The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for DPA with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1974-2000 (19) 2001-2002 (22) 2003 (19) 2004 (30) 2005 (38) 2006 (39) 2007 (45) 2008 (96) 2009 (31) 2010 (23) 2011 (19) 2012 (17) 2013 (19) 2014 (29) 2015 (29) 2016-2017 (33) 2018-2019 (12)
Publication types (Num. hits)
article(109) incollection(1) inproceedings(406) phdthesis(3) proceedings(1)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 576 occurrences of 189 keywords

Results
Found 520 publication records. Showing 520 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
109Hideyo Mamiya, Atsuko Miyaji, Hiroaki Morimoto Efficient Countermeasures against RPA, DPA, and SPA. Search on Bibsonomy CHES The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Elliptic curve exponentiation, ZPA, RPA, DPA, SPA
109Bert den Boer, Kerstin Lemke, Guntram Wicke A DPA Attack against the Modular Reduction within a CRT Implementation of RSA. Search on Bibsonomy CHES The full citation details ... 2002 DBLP  DOI  BibTeX  RDF RSA, DPA, power analysis, smartcard, CRT, side channel analysis, modular reduction
106Kouichi Itoh, Tetsuya Izu, Masahiko Takenaka A Practical Countermeasure against Address-Bit Differential Power Analysis. Search on Bibsonomy CHES The full citation details ... 2003 DBLP  DOI  BibTeX  RDF address-bit DPA, RSA, ECC, Differential Power Analysis (DPA), exponentiation, countermeasure
106Kouichi Itoh, Tetsuya Izu, Masahiko Takenaka Address-Bit Differential Power Analysis of Cryptographic Schemes OK-ECDH and OK-ECDSA. Search on Bibsonomy CHES The full citation details ... 2002 DBLP  DOI  BibTeX  RDF address-bit DPA, scalar exponentiation, OK-ECDH, OK-ECDSA, Differential power analysis (DPA), elliptic curve cryptosystems (ECC)
99Johannes Jendrsczok, Rolf Hoffmann, Thomas Lenck Generated Horizontal and Vertical Data Parallel GCA Machines for the N-Body Force Calculation. Search on Bibsonomy ARCS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
97Marco Bucci, Michele Guglielmo, Raimondo Luzzi, Alessandro Trifiletti A Power Consumption Randomization Countermeasure for DPA-Resistant Cryptographic Processors. Search on Bibsonomy PATMOS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF chipcards, cryptography, Differential power analysis, DPA, power analysis, countermeasures
97Kerstin Lemke, Kai Schramm, Christof Paar DPA on n-Bit Sized Boolean and Arithmetic Operations and Its Application to IDEA, RC6, and the HMAC-Construction. Search on Bibsonomy CHES The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Boolean and arithmetic operations, HMAC-construction, DPA, IDEA, RC6
95Thanh-Ha Le, Jessy Clédière, Cécile Canovas, Bruno Robisson, Christine Servière, Jean-Louis Lacoume A Proposition for Correlation Power Analysis Enhancement. Search on Bibsonomy CHES The full citation details ... 2006 DBLP  DOI  BibTeX  RDF multi-bit DPA, PPA, AES, correlation, DPA, power analysis, DES, side channel, CPA
94Dong-Guk Han, Jongin Lim, Kouichi Sakurai On Security of XTR Public Key Cryptosystems Against Side Channel Attacks. Search on Bibsonomy ACISP The full citation details ... 2004 DBLP  DOI  BibTeX  RDF XTR Public Key Cryptosystem, Data-bit DPA, Address-bit DPA, doubling attack, Side Channel Attacks, SPA
90Mehdi-Laurent Akkar, Louis Goubin A Generic Protection against High-Order Differential Power Analysis. Search on Bibsonomy FSE The full citation details ... 2003 DBLP  DOI  BibTeX  RDF High-Order DPA, Smart-cards, Power analysis, DES
86Stefan Mangard, Kai Schramm Pinpointing the Side-Channel Leakage of Masked AES Hardware Implementations. Search on Bibsonomy CHES The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Zero-Offset DPA, Zero-Input DPA, Delay Chains, AES, DPA, Masking, Glitches
84Kouichi Itoh, Tetsuya Izu, Masahiko Takenaka Improving the Randomized Initial Point Countermeasure Against DPA. Search on Bibsonomy ACNS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF RPA, ZVA, Smart card, DPA, Elliptic Curve Cryptosystems (ECC), countermeasure, RIP
80Elisabeth Oswald, Stefan Mangard, Christoph Herbst, Stefan Tillich Practical Second-Order DPA Attacks for Masked Smart Card Implementations of Block Ciphers. Search on Bibsonomy CT-RSA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
80Thomas S. Messerges Using Second-Order Power Analysis to Attack DPA Resistant Software. Search on Bibsonomy CHES The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
