The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for DPA with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1974-2000 (20) 2001-2002 (24) 2003 (19) 2004 (31) 2005 (39) 2006 (39) 2007 (46) 2008 (99) 2009 (31) 2010 (23) 2011 (19) 2012 (17) 2013 (19) 2014 (29) 2015 (30) 2016-2017 (34) 2018-2019 (24) 2020-2021 (19) 2022-2023 (19) 2024 (4)
Publication types (Num. hits)
article(147) incollection(1) inproceedings(433) phdthesis(3) proceedings(1)
Venues (Conferences, Journals, ...)
CHES(76) Euro-Par Workshops(51) IACR Cryptol. ePrint Arch.(41) CT-RSA(16) ISCAS(16) CoRR(10) WISA(10) HOST(9) DATE(8) ICISC(8) IEICE Trans. Fundam. Electron....(8) PATMOS(8) INDOCRYPT(7) ACISP(6) CARDIS(6) COSADE(6) More (+10 of total 203)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 576 occurrences of 189 keywords

Results
Found 585 publication records. Showing 585 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
18Moshe Avital, Hadar Dagan, Itamar Levi, Osnat Keren, Alexander Fish DPA-Secured Quasi-Adiabatic Logic (SQAL) for Low-Power Passive RFID Tags Employing S-Boxes. Search on Bibsonomy IEEE Trans. Circuits Syst. I Regul. Pap. The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
18François Durvaux, François-Xavier Standaert, Nicolas Veyrat-Charvillon, Jean-Baptiste Mairy, Yves Deville Efficient Selection of Time Samples for Higher-Order DPA with Projection Pursuits. Search on Bibsonomy COSADE The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
18Michael Muehlberghuber, Thomas Korak, Philipp Dunst, Michael Hutter Towards Evaluating DPA Countermeasures for Keccak K1012ECCAK on a Real ASIC. Search on Bibsonomy COSADE The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
18Daisuke Fujimoto, Noriyuki Miura, Yu-ichi Hayashi, Naofumi Homma, Takafumi Aoki, Makoto Nagata A DPA/DEMA/LEMA-resistant AES cryptographic processor with supply-current equalizer and micro EM probe sensor. Search on Bibsonomy ASP-DAC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
18Fleura Hajilou, Ehsan Mazidi, Shahab Ardalan DPA Resistance Enhancement through a Self-healing PLL based Power Mask. Search on Bibsonomy SECRYPT The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
18Vincent Grosso, François-Xavier Standaert ASCA, SASCA and DPA with Enumeration: Which One Beats the Other and When? Search on Bibsonomy ASIACRYPT (2) The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
18Ashish Jain, Narendra S. Chaudhari Evolving Highly Nonlinear Balanced Boolean Functions with Improved Resistance to DPA Attacks. Search on Bibsonomy NSS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
18Shengshuo Lu, Zhengya Zhang, Marios C. Papaefthymiou 1.32GHz high-throughput charge-recovery AES core with resistance to DPA attacks. Search on Bibsonomy VLSIC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
18Baris Ege, Kostas Papagiannopoulos, Lejla Batina, Stjepan Picek Improving DPA resistance of S-boxes: How far can we go? Search on Bibsonomy ISCAS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
18Erica Tena-Sánchez, Antonio J. Acosta 0001 DPA vulnerability analysis on Trivium stream cipher using an optimized power model. Search on Bibsonomy ISCAS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
18Zdenek Martinasek, Ondrej Zapletal, Kamil Vrba, Krisztina Trasy Power analysis attack based on the MLP in DPA Contest v4. Search on Bibsonomy TSP The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
18Xiao Pang, Jing Wang, Chenxu Wang, Xinsheng Wang A DPA resistant dual rail Préchargé logic cell. Search on Bibsonomy ASICON The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
18Abhishek Chakraborty 0001, Bodhisatwa Mazumdar, Debdeep Mukhopadhyay A practical DPA on Grain v1 using LS-SVM. Search on Bibsonomy HOST The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
