|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 576 occurrences of 189 keywords
|
|
|
Results
Found 585 publication records. Showing 585 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
18 | Hideyo Mamiya, Atsuko Miyaji, Hiroaki Morimoto |
Secure Elliptic Curve Exponentiation against RPA, ZRA, DPA, and SPA. |
IEICE Trans. Fundam. Electron. Commun. Comput. Sci. |
2006 |
DBLP DOI BibTeX RDF |
|
18 | Osman Kocar |
DPA attacks on keys stored in CMOS cryptographic devices through the influence of the leakage behavior. |
IACR Cryptol. ePrint Arch. |
2006 |
DBLP BibTeX RDF |
|
18 | Konrad J. Kulikowski, Mark G. Karpovsky, Alexander Taubin |
DPA on Faulty Cryptographic Hardware and Countermeasures. |
FDTC |
2006 |
DBLP DOI BibTeX RDF |
|
18 | Dong-Wook Lee, Dong-Soo Har |
An Area Efficient Approach to Design Self-Timed Cryptosystems Combatting DPA Attack. |
IEICE Trans. Fundam. Electron. Commun. Comput. Sci. |
2005 |
DBLP BibTeX RDF |
|
18 | Claude Carlet |
On highly nonlinear S-boxes and their inability to thwart DPA attacks (completed version). |
IACR Cryptol. ePrint Arch. |
2005 |
DBLP BibTeX RDF |
|
18 | |
A New Approach to Counteract DPA Attacks on Block Ciphers. |
IACR Cryptol. ePrint Arch. |
2005 |
DBLP BibTeX RDF |
|
18 | Peter Schumacher |
Usability für mobile Dienste. Nutzerstudie zu einem MMS-Dienst der dpa infocom zur Fußball-Berichterstattung. |
i-com |
2005 |
DBLP DOI BibTeX RDF |
|
18 | Frank K. Gürkaynak, Stephan Oetiker, Hubert Kaeslin, Norbert Felber, Wolfgang Fichtner |
Improving DPA security by using globally-asynchronous locally-synchronous systems. |
ESSCIRC |
2005 |
DBLP DOI BibTeX RDF |
|
18 | Jong Hoon Shin, Dong Jin Park, Pil Joong Lee |
DPA Attack on the Improved Ha-Moon Algorithm. |
WISA |
2005 |
DBLP DOI BibTeX RDF |
Ha-Moon algorithm, randomized exponentiation algorithm, side-channel attack |
18 | Zeynep Toprak Deniz, Yusuf Leblebici |
Low-power current mode logic for improved DPA-resistance in embedded systems. |
ISCAS (2) |
2005 |
DBLP DOI BibTeX RDF |
|
18 | Dong Jin Park, Pil Joong Lee |
A DPA Attack on the Improved Ha-Moon Algorithm. |
IACR Cryptol. ePrint Arch. |
2004 |
DBLP BibTeX RDF |
|
18 | Daisuke Suzuki, Minoru Saeki, Tetsuya Ichikawa |
Random Switching Logic: A Countermeasure against DPA based on Transition Probability. |
IACR Cryptol. ePrint Arch. |
2004 |
DBLP BibTeX RDF |
|
18 | Hee Bong Choi, Jong-Gil Kim, Sang-Yun Han, Mung-Gil Choi, Chun-Soo Kim, Hyoon Jae Lee |
DPA Methods of Smart Cards. |
Security and Management |
2004 |
DBLP BibTeX RDF |
|
18 | Marc Joye |
Smart-Card Implementation of Elliptic Curve Cryptography and DPA-type Attacks. |
CARDIS |
2004 |
DBLP DOI BibTeX RDF |
|
18 | Kris Tiri, Ingrid Verbauwhede |
Charge recycling sense amplifier based logic: securing low power security ICs against DPA [differential power analysis]. |
ESSCIRC |
2004 |
DBLP DOI BibTeX RDF |
|
18 | François-Xavier Standaert, Siddika Berna Örs, Bart Preneel |
Power Analysis of an FPGA: Implementation of Rijndael: Is Pipelining a DPA Countermeasure? |
CHES |
2004 |