75Joshua Jaffe A First-Order DPA Attack Against AES in Counter Mode with Unknown Initial Counter. Search on Bibsonomy CHES The full citation details ... 2007 DBLP  DOI  BibTeX  RDF HO-DPA, AES, DPA, power analysis, SPA, counter mode
74Katsuyuki Okeya, Kouichi Sakurai A Second-Order DPA Attack Breaks a Window-Method Based Countermeasure against Side Channel Attacks. Search on Bibsonomy ISC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Higher-Order DPA Attack, Second-Order DPA Attack, Möller's Countermeasure, Side Channel Attacks, Differential Power Analysis, Elliptic Curve Cryptosystems
74Lang Lin, Wayne Burleson Leakage-based differential power analysis (LDPA) on sub-90nm CMOS cryptosystems. Search on Bibsonomy ISCAS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
74Konrad J. Kulikowski, Ming Su, Alexander B. Smirnov, Alexander Taubin, Mark G. Karpovsky, Daniel MacDonald Delay Insensitive Encoding and Power Analysis: A Balancing Act. Search on Bibsonomy ASYNC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
72Toru Akishita, Masanobu Katagi, Yoshikazu Miyato, Asami Mizuno, Kyoji Shibutani A Practical DPA Countermeasure with BDD Architecture. Search on Bibsonomy CARDIS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF dual-rail pre-charge logic, DPA, Binary Decision Diagram, countermeasure
72Kouichi Itoh, Masahiko Takenaka, Naoya Torii DPA Countermeasure Based on the "Masking Method". Search on Bibsonomy ICISC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF masking method, DPA, countermeasure, Rijndael
67Srividhya Rammohan, Vijay Sundaresan, Ranga Vemuri Reduced Complementary Dynamic and Differential Logic: A CMOS Logic Style for DPA-Resistant Secure IC Design. Search on Bibsonomy VLSI Design The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
67Massimo Alioto, Massimo Poli, Santina Rocchi, Valerio Vignoli Power Modeling of Precharged Address Bus and Application to Multi-bit DPA Attacks to DES Algorithm. Search on Bibsonomy PATMOS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
67Stjepan Rajko, Gang Qian A Hybrid HMM/DPA Adaptive Gesture Recognition Method. Search on Bibsonomy ISVC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
67Stefan Mangard Hardware Countermeasures against DPA ? A Statistical Analysis of Their Effectiveness. Search on Bibsonomy CT-RSA The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
66Jean-Sébastien Coron, Emmanuel Prouff, Matthieu Rivain Side Channel Cryptanalysis of a Higher Order Masking Scheme. Search on Bibsonomy CHES The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Higher Order DPA, Masking Scheme, Side Channel Attacks, Differential Power Analysis, Template Attacks
66Kai Schramm, Christof Paar Higher Order Masking of the AES. Search on Bibsonomy CT-RSA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Higher Order DPA, Masking Countermeasure, AES
66Louis Goubin A Refined Power-Analysis Attack on Elliptic Curve Cryptosystems. Search on Bibsonomy Public Key Cryptography The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Side-channel attacks, Public-key cryptography, Elliptic curves, Differential Power Analysis (DPA), Power Analysis, Smartcards
62Dimitrios N. Skoutas, Angelos N. Rouskas A Scheduling Algorithm with Dynamic Priority Assignment for WCDMA Systems. Search on Bibsonomy IEEE Trans. Mob. Comput. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
62Karthik Baddam, Mark Zwolinski Evaluation of Dynamic Voltage and Frequency Scaling as a Differential Power Analysis Countermeasure. Search on Bibsonomy VLSI Design The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
62Manfred von Willich A Technique with an Information-Theoretic Basis for Protecting Secret Data from Differential Power Attacks. Search on Bibsonomy IMA Int. Conf. The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
59Atsuko Miyaji Generalized MMM-Algorithm Secure Against SPA, DPA, and RPA. Search on Bibsonomy ICISC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF RPA, elliptic curve, DPA, SPA
59Daniel Mesquita, Jean-Denis Techer, Lionel Torres, Gilles Sassatelli, Gaston Cambon, Michel Robert, Fernando Moraes Current mask generation: a transistor level security against DPA attacks. Search on Bibsonomy SBCCI The full citation details ... 2005 DBLP  DOI  BibTeX  RDF cryptography, side channel attacks, DPA, countermeasures
