Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
18 | Moshe Avital, Hadar Dagan, Itamar Levi, Osnat Keren, Alexander Fish |
DPA-Secured Quasi-Adiabatic Logic (SQAL) for Low-Power Passive RFID Tags Employing S-Boxes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Circuits Syst. I Regul. Pap. ![In: IEEE Trans. Circuits Syst. I Regul. Pap. 62-I(1), pp. 149-156, 2015. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
18 | François Durvaux, François-Xavier Standaert, Nicolas Veyrat-Charvillon, Jean-Baptiste Mairy, Yves Deville |
Efficient Selection of Time Samples for Higher-Order DPA with Projection Pursuits. ![Search on Bibsonomy](Pics/bibsonomy.png) |
COSADE ![In: Constructive Side-Channel Analysis and Secure Design - 6th International Workshop, COSADE 2015, Berlin, Germany, April 13-14, 2015. Revised Selected Papers, pp. 34-50, 2015, Springer, 978-3-319-21475-7. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
18 | Michael Muehlberghuber, Thomas Korak, Philipp Dunst, Michael Hutter |
Towards Evaluating DPA Countermeasures for Keccak K1012ECCAK on a Real ASIC. ![Search on Bibsonomy](Pics/bibsonomy.png) |
COSADE ![In: Constructive Side-Channel Analysis and Secure Design - 6th International Workshop, COSADE 2015, Berlin, Germany, April 13-14, 2015. Revised Selected Papers, pp. 222-236, 2015, Springer, 978-3-319-21475-7. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
18 | Daisuke Fujimoto, Noriyuki Miura, Yu-ichi Hayashi, Naofumi Homma, Takafumi Aoki, Makoto Nagata |
A DPA/DEMA/LEMA-resistant AES cryptographic processor with supply-current equalizer and micro EM probe sensor. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASP-DAC ![In: The 20th Asia and South Pacific Design Automation Conference, ASP-DAC 2015, Chiba, Japan, January 19-22, 2015, pp. 26-27, 2015, IEEE, 978-1-4799-7792-5. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
18 | Fleura Hajilou, Ehsan Mazidi, Shahab Ardalan |
DPA Resistance Enhancement through a Self-healing PLL based Power Mask. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SECRYPT ![In: SECRYPT 2015 - Proceedings of the 12th International Conference on Security and Cryptography, Colmar, Alsace, France, 20-22 July, 2015., pp. 267-272, 2015, SciTePress, 978-989-758-117-5. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
18 | Vincent Grosso, François-Xavier Standaert |
ASCA, SASCA and DPA with Enumeration: Which One Beats the Other and When? ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT (2) ![In: Advances in Cryptology - ASIACRYPT 2015 - 21st International Conference on the Theory and Application of Cryptology and Information Security, Auckland, New Zealand, November 29 - December 3, 2015, Proceedings, Part II, pp. 291-312, 2015, Springer, 978-3-662-48799-0. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
18 | Ashish Jain, Narendra S. Chaudhari |
Evolving Highly Nonlinear Balanced Boolean Functions with Improved Resistance to DPA Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NSS ![In: Network and System Security - 9th International Conference, NSS 2015, New York, NY, USA, November 3-5, 2015, Proceedings, pp. 316-330, 2015, Springer, 978-3-319-25644-3. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
18 | Shengshuo Lu, Zhengya Zhang, Marios C. Papaefthymiou |
1.32GHz high-throughput charge-recovery AES core with resistance to DPA attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
VLSIC ![In: Symposium on VLSI Circuits, VLSIC 2015, Kyoto, Japan, June 17-19, 2015, pp. 246-, 2015, IEEE, 978-4-86348-502-0. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
18 | Baris Ege, Kostas Papagiannopoulos, Lejla Batina, Stjepan Picek |
Improving DPA resistance of S-boxes: How far can we go? ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCAS ![In: 2015 IEEE International Symposium on Circuits and Systems, ISCAS 2015, Lisbon, Portugal, May 24-27, 2015, pp. 2013-2016, 2015, IEEE, 978-1-4799-8391-9. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
18 | Erica Tena-Sánchez, Antonio J. Acosta 0001 |
DPA vulnerability analysis on Trivium stream cipher using an optimized power model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCAS ![In: 2015 IEEE International Symposium on Circuits and Systems, ISCAS 2015, Lisbon, Portugal, May 24-27, 2015, pp. 1846-1849, 2015, IEEE, 978-1-4799-8391-9. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
18 | Zdenek Martinasek, Ondrej Zapletal, Kamil Vrba, Krisztina Trasy |
Power analysis attack based on the MLP in DPA Contest v4. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TSP ![In: 38th International Conference on Telecommunications and Signal Processing, TSP 2015, Prague, Czech Republic, July 9-11, 2015, pp. 154-158, 2015, IEEE, 978-1-4799-8498-5. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
18 | Xiao Pang, Jing Wang, Chenxu Wang, Xinsheng Wang |
