IEEE Trans. Computers 72(4), pp. 1055-1066, April 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Renuka Chowdary Bheemana, Aditya Japa, Siva Sankar Yellampalli, Ramesh Vaddi |
Negative capacitance FET based energy efficient and DPA attack resilient ultra-light weight block cipher design. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Microelectron. J. ![In: Microelectron. J. 133, pp. 105711, March 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Ziheng Wang, Atem Aguer, Amir Ziai |
DPA Load Balancer: Load balancing for Data Parallel Actor-based systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2308.00938, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Mohammad Gholamzadeh, Behrooz Khadem |
A Hybrid Image Encryption Scheme based on Chaos and a DPA-Resistant Sbox. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2312.15280, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
Displaying result #101 - #200 of 585 (100 per page; Change: ) Pages: [ <<][ 1][ 2][ 3][ 4][ 5][ 6][ >>] |
|