18Nail Etkin Can Akkaya, Burak Erbagci, Raymond Carley, Ken Mai A DPA-resistant self-timed three-phase dual-rail pre-charge logic family. Search on Bibsonomy HOST The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
18Muhammad Yasin, Bodhisatwa Mazumdar, Sk Subidh Ali, Ozgur Sinanoglu Security analysis of logic encryption against the most effective side-channel attack: DPA. Search on Bibsonomy DFTS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
18Carolyn Whitnall, Elisabeth Oswald Robust Profiling for DPA-Style Attacks. Search on Bibsonomy CHES The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
18Josep Balasch, Benedikt Gierlichs, Oscar Reparaz, Ingrid Verbauwhede DPA, Bitslicing and Masking at 1 GHz. Search on Bibsonomy CHES The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
18Weijia Wang 0003, Yu Yu 0001, Junrong Liu, Zheng Guo 0001, François-Xavier Standaert, Dawu Gu, Sen Xu, Rong Fu Evaluation and Improvement of Generic-Emulating DPA Attacks. Search on Bibsonomy CHES The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
18Miao Yuan, Guoqiang Bai 0001 Improving Second-Order DPA Attacks with New Modeled Power Leakages. Search on Bibsonomy CIS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
18Chenyang Tu, Jian Zhou, Neng Gao, Zeyi Liu, Yuan Ma, Zongbin Liu QRL: A High Performance Quadruple-Rail Logic for Resisting DPA on FPGA Implementations. Search on Bibsonomy ICICS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
18Christophe Clavier, Jean-Luc Danger, Guillaume Duc, M. Abdelaziz Elaabid, Benoît Gérard, Sylvain Guilley, Annelie Heuser, Michael Kasper, Yang Li 0001, Victor Lomné, Daisuke Nakatsu, Kazuo Ohta, Kazuo Sakiyama, Laurent Sauvage, Werner Schindler, Marc Stöttinger, Nicolas Veyrat-Charvillon, Matthieu Walle, Antoine Wurcker Practical improvements of side-channel attacks on AES: feedback from the 2nd DPA contest. Search on Bibsonomy J. Cryptogr. Eng. The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
18Sébastien Tiran, Sébastien Ordas, Yannick Teglia, Michel Agoyan, Philippe Maurine A model of the leakage in the frequency domain and its application to CPA and DPA. Search on Bibsonomy J. Cryptogr. Eng. The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
18Wei-Chih Lien, Sung-Ming Yen A DPA Attack on the Implementation of RSA-CRT with Montgomery Reduction. Search on Bibsonomy IEICE Trans. Fundam. Electron. Commun. Comput. Sci. The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
18Erica Tena-Sánchez, Javier Castro-Ramirez, Antonio J. Acosta 0001 A Methodology for Optimized Design of Secure Differential Logic Gates for DPA Resistant Circuits. Search on Bibsonomy IEEE J. Emerg. Sel. Topics Circuits Syst. The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
18Yi Wang 0016, Yajun Ha A Performance and Area Efficient ASIP for Higher-Order DPA-Resistant AES. Search on Bibsonomy IEEE J. Emerg. Sel. Topics Circuits Syst. The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
18François Durvaux, François-Xavier Standaert, Nicolas Veyrat-Charvillon, Jean-Baptiste Mairy, Yves Deville Efficient Selection of Time Samples for Higher-Order DPA with Projection Pursuits. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2014 DBLP  BibTeX  RDF
18A. Adam Ding, Liwei Zhang, Yunsi Fei, Pei Luo A Statistical Model for Higher Order DPA on Masked Devices. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2014 DBLP  BibTeX  RDF
18Chang Liu 0001, Rajiv Ranjan 0001, Chi Yang, Xuyun Zhang, Lizhe Wang 0001, Jinjun Chen MuR-DPA: Top-down Levelled Multi-replica Merkle Hash Tree Based Secure Public Auditing for Dynamic Big Data Storage on Cloud. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2014 DBLP  BibTeX  RDF
18Amir Moradi 0001, François-Xavier Standaert Moments-Correlating DPA. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2014 DBLP  BibTeX  RDF
18Noboru Kunihiro, Junya Honda RSA meets DPA: Recovering RSA Secret Keys from Noisy Analog Data. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2014 DBLP  BibTeX  RDF