DBLP DOI BibTeX RDF |
|
18 | Nigel Wildish, Marcus Turle |
Case Report: Mirror image: DPA first as supermodel Campbell sues newspaper over photographs. |
Comput. Law Secur. Rev. |
2002 |
DBLP DOI BibTeX RDF |
|
18 | Patrick Rakers, Larry Connell, Tim Collins, Dan Russell |
Secure contactless smartcard ASIC with DPA protection. |
IEEE J. Solid State Circuits |
2001 |
DBLP DOI BibTeX RDF |
|
18 | Patrick Rakers, Larry Connell, Tim Collins, Dan Russell |
Secure contactless smartcard ASIC with DPA protection. |
CICC |
2000 |
DBLP DOI BibTeX RDF |
|
18 | Peter Rissling |
Softwarekonzept für dezentralisierte prozessnahe Automatisierungseinrichtungen insbesondere für das dezentralisierte prozessnahe Automatisierungsgerätesystem DPA 02. |
|
1989 |
RDF |
|
18 | Jan van Leeuwen, Carl H. Smith |
An Improved Bound for Detecting Looping Configurations in Deterministic DPA's. |
Inf. Process. Lett. |
1974 |
DBLP DOI BibTeX RDF |
|
17 | Rafael Iankowski Soares, Ney Laert Vilar Calazans, Fernando Gehm Moraes, Philippe Maurine, Lionel Torres |
A Robust Architectural Approach for Cryptographic Algorithms Using GALS Pipelines. |
IEEE Des. Test Comput. |
2011 |
DBLP DOI BibTeX RDF |
cryptography attacks, DPA, asynchronous, SCA, GALS, design and test, DEMA |
17 | Guido Marco Bertoni, Luca Breveglieri, Alessandro Cominola, Filippo Melzani, Ruggero Susella |
Practical Power Analysis Attacks to RSA on a Large IP Portfolio SoC. |
ITNG |
2009 |
DBLP DOI BibTeX RDF |
cryptography, RSA, side channel attacks, DPA, power analysis attack |
17 | Ilya Kizhvatov |
Side channel analysis of AVR XMEGA crypto engine. |
WESS |
2009 |
DBLP DOI BibTeX RDF |
cryptography, DPA, side channel analysis |
17 | Thanh-Ha Le, Cécile Canovas, Jessy Clédière |
An overview of side channel analysis attacks. |
AsiaCCS |
2008 |
DBLP DOI BibTeX RDF |
side channel attacks, stochastic model, DPA, DEMA, CPA, template attack |
17 | David Canright, Lejla Batina |
A Very Compact "Perfectly Masked" S-Box for AES. |
ACNS |
2008 |
DBLP DOI BibTeX RDF |
composite Galois field, AES, DPA, S-box, masking |
17 | Rafael Soares, Ney Laert Vilar Calazans, Victor Lomné, Philippe Maurine, Lionel Torres, Michel Robert |
Evaluating the robustness of secure triple track logic through prototyping. |
SBCCI |
2008 |
DBLP DOI BibTeX RDF |
logic style, FPGA, side-channel attacks, DPA, DES, CPA |
17 | Svetla Nikova, Vincent Rijmen, Martin Schläffer |
Secure Hardware Implementation of Non-linear Functions in the Presence of Glitches. |
ICISC |
2008 |
DBLP DOI BibTeX RDF |
non-linear functions, Noekeon, DPA, sharing, S-box, masking, glitches |
17 | Andrey Bogdanov, Ilya Kizhvatov, Andrei Pyshkin |
Algebraic Methods in Side-Channel Collision Attacks and Practical Collision Detection. |
INDOCRYPT |
2008 |
DBLP DOI BibTeX RDF |
multiple-differential collision attacks, ternary voting, AES, Side-channel attacks, DPA, collision attacks, algebraic cryptanalysis |
17 | Giorgio Di Natale, Marie-Lise Flottes, Bruno Rouzeyre |
An Integrated Validation Environment for Differential Power Analysis. |