57Katsuyuki Okeya Side Channel Attacks Against HMACs Based on Block-Cipher Based Hash Functions. Search on Bibsonomy ACISP The full citation details ... 2006 DBLP  DOI  BibTeX  RDF (keyed) hash function, PGV construction, reverse DPA, side channel attacks, differential power analysis (DPA), HMAC
55Alin Razafindraibe, Michel Robert, Philippe Maurine Analysis and Improvement of Dual Rail Logic as a Countermeasure Against DPA. Search on Bibsonomy PATMOS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
55Alin Razafindraibe, Michel Robert, Philippe Maurine Improvement of dual rail logic as a countermeasure against DPA. Search on Bibsonomy VLSI-SoC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
55Kuan Jen Lin, Shan Chien Fang, Shih Hsien Yang, Cheng Chia Lo Overcoming glitches and dissipation timing skews in design of DPA-resistant cryptographic hardware. Search on Bibsonomy DATE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
55Thomas Popp, Stefan Mangard Implementation aspects of the DPA-resistant logic style MDPL. Search on Bibsonomy ISCAS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
55G. Fraidy Bouesse, Marc Renaudin, Gilles Sicard Improving DPA Resistance of Quasi Delay Insensitive Circuits Using Randomly Time-shifted Acknowledgment Signals. Search on Bibsonomy VLSI-SoC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
55Emmanuel Prouff DPA Attacks and S-Boxes. Search on Bibsonomy FSE The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
55Tae-Jun Park, Mun-Kyu Lee, Dowon Hong, Kyoil Chung A DPA Countermeasure by Randomized Frobenius Decomposition. Search on Bibsonomy WISA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
55Nevine Maurice Ebeid, M. Anwar Hasan On Randomizing Private Keys to Counteract DPA Attacks. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2003 DBLP  DOI  BibTeX  RDF binary signed-digit representation, smart cards, Differential power analysis, elliptic curve cryptosystems, scalar multiplication
55Pierre-Yvan Liardet, Nigel P. Smart Preventing SPA/DPA in ECC Systems Using the Jacobi Form. Search on Bibsonomy CHES The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
54Robert P. McEvoy, Colin C. Murphy, William P. Marnane, Michael Tunstall Isolated WDDL: A Hiding Countermeasure for Differential Power Analysis on FPGAs. Search on Bibsonomy TRETS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF secure logic, FPGA, Side-channel attacks, DPA, Whirlpool
54Praveen Gauravaram, Katsuyuki Okeya An Update on the Side Channel Cryptanalysis of MACs Based on Cryptographic Hash Functions. Search on Bibsonomy INDOCRYPT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF M-NMAC, MDx-MAC, Side channel attacks, DPA, HMAC
54Naofumi Homma, Sei Nagashima, Yuichi Imai, Takafumi Aoki, Akashi Satoh High-Resolution Side-Channel Attack Using Phase-Based Waveform Matching. Search on Bibsonomy CHES The full citation details ... 2006 DBLP  DOI  BibTeX  RDF cryptographic module, waveform matching, phase-only correlation, side-channel attacks, DPA, DEMA
54Dakshi Agrawal, Josyula R. Rao, Pankaj Rohatgi Multi-channel Attacks. Search on Bibsonomy CHES The full citation details ... 2003 DBLP  DOI  BibTeX  RDF EM Analysis, Side-channel attacks, DPA, Power Analysis, DEMA
53Christoph Herbst, Elisabeth Oswald, Stefan Mangard An AES Smart Card Implementation Resistant to Power Analysis Attacks. Search on Bibsonomy ACNS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF DPA resistance, smart card, AES
50Eric Menendez, Ken Mai A High-Performance, Low-Overhead, Power-Analysis-Resistant, Single-Rail Logic Style. Search on Bibsonomy HOST The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
50Jean-Sébastien Coron, Christophe Giraud, Emmanuel Prouff, Matthieu Rivain Attack and Improvement of a Secure S-Box Calculation Based on the Fourier Transform. Search on Bibsonomy CHES The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
50Praveen Gauravaram, Katsuyuki Okeya Side Channel Analysis of Some Hash Based MACs: A Response to SHA-3 Requirements. Search on Bibsonomy ICICS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF hash functions, side channel attacks, HMAC, Applied cryptography
50You-Seok Lee, YongJe Choi, Dong-Guk Han, Ho Won Kim, Hyoung-Nam Kim A nobel key-search method for side channel attacks based on pattern recognition. Search on Bibsonomy ICASSP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