18Ravikumar Selvam, Dillibabu Shanmugam, Suganya Annadurai Side Channel Attacks: Vulnerability Analysis of PRINCE and RECTANGLE using DPA. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2014 DBLP  BibTeX  RDF
18Massimo Alioto, Simone Bongiovanni, Milena Djukanovic, Giuseppe Scotti, Alessandro Trifiletti Effectiveness of Leakage Power Analysis Attacks on DPA-Resistant Logic Styles Under Process Variations. Search on Bibsonomy IEEE Trans. Circuits Syst. I Regul. Pap. The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
18Daniel Vidal, Mario Lúcio Côrtes Fast and accurate solution for power estimation and DPA countermeasure design. Search on Bibsonomy PATMOS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
18Stjepan Picek, Lejla Batina, Domagoj Jakobovic Evolving DPA-Resistant Boolean Functions. Search on Bibsonomy PPSN The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
18Jungmin Park, Akhilesh Tyagi Towards Making Private Circuits Practical: DPA Resistant Private Circuits. Search on Bibsonomy ISVLSI The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
18Oscar Reparaz, Benedikt Gierlichs, Ingrid Verbauwhede Generic DPA Attacks: Curse or Blessing? Search on Bibsonomy COSADE The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
18Erica Tena-Sánchez, Javier Castro-Ramirez, Antonio J. Acosta 0001 Low-Power Differential Logic Gates for DPA Resistant Circuits. Search on Bibsonomy DSD The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
18Jie Guo 0002, Zhijie Chen, Danghui Wang, Zili Shao, Yiran Chen 0001 DPA: A data pattern aware error prevention technique for NAND flash lifetime extension. Search on Bibsonomy ASP-DAC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
18Shivam Bhasin, Nicolas Bruneau, Jean-Luc Danger, Sylvain Guilley, Zakaria Najm Analysis and Improvements of the DPA Contest v4 Implementation. Search on Bibsonomy SPACE The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
18Luciano Loder, Adão Antônio de Souza Jr., Marcelo Schiavon Fay, Rafael Soares Towards a Framework to Perform DPA Attack on GALS Pipeline Architectures. Search on Bibsonomy SBCCI The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
18Muhammet Ali Evci, Selçuk Kavut DPA Resilience of Rotation-Symmetric S-boxes. Search on Bibsonomy IWSEC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
18Stjepan Picek, Kostas Papagiannopoulos, Baris Ege, Lejla Batina, Domagoj Jakobovic Confused by Confusion: Systematic Evaluation of DPA Resistance of Various S-boxes. Search on Bibsonomy INDOCRYPT The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
18Mehrdad Khatir, Leyla Nazhandali Sense Amplifier Pass Transistor Logic for energy efficient and DPA-resistant AES circuit. Search on Bibsonomy ISQED The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
18Carolyn Whitnall, Elisabeth Oswald, François-Xavier Standaert The Myth of Generic DPA...and the Magic of Learning. Search on Bibsonomy CT-RSA The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
18Suvadeep Hajra, Chester Rebeiro, Shivam Bhasin, Gaurav Bajaj, Sahil Sharma, Sylvain Guilley, Debdeep Mukhopadhyay DRECON: DPA Resistant Encryption by Construction. Search on Bibsonomy AFRICACRYPT The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
18A. Adam Ding, Liwei Zhang, Yunsi Fei, Pei Luo A Statistical Model for Higher Order DPA on Masked Devices. Search on Bibsonomy CHES The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
18Noboru Kunihiro, Junya Honda RSA Meets DPA: Recovering RSA Secret Keys from Noisy Analog Data. Search on Bibsonomy CHES The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
18Monjur Alam, Santosh Ghosh, Dipanwita Roy Chowdhury, Indranil Sengupta 0001 First-order DPA Vulnerability of Rijndael: Security and Area-delay Optimization Trade-off. Search on Bibsonomy Int. J. Netw. Secur. The full citation details ... 2013 DBLP  BibTeX  RDF