A DPA resistant dual rail Préchargé logic cell. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASICON ![In: 2015 IEEE 11th International Conference on ASIC, ASICON 2015, Chengdu, China, November 3-6, 2015, pp. 1-4, 2015, IEEE, 978-1-4799-8483-1. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
18 | Abhishek Chakraborty 0001, Bodhisatwa Mazumdar, Debdeep Mukhopadhyay |
A practical DPA on Grain v1 using LS-SVM. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HOST ![In: IEEE International Symposium on Hardware Oriented Security and Trust, HOST 2015, Washington, DC, USA, 5-7 May, 2015, pp. 44-47, 2015, IEEE Computer Society, 978-1-4673-7420-0. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
18 | Nail Etkin Can Akkaya, Burak Erbagci, Raymond Carley, Ken Mai |
A DPA-resistant self-timed three-phase dual-rail pre-charge logic family. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HOST ![In: IEEE International Symposium on Hardware Oriented Security and Trust, HOST 2015, Washington, DC, USA, 5-7 May, 2015, pp. 112-117, 2015, IEEE Computer Society, 978-1-4673-7420-0. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
18 | Muhammad Yasin, Bodhisatwa Mazumdar, Sk Subidh Ali, Ozgur Sinanoglu |
Security analysis of logic encryption against the most effective side-channel attack: DPA. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DFTS ![In: 2015 IEEE International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems, DFTS 2015, Amherst, MA, USA, October 12-14, 2015, pp. 97-102, 2015, IEEE Computer Society, 978-1-4799-8606-4. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
18 | Carolyn Whitnall, Elisabeth Oswald |
Robust Profiling for DPA-Style Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHES ![In: Cryptographic Hardware and Embedded Systems - CHES 2015 - 17th International Workshop, Saint-Malo, France, September 13-16, 2015, Proceedings, pp. 3-21, 2015, Springer, 978-3-662-48323-7. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
18 | Josep Balasch, Benedikt Gierlichs, Oscar Reparaz, Ingrid Verbauwhede |
DPA, Bitslicing and Masking at 1 GHz. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHES ![In: Cryptographic Hardware and Embedded Systems - CHES 2015 - 17th International Workshop, Saint-Malo, France, September 13-16, 2015, Proceedings, pp. 599-619, 2015, Springer, 978-3-662-48323-7. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
18 | Weijia Wang 0003, Yu Yu 0001, Junrong Liu, Zheng Guo 0001, François-Xavier Standaert, Dawu Gu, Sen Xu, Rong Fu |
Evaluation and Improvement of Generic-Emulating DPA Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHES ![In: Cryptographic Hardware and Embedded Systems - CHES 2015 - 17th International Workshop, Saint-Malo, France, September 13-16, 2015, Proceedings, pp. 416-432, 2015, Springer, 978-3-662-48323-7. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
18 | Miao Yuan, Guoqiang Bai 0001 |
Improving Second-Order DPA Attacks with New Modeled Power Leakages. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIS ![In: 11th International Conference on Computational Intelligence and Security, CIS 2015, Shenzhen, China, December 19-20, 2015, pp. 394-397, 2015, IEEE Computer Society, 978-1-4673-8660-9. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
18 | Chenyang Tu, Jian Zhou, Neng Gao, Zeyi Liu, Yuan Ma, Zongbin Liu |
QRL: A High Performance Quadruple-Rail Logic for Resisting DPA on FPGA Implementations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICS ![In: Information and Communications Security - 17th International Conference, ICICS 2015, Beijing, China, December 9-11, 2015, Revised Selected Papers, pp. 184-198, 2015, Springer, 978-3-319-29813-9. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
18 | Christophe Clavier, Jean-Luc Danger, Guillaume Duc, M. Abdelaziz Elaabid, Benoît Gérard, Sylvain Guilley, Annelie Heuser, Michael Kasper, Yang Li 0001, Victor Lomné, Daisuke Nakatsu, Kazuo Ohta, Kazuo Sakiyama, Laurent Sauvage, Werner Schindler, Marc Stöttinger, Nicolas Veyrat-Charvillon, Matthieu Walle, Antoine Wurcker |
Practical improvements of side-channel attacks on AES: feedback from the 2nd DPA contest. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Cryptogr. Eng. ![In: J. Cryptogr. Eng. 4(4), pp. 259-274, 2014. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
18 | Sébastien Tiran, Sébastien Ordas, Yannick Teglia, Michel Agoyan, Philippe Maurine |
A model of the leakage in the frequency domain and its application to CPA and DPA. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Cryptogr. Eng. ![In: J. Cryptogr. Eng. 4(3), pp. 197-212, 2014. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
18 | Wei-Chih Lien, Sung-Ming Yen |
A DPA Attack on the Implementation of RSA-CRT with Montgomery Reduction. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEICE Trans. Fundam. Electron. Commun. Comput. Sci. ![In: IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 97-A(1), pp. 354-364, 2014. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
