|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 576 occurrences of 189 keywords
|
|
|
Results
Found 585 publication records. Showing 585 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
35 | Guillaume Fumaroli, Emmanuel Mayer, Renaud Dubois |
First-Order Differential Power Analysis on the Duplication Method. |
INDOCRYPT |
2007 |
DBLP DOI BibTeX RDF |
zero attack, differential power analysis, spectral analysis, Side-channel analysis |
35 | Elisabeth Oswald, Stefan Mangard |
Template Attacks on Masking - Resistance Is Futile. |
CT-RSA |
2007 |
DBLP DOI BibTeX RDF |
|
35 | Catherine H. Gebotys |
A table masking countermeasure for low-energy secure embedded systems. |
IEEE Trans. Very Large Scale Integr. Syst. |
2006 |
DBLP DOI BibTeX RDF |
|
35 | Catherine H. Gebotys |
A split-mask countermeasure for low-energy secure embedded systems. |
ACM Trans. Embed. Comput. Syst. |
2006 |
DBLP DOI BibTeX RDF |
EM analysis, Side channel analysis, countermeasures, power attacks |
35 | Wen-Syan Li, Daniel C. Zilio, Vishal S. Batra, Mahadevan Subramanian, Calisto Zuzarte, Inderpal Narang |
Load Balancing for Multi-tiered Database Systems through Autonomic Placement of Materialized Views. |
ICDE |
2006 |
DBLP DOI BibTeX RDF |
|
35 | Kwangil Lee, Tim S. Yao |
Dynamic Path Adaptation Routing Protocol for Mobile Ad Hoc Networks. |
VTC Spring |
2006 |
DBLP DOI BibTeX RDF |
|
35 | Zhanrong Yang, Radu Muresan |
The Impact of the Implementation Style on Power Consumption and Security in Embedded Cryptosystems. |
CCECE |
2006 |
DBLP DOI BibTeX RDF |
|
35 | Kay C. Wiese, Andrew Hendriks, Jagdeep Poonian |
Algorithms for RNA folding: a comparison of dynamic programming and parallel evolutionary algorithms. |
Congress on Evolutionary Computation |
2005 |
DBLP DOI BibTeX RDF |
|
35 | Jiqiang Lv, Yongfei Han |
Enhanced DES Implementation Secure Against High-Order Differential Power Analysis in Smartcards. |
ACISP |
2005 |
DBLP DOI BibTeX RDF |
|
35 | Pao-Lung Chen, Ching-Che Chung, Chen-Yi Lee |
An all-digital PLL with cascaded dynamic phase average loop for wide multiplication range applications. |
ISCAS (5) |
2005 |
DBLP DOI BibTeX RDF |
|
35 | Stefan Mangard, Thomas Popp, Berndt M. Gammel |
Side-Channel Leakage of Masked CMOS Gates. |
CT-RSA |
2005 |
DBLP DOI BibTeX RDF |
|
35 | Dakshi Agrawal, Josyula R. Rao, Pankaj Rohatgi, Kai Schramm |
Templates as Master Keys. |
CHES |
2005 |
DBLP DOI BibTeX RDF |
|
35 | Stefan Mangard, Norbert Pramstaller, Elisabeth Oswald |
Successfully Attacking Masked AES Hardware Implementations. |
CHES |
2005 |
DBLP DOI BibTeX RDF |
|
35 | Katsuyuki Okeya, Tsuyoshi Takagi, Camille Vuillaume |
On the Importance of Protecting Delta in SFLASH against Side Channel Attacks. |
ITCC (2) |
2004 |
DBLP DOI BibTeX RDF |
Asymmetric Signature, C *, C *-, Hidden Monomial Problem, Side Channel Attacks, SHA-1, SFLASH |
35 | Sung-Ming Yen |
Amplified Differential Power Cryptanalysis on Rijndael Implementations with Exponentially Fewer Power Traces. |
ACISP |
2003 |
DBLP DOI BibTeX RDF |
|
35 | Louis Goubin |
A Sound Method for Switching between Boolean and Arithmetic Masking. |
CHES |
2001 |
DBLP DOI BibTeX RDF |