18John G. Scudder Deprecation of BGP Path Attributes: DPA, ADVERTISER, and RCID_PATH / CLUSTER_ID. Search on Bibsonomy RFC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
18Bodhisatwa Mazumdar, Debdeep Mukhopadhyay, Indranil Sengupta 0001 Constrained Search for a Class of Good Bijective S-Boxes With Improved DPA Resistivity. Search on Bibsonomy IEEE Trans. Inf. Forensics Secur. The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
18Suvadeep Hajra, Debdeep Mukhopadhyay Pushing the Limit of Non-Profiling DPA using Multivariate Leakage Model. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2013 DBLP  BibTeX  RDF
18Suvadeep Hajra, Debdeep Mukhopadhyay SNR to Success Rate: Reaching the Limit of Non-Profiling DPA. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2013 DBLP  BibTeX  RDF
18Sébastien Tiran, Sébastien Ordas, Yannick Teglia, Michel Agoyan, Philippe Maurine A Frequency Leakage Model and its application to CPA and DPA. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2013 DBLP  BibTeX  RDF
18Carolyn Whitnall, Elisabeth Oswald Profiling DPA: Efficacy and efficiency trade-offs. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2013 DBLP  BibTeX  RDF
18Suvadeep Hajra, Debdeep Mukhopadhyay Multivariate Leakage Model for Improving Non-profiling DPA on Noisy Power Traces. Search on Bibsonomy Inscrypt The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
18Partha De, Kunal Banerjee 0001, Chittaranjan A. Mandal, Debdeep Mukhopadhyay Designing DPA Resistant Circuits Using BDD Architecture and Bottom Pre-charge Logic. Search on Bibsonomy DSD The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
18Begül Bilgin, Joan Daemen, Ventzislav Nikov, Svetla Nikova, Vincent Rijmen, Gilles Van Assche Efficient and First-Order DPA Resistant Implementations of Keccak. Search on Bibsonomy CARDIS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
18Susana Eiroa, Iluminada Baturone FPGA implementation and DPA resistance analysis of a lightweight HMAC construction based on photon hash family. Search on Bibsonomy FPL The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
18Jie-Wei Lai, Chi-Hsueh Wang, Kaipon Kao, Anson Lin, Yi-Hsien Cho, Lan-chou Cho, Meng-Hsiung Hung, Xin-Yu Shih, Che-Min Lin, Sheng-Hong Yan, Yuan-Hung Chung, Paul C. P. Liang, Guang-Kaai Dehng, Hung-Sung Li, George Chien, Robert Bogdan Staszewski A 0.27mm2 13.5dBm 2.4GHz all-digital polar transmitter using 34%-efficiency Class-D DPA in 40nm CMOS. Search on Bibsonomy ISSCC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
18Câncio Monteiro, Yasuhiro Takahashi, Toshikazu Sekine DPA resistance of charge-sharing symmetric adiabatic logic. Search on Bibsonomy ISCAS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
18Xiaoxin Cui, Rui Li, Wei Wei, Juan Gu, Xiaole Cui AHardware implementation of DES with combined countermeasure against DPA. Search on Bibsonomy ASICON The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
18Bodhisatwa Mazumdar, Debdeep Mukhopadhyay, Indranil Sengupta 0001 Design and implementation of rotation symmetric S-boxes with high nonlinearity and high DPA resilience. Search on Bibsonomy HOST The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
18Alberto Fuentes Rodríguez, Luis Hernández Encinas, Agustín Martín Muñoz, Bernardo Alarcos Alcázar A Toolbox for DPA Attacks to Smart Cards. Search on Bibsonomy SOCO-CISIS-ICEUTE The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
18Ruicong Ma, Daheng Yue, Shaoqing Li, Jihua Chen Research on the Relationship between the Effect of DPA and Differential Sample Frequency. Search on Bibsonomy DASC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
18Carolyn Whitnall, Elisabeth Oswald Profiling DPA: Efficacy and Efficiency Trade-Offs. Search on Bibsonomy CHES The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