18 | Erica Tena-Sánchez, Javier Castro-Ramirez, Antonio J. Acosta 0001 |
A Methodology for Optimized Design of Secure Differential Logic Gates for DPA Resistant Circuits. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE J. Emerg. Sel. Topics Circuits Syst. ![In: IEEE J. Emerg. Sel. Topics Circuits Syst. 4(2), pp. 203-215, 2014. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
18 | Yi Wang 0016, Yajun Ha |
A Performance and Area Efficient ASIP for Higher-Order DPA-Resistant AES. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE J. Emerg. Sel. Topics Circuits Syst. ![In: IEEE J. Emerg. Sel. Topics Circuits Syst. 4(2), pp. 190-202, 2014. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
18 | François Durvaux, François-Xavier Standaert, Nicolas Veyrat-Charvillon, Jean-Baptiste Mairy, Yves Deville |
Efficient Selection of Time Samples for Higher-Order DPA with Projection Pursuits. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2014, pp. 412, 2014. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP BibTeX RDF |
|
18 | A. Adam Ding, Liwei Zhang, Yunsi Fei, Pei Luo |
A Statistical Model for Higher Order DPA on Masked Devices. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2014, pp. 433, 2014. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP BibTeX RDF |
|
18 | Chang Liu 0001, Rajiv Ranjan 0001, Chi Yang, Xuyun Zhang, Lizhe Wang 0001, Jinjun Chen |
MuR-DPA: Top-down Levelled Multi-replica Merkle Hash Tree Based Secure Public Auditing for Dynamic Big Data Storage on Cloud. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2014, pp. 391, 2014. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP BibTeX RDF |
|
18 | Amir Moradi 0001, François-Xavier Standaert |
Moments-Correlating DPA. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2014, pp. 409, 2014. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP BibTeX RDF |
|
18 | Noboru Kunihiro, Junya Honda |
RSA meets DPA: Recovering RSA Secret Keys from Noisy Analog Data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2014, pp. 513, 2014. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP BibTeX RDF |
|
18 | Ravikumar Selvam, Dillibabu Shanmugam, Suganya Annadurai |
Side Channel Attacks: Vulnerability Analysis of PRINCE and RECTANGLE using DPA. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2014, pp. 644, 2014. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP BibTeX RDF |
|
18 | Massimo Alioto, Simone Bongiovanni, Milena Djukanovic, Giuseppe Scotti, Alessandro Trifiletti |
Effectiveness of Leakage Power Analysis Attacks on DPA-Resistant Logic Styles Under Process Variations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Circuits Syst. I Regul. Pap. ![In: IEEE Trans. Circuits Syst. I Regul. Pap. 61-I(2), pp. 429-442, 2014. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
18 | Daniel Vidal, Mario Lúcio Côrtes |
Fast and accurate solution for power estimation and DPA countermeasure design. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PATMOS ![In: 24th International Workshop on Power and Timing Modeling, Optimization and Simulation, PATMOS), Palma de Mallorca, Spain, September 29 - Oct. 1, 2014, pp. 1-7, 2014, IEEE. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
18 | Stjepan Picek, Lejla Batina, Domagoj Jakobovic |
Evolving DPA-Resistant Boolean Functions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PPSN ![In: Parallel Problem Solving from Nature - PPSN XIII - 13th International Conference, Ljubljana, Slovenia, September 13-17, 2014. Proceedings, pp. 812-821, 2014, Springer, 978-3-319-10761-5. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
18 | Jungmin Park, Akhilesh Tyagi |
Towards Making Private Circuits Practical: DPA Resistant Private Circuits. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISVLSI ![In: IEEE Computer Society Annual Symposium on VLSI, ISVLSI 2014, Tampa, FL, USA, July 9-11, 2014, pp. 528-533, 2014, IEEE Computer Society, 978-1-4799-3763-9. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
18 | Oscar Reparaz, Benedikt Gierlichs, Ingrid Verbauwhede |
Generic DPA Attacks: Curse or Blessing? ![Search on Bibsonomy](Pics/bibsonomy.png) |
COSADE ![In: Constructive Side-Channel Analysis and Secure Design - 5th International Workshop, COSADE 2014, Paris, France, April 13-15, 2014. Revised Selected Papers, pp. 98-111, 2014, Springer, 978-3-319-10174-3. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
18 | Erica Tena-Sánchez, Javier Castro-Ramirez, Antonio J. Acosta 0001 |
Low-Power Differential Logic Gates for DPA Resistant Circuits. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DSD ![In: 17th Euromicro Conference on Digital System Design, DSD 2014, Verona, Italy, August 27-29, 2014, pp. 671-674, 2014, IEEE Computer Society, 978-1-4799-5793-4. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
18 | Jie Guo 0002, Zhijie Chen, Danghui Wang, Zili Shao, Yiran Chen 0001 |