DELTA |
2008 |
DBLP DOI BibTeX RDF |
Secure chips, Validation, DPA |
17 | Andrey Bogdanov |
Multiple-Differential Side-Channel Collision Attacks on AES. |
CHES |
2008 |
DBLP DOI BibTeX RDF |
multiple-differential collision attacks, AES, collision detection, side-channel attacks, DPA |
17 | Stefan Tillich, Christoph Herbst, Stefan Mangard |
Protecting AES Software Implementations on 32-Bit Processors Against Power Analysis. |
ACNS |
2007 |
DBLP DOI BibTeX RDF |
software countermeasures, implementation security, Advanced Encryption Standard, side-channel attacks, DPA, power analysis, instruction set extensions |
17 | Colin D. Walter |
Longer Randomly Blinded RSA Keys May Be Weaker Than Shorter Ones. |
WISA |
2007 |
DBLP DOI BibTeX RDF |
RSA, DPA, power analysis, SPA, Side channel leakage |
17 | Michael Hutter, Stefan Mangard, Martin Feldhofer |
Power and EM Attacks on Passive 13.56 MHz RFID Devices. |
CHES |
2007 |
DBLP DOI BibTeX RDF |
EM Attacks, RFID, AES, Side-Channel Attacks, DPA, Power Analysis, DEMA |
17 | Colin D. Walter, David Samyde |
Data Dependent Power Use in Multipliers. |
IEEE Symposium on Computer Arithmetic |
2005 |
DBLP DOI BibTeX RDF |
EMA, smart card, Differential power analysis, DPA, multiplication, multiplier, RSA cryptosystem |
17 | Jerry den Hartog, Erik P. de Vink |
Virtual Analysis and Reduction of Side-Channel Vulnerabilities of Smartcards. |
Formal Aspects in Security and Trust |
2004 |
DBLP DOI BibTeX RDF |
systematic hardening, simulation, side-channel attack, DPA, power analysis, smartcard, countermeasures, fault analysis |
16 | Giorgio Di Natale, Marie-Lise Flottes, Bruno Rouzeyre |
Evaluation of Resistance to Differential Power Analysis: Execution Time Optimizations for Designers. |
DELTA |
2010 |
DBLP DOI BibTeX RDF |
DPA Robustness Evaluation, Design of secure devices |
16 | Laurent Sauvage, Maxime Nassar, Sylvain Guilley, Florent Flament, Jean-Luc Danger, Yves Mathieu |
DPL on Stratix II FPGA: What to Expect?. |
ReConFig |
2009 |
DBLP DOI BibTeX RDF |
Dual-rail with Precharge Logic (DPL), Wave Dynamic Differential Logic (WDDL), Field Programmable Gates Array (FPGA), Differential Power Analysis (DPA), Commercial Off-The-Shelf (COTS), Side-Channel Analysis (SCA) |
16 | Thomas Popp, Stefan Mangard, Elisabeth Oswald |
Power Analysis Attacks and Countermeasures. |
IEEE Des. Test Comput. |
2007 |
DBLP DOI BibTeX RDF |
DPA-resistant logic styles, countermeasures, power analysis attacks |
16 | Kerstin Lemke-Rust, Christof Paar |
Gaussian Mixture Models for Higher-Order Side Channel Analysis. |
CHES |
2007 |
DBLP DOI BibTeX RDF |
Higher-Order Analysis, Boolean Masking, Second-Order DPA, EM Algorithm, Gaussian Mixture Models, Templates, Side Channel Cryptanalysis |
12 | Zhimin Chen 0002, Syed Haider, Patrick Schaumont |
Side-Channel Leakage in Masked Circuits Caused by Higher-Order Circuit Effects. |
ISA |
2009 |
DBLP DOI BibTeX RDF |
|
12 | Thomas Plos |
Evaluation of the Detached Power Supply as Side-Channel Analysis Countermeasure for Passive UHF RFID Tags. |
CT-RSA |