18Simone Bongiovanni, Mauro Olivieri, Giuseppe Scotti, Alessandro Trifiletti A flip-flop implementation for the DPA-resistant Delay-based Dual-rail Pre-charge Logic family. Search on Bibsonomy MIXDES The full citation details ... 2013 DBLP  BibTeX  RDF
18Kazuyuki Tanimura, Nikil D. Dutt HDRL: Homogeneous Dual-Rail Logic for DPA Attack Resistive Secure Circuit Design. Search on Bibsonomy IEEE Embed. Syst. Lett. The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
18Marco Bucci, Luca Giancane, Raimondo Luzzi, Alessandro Trifiletti A Flip-Flop for the DPA Resistant Three-Phase Dual-Rail Pre-Charge Logic Family. Search on Bibsonomy IEEE Trans. Very Large Scale Integr. Syst. The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
18Andrey Bogdanov, Ilya Kizhvatov Beyond the Limits of DPA: Combined Side-Channel Collision Attacks. Search on Bibsonomy IEEE Trans. Computers The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
18Carolyn Whitnall, Elisabeth Oswald, François-Xavier Standaert The myth of generic DPA...and the magic of learning. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2012 DBLP  BibTeX  RDF
18Bodhisatwa Mazumdar, Debdeep Mukhopadhyay, Indranil Sengupta 0001 Constrained Search for a Class of Good S-Boxes with Improved DPA Resistivity. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2012 DBLP  BibTeX  RDF
18Jen-Wei Lee, Ju-Hung Hsiao, Hsie-Chia Chang, Chen-Yi Lee An Efficient DPA Countermeasure With Randomized Montgomery Operations for DF-ECC Processor. Search on Bibsonomy IEEE Trans. Circuits Syst. II Express Briefs The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
18A. Amaar, I. Ashour, Mustafa Shiple Efficient Implementation of AES Algorithm Immune to DPA Attack. Search on Bibsonomy UKSim The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
18Ganesh Khedkar, Dhireesha Kudithipudi RRAM Motifs for Mitigating Differential Power Analysis Attacks (DPA). Search on Bibsonomy ISVLSI The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
18Hiroki Ito, Mitsuru Shiozaki, Anh-Tuan Hoang, Takeshi Fujino Efficient DPA-Resistance Verification Method with Smaller Number of Power Traces on AES Cryptographic Circuit. Search on Bibsonomy DSD The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
18Hugo Daniel Hernández, Jonathan Scott, Wilhelmus A. M. Van Noije DPA insensitive voltage regulator for contact smart cards. Search on Bibsonomy SBCCI The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
18Lakshmi Narasimhan Ramakrishnan, Manoj Chakkaravarthy, Antarpreet Singh Manchanda, Mike Borowczak, Ranga Vemuri SDMLp: On the use of complementary Pass transistor Logic for design of DPA resistant circuits. Search on Bibsonomy HOST The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
18Hsing-Ping Fu, Ju-Hung Hsiao, Po-Chun Liu, Hsie-Chia Chang, Chen-Yi Lee A low cost DPA-resistant 8-bit AES core based on ring oscillators. Search on Bibsonomy VLSI-DAT The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
18Yuichi Komano, Hideo Shimizu, Chiho Mihara Another look on the relation between template attack and higher order DPA. Search on Bibsonomy ISITA The full citation details ... 2012 DBLP  BibTeX  RDF
18Yunsi Fei, Qiasi Luo, A. Adam Ding A Statistical Model for DPA with Novel Algorithmic Confusion Analysis. Search on Bibsonomy CHES The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
18Oscar Reparaz, Benedikt Gierlichs, Ingrid Verbauwhede Selecting Time Samples for Multivariate DPA Attacks. Search on Bibsonomy CHES The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
18 DPA. Search on Bibsonomy Encyclopedia of Cryptography and Security (2nd Ed.) The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
18Yang Li 0001, Kazuo Sakiyama, Shin-ichi Kawamura, Kazuo Ohta Power Analysis against a DPA-Resistant S-Box Implementation Based on the Fourier Transform. Search on Bibsonomy IEICE Trans. Fundam. Electron. Commun. Comput. Sci. The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