DPA: A data pattern aware error prevention technique for NAND flash lifetime extension. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASP-DAC ![In: 19th Asia and South Pacific Design Automation Conference, ASP-DAC 2014, Singapore, January 20-23, 2014, pp. 592-597, 2014, IEEE, 978-1-4799-2816-3. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
18 | Shivam Bhasin, Nicolas Bruneau, Jean-Luc Danger, Sylvain Guilley, Zakaria Najm |
Analysis and Improvements of the DPA Contest v4 Implementation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SPACE ![In: Security, Privacy, and Applied Cryptography Engineering - 4th International Conference, SPACE 2014, Pune, India, October 18-22, 2014. Proceedings, pp. 201-218, 2014, Springer, 978-3-319-12059-1. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
18 | Luciano Loder, Adão Antônio de Souza Jr., Marcelo Schiavon Fay, Rafael Soares |
Towards a Framework to Perform DPA Attack on GALS Pipeline Architectures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SBCCI ![In: Proceedings of the 27th Symposium on Integrated Circuits and Systems Design, Aracaju, Brazil, September 1-5, 2014, pp. 33:1-33:7, 2014, ACM, 978-1-4503-3156-2. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
18 | Muhammet Ali Evci, Selçuk Kavut |
DPA Resilience of Rotation-Symmetric S-boxes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWSEC ![In: Advances in Information and Computer Security - 9th International Workshop on Security, IWSEC 2014, Hirosaki, Japan, August 27-29, 2014. Proceedings, pp. 146-157, 2014, Springer, 978-3-319-09842-5. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
18 | Stjepan Picek, Kostas Papagiannopoulos, Baris Ege, Lejla Batina, Domagoj Jakobovic |
Confused by Confusion: Systematic Evaluation of DPA Resistance of Various S-boxes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INDOCRYPT ![In: Progress in Cryptology - INDOCRYPT 2014 - 15th International Conference on Cryptology in India, New Delhi, India, December 14-17, 2014, Proceedings, pp. 374-390, 2014, Springer, 978-3-319-13038-5. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
18 | Mehrdad Khatir, Leyla Nazhandali |
Sense Amplifier Pass Transistor Logic for energy efficient and DPA-resistant AES circuit. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISQED ![In: Fifteenth International Symposium on Quality Electronic Design, ISQED 2014, Santa Clara, CA, USA, March 3-5, 2014, pp. 517-522, 2014, IEEE, 978-1-4799-3945-9. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
18 | Carolyn Whitnall, Elisabeth Oswald, François-Xavier Standaert |
The Myth of Generic DPA...and the Magic of Learning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CT-RSA ![In: Topics in Cryptology - CT-RSA 2014 - The Cryptographer's Track at the RSA Conference 2014, San Francisco, CA, USA, February 25-28, 2014. Proceedings, pp. 183-205, 2014, Springer, 978-3-319-04851-2. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
18 | Suvadeep Hajra, Chester Rebeiro, Shivam Bhasin, Gaurav Bajaj, Sahil Sharma, Sylvain Guilley, Debdeep Mukhopadhyay |
DRECON: DPA Resistant Encryption by Construction. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AFRICACRYPT ![In: Progress in Cryptology - AFRICACRYPT 2014 - 7th International Conference on Cryptology in Africa, Marrakesh, Morocco, May 28-30, 2014. Proceedings, pp. 420-439, 2014, Springer, 978-3-319-06733-9. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
18 | A. Adam Ding, Liwei Zhang, Yunsi Fei, Pei Luo |
A Statistical Model for Higher Order DPA on Masked Devices. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHES ![In: Cryptographic Hardware and Embedded Systems - CHES 2014 - 16th International Workshop, Busan, South Korea, September 23-26, 2014. Proceedings, pp. 147-169, 2014, Springer, 978-3-662-44708-6. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
18 | Noboru Kunihiro, Junya Honda |
RSA Meets DPA: Recovering RSA Secret Keys from Noisy Analog Data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHES ![In: Cryptographic Hardware and Embedded Systems - CHES 2014 - 16th International Workshop, Busan, South Korea, September 23-26, 2014. Proceedings, pp. 261-278, 2014, Springer, 978-3-662-44708-6. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
18 | Monjur Alam, Santosh Ghosh, Dipanwita Roy Chowdhury, Indranil Sengupta 0001 |
First-order DPA Vulnerability of Rijndael: Security and Area-delay Optimization Trade-off. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Netw. Secur. ![In: Int. J. Netw. Secur. 15(3), pp. 219-230, 2013. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP BibTeX RDF |
|
18 | John G. Scudder |
Deprecation of BGP Path Attributes: DPA, ADVERTISER, and RCID_PATH / CLUSTER_ID. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RFC ![In: RFC 6938, pp. 1-3, May 2013. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
18 | Bodhisatwa Mazumdar, Debdeep Mukhopadhyay, Indranil Sengupta 0001 |