Physical attacks, Masking Techniques, AES, Differential Power Analysis, Smartcards, IDEA, Electric consumption |
35 | Rita Mayer-Sommer |
Smartly Analyzing the Simplicity and the Power of Simple Power Analysis on Smartcards. |
CHES |
2000 |
DBLP DOI BibTeX RDF |
|
35 | Jean-Sébastien Coron |
Resistance against Differential Power Analysis for Elliptic Curve Cryptosystems. |
CHES |
1999 |
DBLP DOI BibTeX RDF |
Elliptic curve, power consumption, Differential Power Analysis |
35 | Louis Goubin, Jacques Patarin |
DES and Differential Power Analysis (The "Duplication" Method). |
CHES |
1999 |
DBLP DOI BibTeX RDF |
|
35 | Xingbin Zhang, Andrew A. Chien |
Dynamic Pointer Alignment: Tiling and Communication Optimizations for Parallel Pointer-based Computations. |
PPoPP |
1997 |
DBLP DOI BibTeX RDF |
|
34 | Jianping Quan, Guoqiang Bai 0001 |
A DPA-Resistant Digit-Parallel Modular Multiplier over GF (2m). |
ITNG |
2009 |
DBLP DOI BibTeX RDF |
Modular multiplier, DPA-resistant, 1-bit masking, ECC, Architecture level |
30 | Minoru Saeki, Daisuke Suzuki, Koichi Shimizu, Akashi Satoh |
A Design Methodology for a DPA-Resistant Cryptographic LSI with RSL Techniques. |
CHES |
2009 |
DBLP DOI BibTeX RDF |
|
30 | Alin Razafindraibe, Michel Robert, Philippe Maurine |
Formal Evaluation of the Robustness of Dual-Rail Logic Against DPA Attacks. |
PATMOS |
2006 |
DBLP DOI BibTeX RDF |
|
30 | Alin Razafindraibe, Philippe Maurine, Michel Robert, Marc Renaudin |
Security evaluation of dual rail logic against DPA attacks. |
VLSI-SoC |
2006 |
DBLP DOI BibTeX RDF |
|
30 | Yi Wang 0016, Jussipekka Leiwo, Thambipillai Srikanthan, Yu Yu |
FPGA based DPA-resistant Unified Architecture for Signcryption. |
ITNG |
2006 |
DBLP DOI BibTeX RDF |
|
30 | Frédéric Amiel, Christophe Clavier, Michael Tunstall |
Fault Analysis of DPA-Resistant Algorithms. |
FDTC |
2006 |
DBLP DOI BibTeX RDF |
|
30 | Yoo-Jin Baek, Mi-Jung Noh |
DPA-Resistant Finite Field Multipliers and Secure AES Design. |
ISPEC |
2006 |
DBLP DOI BibTeX RDF |
|
30 | G. Fraidy Bouesse, Gilles Sicard, Marc Renaudin |
Path Swapping Method to Improve DPA Resistance of Quasi Delay Insensitive Asynchronous Circuits. |
CHES |
2006 |
DBLP DOI BibTeX RDF |
QDI Asynchronous circuits, Path Swapping (PS), Power analysis |
30 | Daniel Mesquita, Jean-Denis Techer, Lionel Torres, Michel Robert, Guy Cathébras, Gilles Sassatelli, Fernando Gehm Moraes |
Current Mask Generation: an Analog Circuit to Thwart DPA Attacks. |
VLSI-SoC |
2005 |
DBLP DOI BibTeX RDF |
|
30 | Kris Tiri, Ingrid Verbauwhede |
A Logic Level Design Methodology for a Secure DPA Resistant ASIC or FPGA Implementation. |
DATE |
2004 |
DBLP DOI BibTeX RDF |
|
30 | Kris Tiri, Ingrid Verbauwhede |
Securing Encryption Algorithms against DPA at the Logic Level: Next Generation Smart Card Technology. |
CHES |
2003 |
DBLP DOI BibTeX RDF |
|
30 | Kouichi Itoh, Jun Yajima, Masahiko Takenaka, Naoya Torii |
DPA Countermeasures by Improving the Window Method. |
CHES |
2002 |
DBLP DOI BibTeX RDF |
|
30 | Rainer Steinwandt, Willi Geiselmann, Thomas Beth |
A Theoretical DPA-Based Cryptanalysis of the NESSIE Candidates FLASH and SFLASH. |