18Meng Zhang, Niraj K. Jha FinFET-Based Power Management for Improved DPA Resistance with Low Overhead. Search on Bibsonomy ACM J. Emerg. Technol. Comput. Syst. The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
18Haleh Vahedi, Stefano Gregori, Radu Muresan The effectiveness of a current flattening circuit as countermeasure against DPA attacks. Search on Bibsonomy Microelectron. J. The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
18Ming Tang 0002, Xiaorong Wang, Zhenlong Qiu, Si Gao, Huanguo Zhang, Qianhong Wu DPA Leakage Evaluation and Countermeasure Plug-in. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2011 DBLP  BibTeX  RDF
18Andrew Moss, Elisabeth Oswald, Dan Page, Michael Tunstall Automatic Insertion of DPA Countermeasures. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2011 DBLP  BibTeX  RDF
18Bhushan K. Bonde, Dany J. V. Beste, Emma Laing, Andrzej M. Kierzek, Johnjoe McFadden Differential Producibility Analysis (DPA) of Transcriptomic Data with Metabolic Networks: Deconstructing the Metabolic Response of M. tuberculosis. Search on Bibsonomy PLoS Comput. Biol. The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
18Abhishek Rawat, Ram Narayan Yadav, S. C. Shrivastava Beamwidth Prediction of DPA Smart Antenna Using Support Vector Machine. Search on Bibsonomy IICAI The full citation details ... 2011 DBLP  BibTeX  RDF
18Po-Chun Liu, Ju-Hung Hsiao, Hsie-Chia Chang, Chen-Yi Lee A 2.97 Gb/s DPA-resistant AES engine with self-generated random sequence. Search on Bibsonomy ESSCIRC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
18Milena Djukanovic, Luca Giancane, Giuseppe Scotti, Alessandro Trifiletti, Massimo Alioto Leakage Power Analysis attacks: Effectiveness on DPA resistant logic styles under process variations. Search on Bibsonomy ISCAS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
18Masaya Yoshikawa, M. Sugiyama Multi-rounds masking method against DPA attacks. Search on Bibsonomy IRI The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
18Yuejun Zhang, Pengjun Wang, Lipeng Hao Design of resistant DPA three-valued counter based on SABL. Search on Bibsonomy ASICON The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
18Katsuhiko Iwai, Mitsuru Shiozaki, Anh-Tuan Hoang, Kenji Kojima, Takeshi Fujino Implementation and verification of DPA-resistant cryptographic DES circuit using Domino-RSL. Search on Bibsonomy HOST The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
18Amir Moradi 0001, Oliver Mischke, Christof Paar Practical evaluation of DPA countermeasures on reconfigurable hardware. Search on Bibsonomy HOST The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
18Dakshita Khurana, Aditya Gaurav Ensuring tight computational security against higher-order DPA attacks. Search on Bibsonomy PST The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
18Xiaoyi Duan, Ronglei Hu, Xiu Ying Li Research and Implementation of DPA-resistant SMS4 Block Cipher. Search on Bibsonomy CIS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
18Masaya Yoshikawa, Y. Kojima Efficient Random Number for the Masking Method against DPA Attacks. Search on Bibsonomy ICSEng The full citation details ... 2011 DBLP  DOI  BibTeX  RDF Cryptography, Information security, Side channel attacks, Differential power analysis, Tamper resistance
18Alessandro Cevrero, Francesco Regazzoni 0001, Micheal Schwander, Stéphane Badel, Paolo Ienne, Yusuf Leblebici Power-gated MOS current mode logic (PG-MCML): a power aware DPA-resistant standard cell library. Search on Bibsonomy DAC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
18Yoo-Jin Baek Regular 2w-ary right-to-left exponentiation algorithm with very efficient DPA and FA countermeasures. Search on Bibsonomy Int. J. Inf. Sec. The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
Displaying result #301 - #400 of 585 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license