Constrained Search for a Class of Good Bijective S-Boxes With Improved DPA Resistivity. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Inf. Forensics Secur. ![In: IEEE Trans. Inf. Forensics Secur. 8(12), pp. 2154-2163, 2013. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
18 | Suvadeep Hajra, Debdeep Mukhopadhyay |
Pushing the Limit of Non-Profiling DPA using Multivariate Leakage Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2013, pp. 849, 2013. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP BibTeX RDF |
|
18 | Suvadeep Hajra, Debdeep Mukhopadhyay |
SNR to Success Rate: Reaching the Limit of Non-Profiling DPA. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2013, pp. 865, 2013. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP BibTeX RDF |
|
18 | Sébastien Tiran, Sébastien Ordas, Yannick Teglia, Michel Agoyan, Philippe Maurine |
A Frequency Leakage Model and its application to CPA and DPA. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2013, pp. 278, 2013. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP BibTeX RDF |
|
18 | Carolyn Whitnall, Elisabeth Oswald |
Profiling DPA: Efficacy and efficiency trade-offs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2013, pp. 353, 2013. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP BibTeX RDF |
|
18 | Suvadeep Hajra, Debdeep Mukhopadhyay |
Multivariate Leakage Model for Improving Non-profiling DPA on Noisy Power Traces. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inscrypt ![In: Information Security and Cryptology - 9th International Conference, Inscrypt 2013, Guangzhou, China, November 27-30, 2013, Revised Selected Papers, pp. 325-342, 2013, Springer, 978-3-319-12086-7. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
18 | Partha De, Kunal Banerjee 0001, Chittaranjan A. Mandal, Debdeep Mukhopadhyay |
Designing DPA Resistant Circuits Using BDD Architecture and Bottom Pre-charge Logic. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DSD ![In: 2013 Euromicro Conference on Digital System Design, DSD 2013, Los Alamitos, CA, USA, September 4-6, 2013, pp. 641-644, 2013, IEEE Computer Society, 978-1-4799-2978-8. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
18 | Begül Bilgin, Joan Daemen, Ventzislav Nikov, Svetla Nikova, Vincent Rijmen, Gilles Van Assche |
Efficient and First-Order DPA Resistant Implementations of Keccak. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CARDIS ![In: Smart Card Research and Advanced Applications - 12th International Conference, CARDIS 2013, Berlin, Germany, November 27-29, 2013. Revised Selected Papers, pp. 187-199, 2013, Springer, 978-3-319-08301-8. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
18 | Susana Eiroa, Iluminada Baturone |
FPGA implementation and DPA resistance analysis of a lightweight HMAC construction based on photon hash family. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FPL ![In: 23rd International Conference on Field programmable Logic and Applications, FPL 2013, Porto, Portugal, September 2-4, 2013, pp. 1-4, 2013, IEEE, 978-1-4799-0004-6. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
18 | Jie-Wei Lai, Chi-Hsueh Wang, Kaipon Kao, Anson Lin, Yi-Hsien Cho, Lan-chou Cho, Meng-Hsiung Hung, Xin-Yu Shih, Che-Min Lin, Sheng-Hong Yan, Yuan-Hung Chung, Paul C. P. Liang, Guang-Kaai Dehng, Hung-Sung Li, George Chien, Robert Bogdan Staszewski |
A 0.27mm2 13.5dBm 2.4GHz all-digital polar transmitter using 34%-efficiency Class-D DPA in 40nm CMOS. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISSCC ![In: 2013 IEEE International Solid-State Circuits Conference - Digest of Technical Papers, ISSCC 2013, San Francisco, CA, USA, February 17-21, 2013, pp. 342-343, 2013, IEEE, 978-1-4673-4515-6. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
18 | Câncio Monteiro, Yasuhiro Takahashi, Toshikazu Sekine |
DPA resistance of charge-sharing symmetric adiabatic logic. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCAS ![In: 2013 IEEE International Symposium on Circuits and Systems (ISCAS2013), Beijing, China, May 19-23, 2013, pp. 2581-2584, 2013, IEEE, 978-1-4673-5760-9. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
18 | Xiaoxin Cui, Rui Li, Wei Wei, Juan Gu, Xiaole Cui |
AHardware implementation of DES with combined countermeasure against DPA. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASICON ![In: IEEE 10th International Conference on ASIC, ASICON 2013, Shenzhen, China, October 28-31, 2013, pp. 1-4, 2013, IEEE, 978-1-4673-6415-7. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
18 | Bodhisatwa Mazumdar, Debdeep Mukhopadhyay, Indranil Sengupta 0001 |
Design and implementation of rotation symmetric S-boxes with high nonlinearity and high DPA resilience. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HOST ![In: 2013 IEEE International Symposium on Hardware-Oriented Security and Trust, HOST 2013, Austin, TX, USA, June 2-3, 2013, pp. 87-92, 2013, IEEE Computer Society, 978-1-4799-0559-1. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