ISC |
2001 |
DBLP DOI BibTeX RDF |
|
30 | David May 0001, Henk L. Muller, Nigel P. Smart |
Random Register Renaming to Foil DPA. |
CHES |
2001 |
DBLP DOI BibTeX RDF |
|
28 | Laurent Sauvage, Sylvain Guilley, Yves Mathieu |
Electromagnetic Radiations of FPGAs: High Spatial Resolution Cartography and Attack on a Cryptographic Module. |
ACM Trans. Reconfigurable Technol. Syst. |
2009 |
DBLP DOI BibTeX RDF |
EMA, security, FPGA, DPA, SCA, cartography |
28 | Felipe Ghellar, Marcelo Lubaszewski |
A novel AES cryptographic core highly resistant to differential power analysis attacks. |
SBCCI |
2008 |
DBLP DOI BibTeX RDF |
dpa, rijndael, isomorphisms, aes |
28 | Marco Bucci, Luca Giancane, Raimondo Luzzi, Alessandro Trifiletti |
A Dynamic and Differential CMOS Lookup Table with Data-Independent Power Consumption for Cryptographic Applications on Chip Cards. |
IEEE Trans. Dependable Secur. Comput. |
2007 |
DBLP DOI BibTeX RDF |
differential logic, dual rail logic, chip-cards, cryptography, differential power analysis, DPA, power analysis |
28 | Amir Moradi 0001, Mahmoud Salmasizadeh, Mohammad T. Manzuri Shalmani |
Power Analysis Attacks on MDPL and DRSL Implementations. |
ICISC |
2007 |
DBLP DOI BibTeX RDF |
DRSL, MDPL, Side-Channel Attacks, DPA, flip-flop |
28 | Wieland Fischer, Berndt M. Gammel, O. Kniffler, Joachim Velten |
Differential Power Analysis of Stream Ciphers. |
CT-RSA |
2007 |
DBLP DOI BibTeX RDF |
stream cipher, side-channel attack, DPA, power analysis, Trivium, Grain |
28 | Toru Akishita, Tsuyoshi Takagi |
Power Analysis to ECC Using Differential Power Between Multiplication and Squaring. |
CARDIS |
2006 |
DBLP DOI BibTeX RDF |
Smart cards, DPA, elliptic curve cryptosystems, power analysis, modular multiplication |
28 | Zhimin Chen, Yujie Zhou |
Dual-Rail Random Switching Logic: A Countermeasure to Reduce Side Channel Leakage. |
CHES |
2006 |
DBLP DOI BibTeX RDF |
Gate Level Masking, DRSL, Dual-Rail, Pre-charge, Side Channel Attacks, DPA |
28 | Marco Bucci, Luca Giancane, Raimondo Luzzi, Alessandro Trifiletti |
Three-Phase Dual-Rail Pre-charge Logic. |
CHES |
2006 |
DBLP DOI BibTeX RDF |
dual-rail logic, SABL, security, DPA |
28 | Katsuyuki Okeya, Tetsu Iwata |
Side Channel Attacks on Message Authentication Codes. |
ESAS |
2005 |
DBLP DOI BibTeX RDF |
Selective Forgery, MACs, Side Channel Attacks, DPA, SPA |
28 | Werner Schindler, Kerstin Lemke, Christof Paar |
A Stochastic Model for Differential Side Channel Cryptanalysis. |
CHES |
2005 |
DBLP DOI BibTeX RDF |
Differential Side Channel Cryptanalysis, Minimum Principle, Maximum Likelihood Principle, Stochastic Model, DPA, Power Analysis, DEMA, Template Attack, Electromagnetic Analysis |
28 | Dong-Guk Han, Katsuyuki Okeya, Tae Hyun Kim 0003, Yoon Sung Hwang, Young-Ho Park 0001, Souhwan Jung |
Cryptanalysis of the Countermeasures Using Randomized Binary Signed Digits. |
ACNS |
2004 |
DBLP DOI BibTeX RDF |
BSD Representation, Ha-Moons Countermeasure, Ebeid-Hasans Countermeasure, Agagliates Countermeasure, Side Channel Attacks, DPA, Elliptic Curve Cryptosystem, SPA |
28 | ChangKyun Kim, JaeCheol Ha, Sung-Hyun Kim, Seokyu Kim, Sung-Ming Yen, Sang-Jae Moon |