2009 |
DBLP DOI BibTeX RDF |
Deta-ched Power Supply, Parasitic Backscatter, RFID, Differential Power Analysis, Side-Channel Analysis, UHF |
12 | Kuan Jen Lin, Yi Tang Chiu, Shan Chien Fang |
Design Optimization and Automation for Secure Cryptographic Circuits. |
VLSI Design |
2009 |
DBLP DOI BibTeX RDF |
|
12 | Kay C. Wiese, Alain Deschênes, Andrew Hendriks |
RnaPredict-An Evolutionary Algorithm for RNA Secondary Structure Prediction. |
IEEE ACM Trans. Comput. Biol. Bioinform. |
2008 |
DBLP DOI BibTeX RDF |
RnaPredict, Evolutionary Computation, RNA Secondary Structure Prediction |
12 | Giovanni Iachello, Gregory D. Abowd |
From privacy methods to a privacy toolbox: Evaluation shows that heuristics are complementary. |
ACM Trans. Comput. Hum. Interact. |
2008 |
DBLP DOI BibTeX RDF |
proportionality, Privacy, ubiquitous computing, requirements analysis, design methods, risk analysis, social issues |
12 | Leonardo de Mello Honório, Michael Vidigal, Luiz E. Souza |
Dynamic Polymorphic Agents Scheduling and Execution Using Artificial Immune Systems. |
ICARIS |
2008 |
DBLP DOI BibTeX RDF |
Polymorphic Agent, IA Planning, multi-agent systems, Aspect-Oriented Program (AOP), Artificial Immune Systems (AIS) |
12 | Limin Fan, Yongbin Zhou, Dengguo Feng |
A Fast Implementation of Computing the Transparency Order of S-Boxes. |
ICYCS |
2008 |
DBLP DOI BibTeX RDF |
|
12 | Huiyun Li, Keke Wu, Bo Peng, Yiwei Zhang, Xinjian Zheng, Fengqi Yu |
Enhanced Correlation Power Analysis Attack on Smart Card. |
ICYCS |
2008 |
DBLP DOI BibTeX RDF |
|
12 | Jude Angelo Ambrose, Sri Parameswaran, Aleksandar Ignjatovic |
MUTE-AES: a multiprocessor architecture to prevent power analysis based side channel attack of the AES algorithm. |
ICCAD |
2008 |
DBLP DOI BibTeX RDF |
|
12 | Marcel Medwed, Elisabeth Oswald |
Template Attacks on ECDSA. |
WISA |
2008 |
DBLP DOI BibTeX RDF |
|
12 | Sylvain Guilley, Laurent Sauvage, Jean-Luc Danger, Nidhal Selmane, Renaud Pacalet |
Silicon-level Solutions to Counteract Passive and Active Attacks. |
FDTC |
2008 |
DBLP DOI BibTeX RDF |
|
12 | Ashur Rafiev, Julian P. Murphy, Danil Sokolov, Alexandre Yakovlev |
Conversion driven design of binary to mixed radix circuits. |
ICCD |
2008 |
DBLP DOI BibTeX RDF |
|
12 | François-Xavier Standaert, Benedikt Gierlichs, Ingrid Verbauwhede |
Partition vs. Comparison Side-Channel Distinguishers: An Empirical Evaluation of Statistical Tests for Univariate Side-Channel Attacks against Two Unprotected CMOS Devices. |
ICISC |
2008 |
DBLP DOI BibTeX RDF |
|
12 | Koustav Bhattacharya, Nagarajan Ranganathan |
A linear programming formulation for security-aware gate sizing. |
ACM Great Lakes Symposium on VLSI |
2008 |
DBLP DOI BibTeX RDF |
dynamic power variance, linear programming., path balancing, differential power analysis, gate sizing |
12 | Amir Khatib Zadeh, Catherine H. Gebotys |
Enhanced Current-Balanced Logic (ECBL): An Area Efficient Solution to Secure Smart Cards against Differential Power Attack. |
ITNG |
2007 |
DBLP DOI BibTeX RDF |
|
12 | Iana Siomina, Di Yuan 0001 |