18 | Alberto Fuentes Rodríguez, Luis Hernández Encinas, Agustín Martín Muñoz, Bernardo Alarcos Alcázar |
A Toolbox for DPA Attacks to Smart Cards. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SOCO-CISIS-ICEUTE ![In: International Joint Conference SOCO'13-CISIS'13-ICEUTE'13 - Salamanca, Spain, September 11th-13th, 2013 Proceedings, pp. 399-408, 2013, Springer, 978-3-319-01853-9. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
18 | Ruicong Ma, Daheng Yue, Shaoqing Li, Jihua Chen |
Research on the Relationship between the Effect of DPA and Differential Sample Frequency. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DASC ![In: IEEE 11th International Conference on Dependable, Autonomic and Secure Computing, DASC 2013, Chengdu, China, December 21-22, 2013, pp. 91-95, 2013, IEEE Computer Society, 978-1-4799-3380-8. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
18 | Carolyn Whitnall, Elisabeth Oswald |
Profiling DPA: Efficacy and Efficiency Trade-Offs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHES ![In: Cryptographic Hardware and Embedded Systems - CHES 2013 - 15th International Workshop, Santa Barbara, CA, USA, August 20-23, 2013. Proceedings, pp. 37-54, 2013, Springer, 978-3-642-40348-4. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
18 | Simone Bongiovanni, Mauro Olivieri, Giuseppe Scotti, Alessandro Trifiletti |
A flip-flop implementation for the DPA-resistant Delay-based Dual-rail Pre-charge Logic family. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MIXDES ![In: Proceedings of the 20th International Conference Mixed Design of Integrated Circuits and Systems - MIXDES 2013, Gdynia, Poland, June 20-22, 2013, pp. 163-168, 2013, IEEE. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP BibTeX RDF |
|
18 | Kazuyuki Tanimura, Nikil D. Dutt |
HDRL: Homogeneous Dual-Rail Logic for DPA Attack Resistive Secure Circuit Design. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Embed. Syst. Lett. ![In: IEEE Embed. Syst. Lett. 4(3), pp. 57-60, 2012. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
18 | Marco Bucci, Luca Giancane, Raimondo Luzzi, Alessandro Trifiletti |
A Flip-Flop for the DPA Resistant Three-Phase Dual-Rail Pre-Charge Logic Family. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Very Large Scale Integr. Syst. ![In: IEEE Trans. Very Large Scale Integr. Syst. 20(11), pp. 2128-2132, 2012. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
18 | Andrey Bogdanov, Ilya Kizhvatov |
Beyond the Limits of DPA: Combined Side-Channel Collision Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Computers ![In: IEEE Trans. Computers 61(8), pp. 1153-1164, 2012. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
18 | Carolyn Whitnall, Elisabeth Oswald, François-Xavier Standaert |
The myth of generic DPA...and the magic of learning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2012, pp. 256, 2012. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP BibTeX RDF |
|
18 | Bodhisatwa Mazumdar, Debdeep Mukhopadhyay, Indranil Sengupta 0001 |
Constrained Search for a Class of Good S-Boxes with Improved DPA Resistivity. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2012, pp. 547, 2012. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP BibTeX RDF |
|
18 | Jen-Wei Lee, Ju-Hung Hsiao, Hsie-Chia Chang, Chen-Yi Lee |
An Efficient DPA Countermeasure With Randomized Montgomery Operations for DF-ECC Processor. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Circuits Syst. II Express Briefs ![In: IEEE Trans. Circuits Syst. II Express Briefs 59-II(5), pp. 287-291, 2012. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
18 | A. Amaar, I. Ashour, Mustafa Shiple |
Efficient Implementation of AES Algorithm Immune to DPA Attack. ![Search on Bibsonomy](Pics/bibsonomy.png) |
UKSim ![In: 14th International Conference on Computer Modelling and Simulation, 2012 UKSim, Cambridge, United Kingdom, March 28-30, 2012, pp. 396-401, 2012, IEEE Computer Society, 978-1-4673-1366-7. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
18 | Ganesh Khedkar, Dhireesha Kudithipudi |
RRAM Motifs for Mitigating Differential Power Analysis Attacks (DPA). ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISVLSI ![In: IEEE Computer Society Annual Symposium on VLSI, ISVLSI 2012, Amherst, MA, USA, August 19-21, 2012, pp. 88-93, 2012, IEEE Computer Society, 978-1-4673-2234-8. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
18 | Hiroki Ito, Mitsuru Shiozaki, Anh-Tuan Hoang, Takeshi Fujino |
Efficient DPA-Resistance Verification Method with Smaller Number of Power Traces on AES Cryptographic Circuit. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DSD ![In: 15th Euromicro Conference on Digital System Design, DSD 2012, Cesme, Izmir, Turkey, September 5-8, 2012, pp. 735-738, 2012, IEEE Computer Society, 978-1-4673-2498-4. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