A Secure and Practical CRT-Based RSA to Resist Side Channel Attacks. |
ICCSA (1) |
2004 |
DBLP DOI BibTeX RDF |
Smart card, RSA, Side channel attack, DPA, CRT, Fault attack |
28 | Colin D. Walter |
Issues of Security with the Oswald-Aigner Exponentiation Algorithm. |
CT-RSA |
2004 |
DBLP DOI BibTeX RDF |
Addition-subtraction chains, randomized exponentiation, elliptic curve cryptography, ECC, DPA, blinding, power analysis, smartcard, SPA, DEMA, point multiplication, SEMA |
28 | Eric Brier, Christophe Clavier, Francis Olivier |
Correlation Power Analysis with a Leakage Model. |
CHES |
2004 |
DBLP DOI BibTeX RDF |
Correlation factor, secure cryptographic device, AES, DPA, power analysis, DES, Hamming distance, side channel, CPA |
28 | Colin D. Walter |
Longer Keys May Facilitate Side Channel Attacks. |
Selected Areas in Cryptography |
2003 |
DBLP DOI BibTeX RDF |
Key Length, Side Channel Attacks, DPA, Power Analysis, Timing Attack, RSA Cryptosystem |
28 | Mehdi-Laurent Akkar, Nicolas T. Courtois, Romain Duteuil, Louis Goubin |
A Fast and Secure Implementation of Sflash. |
Public Key Cryptography |
2003 |
DBLP DOI BibTeX RDF |
Matsumoto-Imai cryptosystem C*, C*- trapdoor function, Digital Signatures, Smart cards, DPA, PKI, Power Analysis, SPA, portable devices, Addition Chains, Multivariate Cryptography, HFE |
28 | Katsuyuki Okeya, Dong-Guk Han |
Side Channel Attack on Ha-Moon's Countermeasure of Randomized Signed Scalar Multiplication. |
INDOCRYPT |
2003 |
DBLP DOI BibTeX RDF |
Ha-Moons Countermeasure, Finite Markov Chain, Side Channel Attacks, DPA, Elliptic Curve Cryptosystem, SPA |
28 | Colin D. Walter |
Seeing through MIST Given a Small Fraction of an RSA Private Key. |
CT-RSA |
2003 |
DBLP DOI BibTeX RDF |
division chains, randomized exponentiation, Mist, randomary exponentiation, RSA, DPA, blinding, power analysis, smartcard, SPA, Addition chains, DEMA, side channel leakage, SEMA |
28 | Colin D. Walter |
MIST: An Efficient, Randomized Exponentiation Algorithm for Resisting Power Analysis. |
CT-RSA |
2002 |
DBLP DOI BibTeX RDF |
Mist exponentiation algorithm, division chains, smart card, DPA, blinding, power analysis, addition chains |
28 | Colin D. Walter |
Precise Bounds for Montgomery Modular Multiplication and Some Potentially Insecure RSA Moduli. |
CT-RSA |
2002 |
DBLP DOI BibTeX RDF |
Cryptography, differential power analysis, DPA, RSA cryptosystem, Montgomery modular multiplication |
28 | Colin D. Walter |
Some Security Aspects of the M IST Randomized Exponentiation Algorithm. |
CHES |
2002 |
DBLP DOI BibTeX RDF |
Randomary exponentiation, Mist exponentiation algorithm, division chains, DPA, blinding, power analysis, smartcard, addition chains, DEMA |
28 | Jean-Jacques Quisquater, David Samyde |
ElectroMagnetic Analysis (EMA): Measures and Counter-Measures for Smart Cards. |
E-smart |
2001 |
DBLP DOI BibTeX RDF |
electromagnetic and power analysis, DPA, smartcard, SPA, tamper resistance, DEMA, SEMA |
28 | Karine Gandolfi, Christophe Mourtel, Francis Olivier |
Electromagnetic Analysis: Concrete Results. |
CHES |
2001 |
DBLP DOI BibTeX RDF |