Automated planning of CPICH power allocation for enhancing HSDPA performance at cell edges. |
Mobility Conference |
2007 |
DBLP DOI BibTeX RDF |
high speed downlink packet access, pilot power, optimization, performance |
12 | Jude Angelo Ambrose, Roshan G. Ragel, Sri Parameswaran |
A smart random code injection to mask power analysis based side channel attacks. |
CODES+ISSS |
2007 |
DBLP DOI BibTeX RDF |
random instruction injection, signture identification, side channel attack, power analysis, cross correlation |
12 | Kundan Kumar, Debdeep Mukhopadhyay, Dipanwita Roy Chowdhury |
Design of a Differential Power Analysis Resistant Masked AES S-Box. |
INDOCRYPT |
2007 |
DBLP DOI BibTeX RDF |
|
12 | Stefan Tillich, Johann Großschädl |
Power Analysis Resistant AES Implementation with Instruction Set Extensions. |
CHES |
2007 |
DBLP DOI BibTeX RDF |
embedded RISC processor, SPARC V8 architecture, SCA resistance, Advanced Encryption Standard, power analysis, instruction set extensions |
12 | Bruno Robisson, Pascal Manet |
Differential Behavioral Analysis. |
CHES |
2007 |
DBLP DOI BibTeX RDF |
Differential Behavioral Analysis, Safe-Error, Block Ciphers, AES, Differential Power Analysis, Fault Attacks |
12 | Bruno Janvier, Eric Bruno, Thierry Pun, Stéphane Marchand-Maillet |
Information-theoretic temporal segmentation of video and applications: multiscale keyframes selection and shot boundaries detection. |
Multim. Tools Appl. |
2006 |
DBLP DOI BibTeX RDF |
Content-based video analysis, Detection of shot boundaries, Keyframe selection, Temporal segmentation |
12 | Jacques J. A. Fournier, Michael Tunstall |
Cache Based Power Analysis Attacks on AES. |
ACISP |
2006 |
DBLP DOI BibTeX RDF |
|
12 | Kay C. Wiese, Andrew Hendriks, Alain Deschênes |
Analysis of Thermodynamic Models and Performance in RnaPredict - An Evolutionary Algorithm for RNA Folding. |
CIBCB |
2006 |
DBLP DOI BibTeX RDF |
|
12 | Sung-Ming Yen, Wei-Chih Lien, Sang-Jae Moon, JaeCheol Ha |
Power Analysis by Exploiting Chosen Message and Internal Collisions - Vulnerability of Checking Mechanism for RSA-Decryption. |
Mycrypt |
2005 |
DBLP DOI BibTeX RDF |
Cryptography, Smart card, Side-channel attack, Simple power analysis (SPA), Chosen-message attack |
12 | Kris Tiri, Ingrid Verbauwhede |
A VLSI Design Flow for Secure Side-Channel Attack Resistant ICs. |
DATE |
2005 |
DBLP DOI BibTeX RDF |
|
12 | Elisabeth Oswald, Kai Schramm |
An Efficient Masking Scheme for AES Software Implementations. |
WISA |
2005 |
DBLP DOI BibTeX RDF |
|
12 | Marco Bucci, Raimondo Luzzi, Michele Guglielmo, Alessandro Trifiletti |
A countermeasure against differential power analysis based on random delay insertion. |
ISCAS (4) |
2005 |
DBLP DOI BibTeX RDF |
|
12 | Mustapha Hedabou, Pierre Pinel, Lucien Bénéteau |
Countermeasures for Preventing Comb Method Against SCA Attacks. |
ISPEC |
2005 |
DBLP DOI BibTeX RDF |
comb method, pre-computed table, memory space, side channel attacks, Elliptic curve, scalar multiplication |
12 | Dan Page, Martijn Stam |