18 | Hugo Daniel Hernández, Jonathan Scott, Wilhelmus A. M. Van Noije |
DPA insensitive voltage regulator for contact smart cards. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SBCCI ![In: 25th Symposium on Integrated Circuits and Systems Design, SBCCI 2012, Brasilia, Brazil, August 30 - September 2, 2012, pp. 1-4, 2012, IEEE, 978-1-4673-2606-3. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
18 | Lakshmi Narasimhan Ramakrishnan, Manoj Chakkaravarthy, Antarpreet Singh Manchanda, Mike Borowczak, Ranga Vemuri |
SDMLp: On the use of complementary Pass transistor Logic for design of DPA resistant circuits. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HOST ![In: 2012 IEEE International Symposium on Hardware-Oriented Security and Trust, HOST 2012, San Francisco, CA, USA, June 3-4, 2012, pp. 31-36, 2012, IEEE Computer Society, 978-1-4673-2341-3. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
18 | Hsing-Ping Fu, Ju-Hung Hsiao, Po-Chun Liu, Hsie-Chia Chang, Chen-Yi Lee |
A low cost DPA-resistant 8-bit AES core based on ring oscillators. ![Search on Bibsonomy](Pics/bibsonomy.png) |
VLSI-DAT ![In: Proceedings of Technical Program of 2012 VLSI Design, Automation and Test, VLSI-DAT 2012, Hsinchu, Taiwan, April 23-25, 2012, pp. 1-4, 2012, IEEE, 978-1-4577-2080-2. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
18 | Yuichi Komano, Hideo Shimizu, Chiho Mihara |
Another look on the relation between template attack and higher order DPA. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISITA ![In: Proceedings of the International Symposium on Information Theory and its Applications, ISITA 2012, Honolulu, HI, USA, October 28-31, 2012, pp. 541-545, 2012, IEEE, 978-1-4673-2521-9. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP BibTeX RDF |
|
18 | Yunsi Fei, Qiasi Luo, A. Adam Ding |
A Statistical Model for DPA with Novel Algorithmic Confusion Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHES ![In: Cryptographic Hardware and Embedded Systems - CHES 2012 - 14th International Workshop, Leuven, Belgium, September 9-12, 2012. Proceedings, pp. 233-250, 2012, Springer, 978-3-642-33026-1. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
18 | Oscar Reparaz, Benedikt Gierlichs, Ingrid Verbauwhede |
Selecting Time Samples for Multivariate DPA Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHES ![In: Cryptographic Hardware and Embedded Systems - CHES 2012 - 14th International Workshop, Leuven, Belgium, September 9-12, 2012. Proceedings, pp. 155-174, 2012, Springer, 978-3-642-33026-1. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
18 | |
DPA. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Encyclopedia of Cryptography and Security (2nd Ed.) ![In: Encyclopedia of Cryptography and Security, 2nd Ed., pp. 365, 2011, Springer, 978-1-4419-5905-8. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
18 | Yang Li 0001, Kazuo Sakiyama, Shin-ichi Kawamura, Kazuo Ohta |
Power Analysis against a DPA-Resistant S-Box Implementation Based on the Fourier Transform. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEICE Trans. Fundam. Electron. Commun. Comput. Sci. ![In: IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 94-A(1), pp. 191-199, 2011. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
18 | Meng Zhang, Niraj K. Jha |
FinFET-Based Power Management for Improved DPA Resistance with Low Overhead. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM J. Emerg. Technol. Comput. Syst. ![In: ACM J. Emerg. Technol. Comput. Syst. 7(3), pp. 10:1-10:16, 2011. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
18 | Haleh Vahedi, Stefano Gregori, Radu Muresan |
The effectiveness of a current flattening circuit as countermeasure against DPA attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Microelectron. J. ![In: Microelectron. J. 42(1), pp. 180-187, 2011. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
18 | Ming Tang 0002, Xiaorong Wang, Zhenlong Qiu, Si Gao, Huanguo Zhang, Qianhong Wu |
DPA Leakage Evaluation and Countermeasure Plug-in. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2011, pp. 77, 2011. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP BibTeX RDF |
|
18 | Andrew Moss, Elisabeth Oswald, Dan Page, Michael Tunstall |
Automatic Insertion of DPA Countermeasures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2011, pp. 412, 2011. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP BibTeX RDF |
|
18 | Bhushan K. Bonde, Dany J. V. Beste, Emma Laing, Andrzej M. Kierzek, Johnjoe McFadden |
Differential Producibility Analysis (DPA) of Transcriptomic Data with Metabolic Networks: Deconstructing the Metabolic Response of M. tuberculosis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PLoS Comput. Biol. ![In: PLoS Comput. Biol. 7(6), 2011. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
18 | Abhishek Rawat, Ram Narayan Yadav, S. C. Shrivastava |