smart cards, DPA, SPA, DEMA, side channel leakage, SEMA, electromagnetic analysis |
28 | Mehdi-Laurent Akkar, Régis Bevan, Paul Dischamp, Didier Moyart |
Power Analysis, What Is Now Possible.... |
ASIACRYPT |
2000 |
DBLP DOI BibTeX RDF |
dpa, spa, smart-cards, power analysis |
28 | Adi Shamir |
Protecting Smart Cards from Passive Power Analysis with Detached Power Supplies. |
CHES |
2000 |
DBLP DOI BibTeX RDF |
Smart cards, DPA, power analysis, SPA |
28 | Paul C. Kocher, Joshua Jaffe, Benjamin Jun |
Differential Power Analysis. |
CRYPTO |
1999 |
DBLP DOI BibTeX RDF |
cryptanalysis, differential power analysis, DPA, DES, SPA |
28 | Colin D. Walter |
Montgomery's Multiplication Technique: How to Make It Smaller and Faster. |
CHES |
1999 |
DBLP DOI BibTeX RDF |
higher radix methods, checker function, fault tolerance, testing, cryptography, RSA, Computer arithmetic, systolic arrays, error correction, differential power analysis, DPA, Montgomery modular multiplication |
27 | Omid Mirmotahari, Yngvar Berg |
Low Voltage Design against Power Analysis Attacks. |
DELTA |
2008 |
DBLP DOI BibTeX RDF |
Low Voltage (LV), Floating-Gate (FG) and supply current analysis, Differential Power Analysis (DPA), Ultra Low Voltage (ULV) |
27 | Benedikt Gierlichs, Lejla Batina, Pim Tuyls, Bart Preneel |
Mutual Information Analysis. |
CHES |
2008 |
DBLP DOI BibTeX RDF |
Differential Side-Channel Analysis (DSCA), DPA-resistant logic, Information Theory, Mutual Information |
27 | ManKi Ahn, Hoon-Jae Lee 0001 |
Experiments and Hardware Countermeasures on Power Analysis Attacks. |
ICCSA (3) |
2006 |
DBLP DOI BibTeX RDF |
SPA/DPA, Side Channel Attacks, Power Analysis, SmartCard, Countermeasure |
27 | Sung-Ming Yen, Chien-Ning Chen, Sang-Jae Moon, JaeCheol Ha |
Improvement on Ha-Moon Randomized Exponentiation Algorithm. |
ICISC |
2004 |
DBLP DOI BibTeX RDF |
Randomized recoding, Signed-digit recoding, Side-channel attack, Differential power analysis (DPA), Simple power analysis (SPA), Modular exponentiation, Physical cryptanalysis |
27 | Hoon-Jae Lee 0001, ManKi Ahn, Seongan Lim, Sang-Jae Moon |
A Study on Smart Card Security Evaluation Criteria for Side Channel Attacks. |
ICCSA (1) |
2004 |
DBLP DOI BibTeX RDF |
Protection Profiles, Vulnerability Assessment Activities, SPA/DPA, Smart Card, Side Channel Attacks, Common Criteria |
27 | Roberto Maria Avanzi |
Countermeasures against Differential Power Analysis for Hyperelliptic Curve Cryptosystems. |
CHES |
2003 |
DBLP DOI BibTeX RDF |
Smart cards, Side-channel attacks, Public-key cryptography, Differential power analysis (DPA), Timing attacks, Hyperelliptic curves |
27 | Pierre-Alain Fouque, Frédéric Valette |
The Doubling Attack - Why Upwards Is Better than Downwards. |
CHES |
2003 |
DBLP DOI BibTeX RDF |
SPA-based analysis, DPA countermeasures, multiple exponent single data attack, scalar multiplication, modular exponentiation |
27 | Marc Joye, Christophe Tymen |
Protections against Differential Analysis for Elliptic Curve Cryptography. |
CHES |
2001 |
DBLP DOI BibTeX RDF |
Smart-cards, Side-channel attacks, Public-key cryptography, Elliptic curves, Differential power analysis (DPA), Timing attacks |