On XTR and Side-Channel Analysis. |
Selected Areas in Cryptography |
2004 |
DBLP DOI BibTeX RDF |
LUC, finite field, side channel attack, power analysis, XTR |
12 | Sylvain Guilley, Philippe Hoogvorst, Yves Mathieu, Renaud Pacalet, Jean Provost |
CMOS Structures Suitable for Secured Hardware. |
DATE |
2004 |
DBLP DOI BibTeX RDF |
|
12 | Chae Hoon Lim |
A New Method for Securing Elliptic Scalar Multiplication Against Side-Channel Attacks. |
ACISP |
2004 |
DBLP DOI BibTeX RDF |
|
12 | Benoît Chevallier-Mames |
Self-Randomized Exponentiation Algorithms. |
CT-RSA |
2004 |
DBLP DOI BibTeX RDF |
|
12 | Kai Schramm, Gregor Leander, Patrick Felke, Christof Paar |
A Collision-Attack on AES: Combining Side Channel- and Differential-Attack. |
CHES |
2004 |
DBLP DOI BibTeX RDF |
internal collisions, AES, side channel attacks, birthday paradox |
12 | Jean-Claude Bajard, Laurent Imbert, Pierre-Yvan Liardet, Yannick Teglia |
Leak Resistant Arithmetic. |
CHES |
2004 |
DBLP DOI BibTeX RDF |
RNS Montgomery multiplication, Side channel attacks, residue number systems |
12 | Sang Gyoo Sim, Dong Jin Park, Pil Joong Lee |
New Power Analysis on the Ha-Moon Algorithm and the MIST Algorithm. |
ICICS |
2004 |
DBLP DOI BibTeX RDF |
Ha-Moon algorithm, MIST algorithm, randomized exponentiation algorithm, power analysis |
12 | Anton Kargl, Götz Wiesend |
On Randomized Addition-Subtraction Chains to Counteract Differential Power Attacks. |
ICICS |
2004 |
DBLP DOI BibTeX RDF |
|
12 | Nigel P. Smart |
An Analysis of Goubin's Refined Power Analysis Attack. |
CHES |
2003 |
DBLP DOI BibTeX RDF |
|
12 | Régis Bevan, Erik Knudsen |
Ways to Enhance Differential Power Analysis. |
ICISC |
2002 |
DBLP DOI BibTeX RDF |
|
12 | James Irwin, Dan Page, Nigel P. Smart |
Instruction Stream Mutation for Non-Deterministic Processors. |
ASAP |
2002 |
DBLP DOI BibTeX RDF |
|
12 | Mehdi-Laurent Akkar, Christophe Giraud 0001 |
An Implementation of DES and AES, Secure against Some Attacks. |
CHES |
2001 |
DBLP DOI BibTeX RDF |
|
12 | Jean-Sébastien Coron, Louis Goubin |
On Boolean and Arithmetic Masking against Differential Power Analysis. |
CHES |
2000 |
DBLP DOI BibTeX RDF |
Physical attacks, Masking Techniques, AES, Differential Power Analysis, Smartcards, IDEA, Electric consumption |
12 | Volker Walter 0001 |
Comparison of the Potential of Different Sensors for an Automatic Approach for Change Detection in GIS Databases. |
Integrated Spatial Databases |
1999 |
DBLP DOI BibTeX RDF |
|
12 | Ian Glaister, Jeffrey O. Shallit |
Automaticity III: Polynomial Automaticity and Context-Free Languages. |
Comput. Complex. |
1998 |
DBLP DOI BibTeX RDF |
finite automata, nondeterminism, Automaticity |
12 | Ian Glaister, Jeffrey O. Shallit |
Polynomial Automaticity, Context-Free Languages, and Fixed Points of Morphism (Extended Abstract). |
MFCS |
1996 |
DBLP DOI BibTeX RDF |
|
12 | John L. Gustafson |
Reevaluating Amdahl's Law. |
Commun. ACM |
1988 |
DBLP DOI BibTeX RDF |
|
Displaying result #501 - #585 of 585 (100 per page; Change: ) Pages: [ <<][ 1][ 2][ 3][ 4][ 5][ 6] |
|