Beamwidth Prediction of DPA Smart Antenna Using Support Vector Machine. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IICAI ![In: Proceedings of the 5th Indian International Conference on Artificial Intelligence, IICAI 2011, Tumkur, Karnataka State, India, December 14-16, 2011, pp. 1261-1270, 2011, IICAI, 978-0-9727412-8-6. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP BibTeX RDF |
|
18 | Po-Chun Liu, Ju-Hung Hsiao, Hsie-Chia Chang, Chen-Yi Lee |
A 2.97 Gb/s DPA-resistant AES engine with self-generated random sequence. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESSCIRC ![In: Proceedings of the 37th European Solid-State Circuits Conference, ESSCIRC 2011, Helsinki, Finland, Sept. 12-16, 2011, pp. 71-74, 2011, IEEE, 978-1-4577-0703-2. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
18 | Milena Djukanovic, Luca Giancane, Giuseppe Scotti, Alessandro Trifiletti, Massimo Alioto |
Leakage Power Analysis attacks: Effectiveness on DPA resistant logic styles under process variations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCAS ![In: International Symposium on Circuits and Systems (ISCAS 2011), May 15-19 2011, Rio de Janeiro, Brazil, pp. 2043-2046, 2011, IEEE, 978-1-4244-9473-6. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
18 | Masaya Yoshikawa, M. Sugiyama |
Multi-rounds masking method against DPA attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IRI ![In: Proceedings of the IEEE International Conference on Information Reuse and Integration, IRI 2011, 3-5 August 2011, Las Vegas, Nevada, USA, pp. 100-103, 2011, IEEE Systems, Man, and Cybernetics Society, 978-1-4577-0964-7. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
18 | Yuejun Zhang, Pengjun Wang, Lipeng Hao |
Design of resistant DPA three-valued counter based on SABL. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASICON ![In: 2011 IEEE 9th International Conference on ASIC, ASICON 2011, Xiamen, China, October 25-28, 2011, pp. 9-12, 2011, IEEE, 978-1-61284-192-2. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
18 | Katsuhiko Iwai, Mitsuru Shiozaki, Anh-Tuan Hoang, Kenji Kojima, Takeshi Fujino |
Implementation and verification of DPA-resistant cryptographic DES circuit using Domino-RSL. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HOST ![In: HOST 2011, Proceedings of the 2011 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST), 5-6 June 2011, San Diego, California, USA, pp. 28-33, 2011, IEEE Computer Society, 978-1-4577-1059-9. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
18 | Amir Moradi 0001, Oliver Mischke, Christof Paar |
Practical evaluation of DPA countermeasures on reconfigurable hardware. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HOST ![In: HOST 2011, Proceedings of the 2011 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST), 5-6 June 2011, San Diego, California, USA, pp. 154-160, 2011, IEEE Computer Society, 978-1-4577-1059-9. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
18 | Dakshita Khurana, Aditya Gaurav |
Ensuring tight computational security against higher-order DPA attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: Ninth Annual Conference on Privacy, Security and Trust, PST 2011, 19-21 July, 2011, Montreal, Québec, Canada, pp. 96-101, 2011, IEEE, 978-1-4577-0582-3. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
18 | Xiaoyi Duan, Ronglei Hu, Xiu Ying Li |
Research and Implementation of DPA-resistant SMS4 Block Cipher. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIS ![In: Seventh International Conference on Computational Intelligence and Security, CIS 2011, Sanya, Hainan, China, December 3-4, 2011, pp. 1033-1036, 2011, IEEE Computer Society, 978-1-4577-2008-6. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
18 | Masaya Yoshikawa, Y. Kojima |
Efficient Random Number for the Masking Method against DPA Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICSEng ![In: 21st International Conference on Systems Engineering (ICSEng 2011), Las Vegas, NV, USA, Aug. 16-18, 2011, pp. 321-324, 2011, IEEE, 978-1-4577-1078-0. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
Cryptography, Information security, Side channel attacks, Differential power analysis, Tamper resistance |
18 | Alessandro Cevrero, Francesco Regazzoni 0001, Micheal Schwander, Stéphane Badel, Paolo Ienne, Yusuf Leblebici |
Power-gated MOS current mode logic (PG-MCML): a power aware DPA-resistant standard cell library. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DAC ![In: Proceedings of the 48th Design Automation Conference, DAC 2011, San Diego, California, USA, June 5-10, 2011, pp. 1014-1019, 2011, ACM, 978-1-4503-0636-2. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
18 | Yoo-Jin Baek |
Regular 2w-ary right-to-left exponentiation algorithm with very efficient DPA and FA countermeasures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Inf. Sec. ![In: Int. J. Inf. Sec. 9(5), pp. 363-370, 2010. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|