23 | Yuan Yao 0004, Kailong Zhang, Xingshe Zhou 0001 |
A Novel Parameter Learning Algorithm for a Self-constructing Fuzzy Neural Network Design. |
ACIS-ICIS |
2009 |
DBLP DOI BibTeX RDF |
|
23 | Philipp Grabher, Johann Großschädl, Dan Page |
Non-deterministic processors: FPGA-based analysis of area, performance and security. |
WESS |
2009 |
DBLP DOI BibTeX RDF |
micro-architectural countermeasures, non-deterministic processors, side-channel attack, processor design |
23 | Amir Moradi 0001, Mehrdad Khatir, Mahmoud Salmasizadeh, Mohammad T. Manzuri Shalmani |
Charge recovery logic as a side channel attack countermeasure. |
ISQED |
2009 |
DBLP DOI BibTeX RDF |
|
23 | Chun-Fan Tsai, Chung-Ju Chang, Fang-Ching Ren, Chin-Ming Yen |
Adaptive radio resource allocation for downlink OFDMA/SDMA systems with multimedia traffic. |
IEEE Trans. Wirel. Commun. |
2008 |
DBLP DOI BibTeX RDF |
|
23 | Song Sun, Zijun Yan, Joseph Zambreno |
Experiments in attacking FPGA-based embedded systems using differential power analysis. |
EIT |
2008 |
DBLP DOI BibTeX RDF |
|
23 | Furuzan Atay Onat, Ivan Stojmenovic |
Generating Random Graphs for Wireless Actuator Networks. |
WOWMOM |
2007 |
DBLP DOI BibTeX RDF |
|
23 | Robert P. McEvoy, Michael Tunstall, Colin C. Murphy, William P. Marnane |
Differential Power Analysis of HMAC Based on SHA-2, and Countermeasures. |
WISA |
2007 |
DBLP DOI BibTeX RDF |
|
23 | Chong Hee Kim, Jean-Jacques Quisquater |
How can we overcome both side channel analysis and fault attacks on RSA-CRT? |
FDTC |
2007 |
DBLP DOI BibTeX RDF |
|
23 | Jude Angelo Ambrose, Roshan G. Ragel, Sri Parameswaran |
RIJID: Random Code Injection to Mask Power Analysis based Side Channel Attacks. |
DAC |
2007 |
DBLP DOI BibTeX RDF |
|
23 | Tae Hyun Kim 0003, Dong-Guk Han, Katsuyuki Okeya, Jongin Lim 0001 |
Generic Cryptanalysis of Combined Countermeasures with Randomized BSD Representations. |
CARDIS |
2006 |
DBLP DOI BibTeX RDF |
|
23 | Nicolas T. Courtois, Louis Goubin |
An Algebraic Masking Method to Protect AES Against Power Attacks. |
ICISC |
2005 |
DBLP DOI BibTeX RDF |
|
23 | Huiyun Li, A. Theodore Markettos, Simon W. Moore |
Security Evaluation Against Electromagnetic Analysis at Design Time. |
CHES |
2005 |
DBLP DOI BibTeX RDF |
EM side-channel analysis, design time security evaluation, smart card |
23 | Kris Tiri, David D. Hwang, Alireza Hodjat, Bo-Cheng Lai, Shenglin Yang, Patrick Schaumont, Ingrid Verbauwhede |
A side-channel leakage free coprocessor IC in 0.18µm CMOS for embedded AES-based cryptographic and biometric processing. |
DAC |
2005 |
DBLP DOI BibTeX RDF |
security IC, encryption, smart card, side-channel attack, differential power analysis, countermeasure |
23 | Girish B. Ratanpal, Ronald D. Williams, Travis N. Blalock |
An On-Chip Signal Suppression Countermeasure to Power Analysis Attacks. |
IEEE Trans. Dependable Secur. Comput. |
2004 |
DBLP DOI BibTeX RDF |
VLSI, smartcards, DES, security and protection, Power analysis attacks, code breaking |
23 | François-Xavier Standaert, Siddika Berna Örs, Jean-Jacques Quisquater, Bart Preneel |
Power Analysis Attacks Against FPGA Implementations of the DES. |
FPL |
2004 |
DBLP DOI BibTeX RDF |
|
23 | Mehdi-Laurent Akkar, Régis Bevan, Louis Goubin |
Two Power Analysis Attacks against One-Mask Methods. |
FSE |
2004 |
DBLP DOI BibTeX RDF |
|
23 | Toru Akishita, Tsuyoshi Takagi |
Zero-Value Point Attacks on Elliptic Curve Cryptosystem. |
ISC |
2003 |
DBLP DOI BibTeX RDF |
addition formula, zero-value register, side channel attack, differential power analysis, elliptic curve cryptosystem |
23 | Roman Novak |
Sign-Based Differential Power Analysis. |
WISA |
2003 |
DBLP DOI BibTeX RDF |
|
23 | Katsuyuki Okeya, Tsuyoshi Takagi |
A More Flexible Countermeasure against Side Channel Attacks Using Window Method. |
CHES |
2003 |
DBLP DOI BibTeX RDF |
Width-w NAF, Fractional window, Pre-computation Table, Smart Card, Side Channel Attacks, Elliptic Curve Cryptosystem, Memory Constraint |
23 | Suresh Chari, Josyula R. Rao, Pankaj Rohatgi |
Template Attacks. |
CHES |
2002 |
DBLP DOI BibTeX RDF |
|
23 | Leigh J. Fitzgibbon, Lloyd Allison, David L. Dowe |
Minimum Message Length Grouping of Ordered Data. |
ALT |
2000 |
DBLP DOI BibTeX RDF |
|
23 | Fu-Chiung Cheng, Huei-Huang Chen, Jiin-Hwai Perng |
Parallel execution on production systems. |
SPDP |
1990 |
DBLP DOI BibTeX RDF |
|
18 | Fenggen Yu, Yiming Qian, Xu Zhang, Francisca Gil-Ureta, Brian Jackson, Eric Bennett, Hao Zhang |
DPA-Net: Structured 3D Abstraction from Sparse Views via Differentiable Primitive Assembly. |
CoRR |
2024 |
DBLP DOI BibTeX RDF |
|
18 | Estuardo Alpirez Bock, Gustavo Banegas, Chris Brzuska, Lukasz Chmielewski, Kirthivaasan Puniamurthy, Milan Sorf |
Breaking DPA-Protected Kyber via the Pair-Pointwise Multiplication. |
ACNS (2) |
2024 |
DBLP DOI BibTeX RDF |
|
18 | Zhongyi Shui, Sunyi Zheng, Chenglu Zhu, Shichuan Zhang, Xiaoxuan Yu, Honglin Li 0001, Jingxiong Li, Pingyi Chen, Lin Yang |
DPA-P2PNet: Deformable Proposal-Aware P2PNet for Accurate Point-Based Cell Detection. |
AAAI |
2024 |
DBLP DOI BibTeX RDF |
|
18 | Ruizhi Yu, Yan Li |
PICT-DPA: A Quality-Compliance Data Processing Architecture. |
HICSS |
2024 |
DBLP BibTeX RDF |
|
18 | Yuqian Wang, JianWei Ma, Axyonov Sergey, Shaofei Zang, Miao Zhang |
DPA-UNet rectal cancer image segmentation based on visual attention. |
Concurr. Comput. Pract. Exp. |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Daniel Heinz, Thomas Pöppelmann |
Combined Fault and DPA Protection for Lattice-Based Cryptography. |
IEEE Trans. Computers |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Renuka Chowdary Bheemana, Aditya Japa, Siva Sankar Yellampalli, Ramesh Vaddi |
Negative capacitance FET based energy efficient and DPA attack resilient ultra-light weight block cipher design. |
Microelectron. J. |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Ziheng Wang, Atem Aguer, Amir Ziai |
DPA Load Balancer: Load balancing for Data Parallel Actor-based systems. |
CoRR |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Mohammad Gholamzadeh, Behrooz Khadem |
A Hybrid Image Encryption Scheme based on Chaos and a DPA-Resistant Sbox. |
CoRR |
2023 |
DBLP DOI BibTeX RDF |
|
Displaying result #101 - #200 of 585 (100 per page; Change: ) Pages: [ <<][ 1][ 2][ 3][ 4][ 5][ 6][ >>] |
|