50Vijay Sundaresan, Srividhya Rammohan, Ranga Vemuri Power invariant secure IC design methodology using reduced complementary dynamic and differential logic. Search on Bibsonomy VLSI-SoC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
50Massimo Alioto, Massimo Poli, Santina Rocchi, Valerio Vignoli Techniques to Enhance the Resistance of Precharged Busses to Differential Power Analysis. Search on Bibsonomy PATMOS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
50Dong-Guk Han, Tsuyoshi Takagi, Jongin Lim Further Security Analysis of XTR. Search on Bibsonomy ISPEC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF XTR public key system, XTR-ISE, differential power analysis
50Emmanuel Prouff, Christophe Giraud, Sébastien Aumônier Provably Secure S-Box Implementation Based on Fourier Transform. Search on Bibsonomy CHES The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Provably Secure Countermeasure, Symmetric Cryptosystems, FOX, AES, Differential Power Analysis, Fourier Transform, S-Box
50Marc Joye, Pascal Paillier, Berry Schoenmakers On Second-Order Differential Power Analysis. Search on Bibsonomy CHES The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
47Thomas Popp, Stefan Mangard Masked Dual-Rail Pre-charge Logic: DPA-Resistance Without Routing Constraints. Search on Bibsonomy CHES The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Hardware Countermeasures, MDPL, Masking Logic, Dual-Rail Pre-Charge Logic, DPA, Side-Channel Analysis
46Kris Tiri, David D. Hwang, Alireza Hodjat, Bo-Cheng Lai, Shenglin Yang, Patrick Schaumont, Ingrid Verbauwhede Prototype IC with WDDL and Differential Routing - DPA Resistance Assessment. Search on Bibsonomy CHES The full citation details ... 2005 DBLP  DOI  BibTeX  RDF dual rail with precharge, wave dynamic differential logic (WDDL), differential routing, parasitic capacitance matching, side-channel attack (SCA), differential power analysis (DPA), countermeasure
42Jean-Sébastien Coron A New DPA Countermeasure Based on Permutation Tables. Search on Bibsonomy SCN The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
42Matteo Giaconia, Marco Macchetti, Francesco Regazzoni, Kai Schramm Area and Power Efficient Synthesis of DPA-Resistant Cryptographic S-Boxes. Search on Bibsonomy VLSI Design The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
42Sei Nagashima, Naofumi Homma, Yuichi Imai, Takafumi Aoki, Akashi Satoh DPA Using Phase-Based Waveform Matching against Random-Delay Countermeasure. Search on Bibsonomy ISCAS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
42Jens Rüdinger, Adolf Finger Algorithm Design and Side Channel Vulnerability on the Example of DPA Attack. Search on Bibsonomy ICN The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
42Francesco Regazzoni, Stéphane Badel, Thomas Eisenbarth 0001, Johann Großschädl, Axel Poschmann, Zeynep Toprak Deniz, Marco Macchetti, Laura Pozzi, Christof Paar, Yusuf Leblebici, Paolo Ienne A Simulation-Based Methodology for Evaluating the DPA-Resistance of Cryptographic Functional Units with Application to CMOS and MCML Technologies. Search on Bibsonomy ICSAMOS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
42Daisuke Suzuki, Minoru Saeki Security Evaluation of DPA Countermeasures Using Dual-Rail Pre-charge Logic Style. Search on Bibsonomy CHES The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
42Yi Wang 0016, Jussipekka Leiwo, Thambipillai Srikanthan, Luo Jianwen An Efficient Algorithm for DPA-resistent RSA. Search on Bibsonomy APCCAS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
42G. Fraidy Bouesse, Marc Renaudin, Sophie Dumont, Fabien Germain DPA on Quasi Delay Insensitive Asynchronous Circuits: Formalization and Improvement. Search on Bibsonomy DATE The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
42Daisuke Suzuki, Minoru Saeki, Tetsuya Ichikawa DPA Leakage Models for CMOS Logic Circuits. Search on Bibsonomy CHES The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
42Claude Carlet On Highly Nonlinear S-Boxes and Their Inability to Thwart DPA Attacks. Search on Bibsonomy INDOCRYPT The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
42Marc Berthod, Zoltan Kato, Josiane Zerubia DPA: a deterministic approach to the MAP problem. Search on Bibsonomy IEEE Trans. Image Processing The full citation details ... 1995 DBLP  DOI  BibTeX  RDF
42Jean-Sébastien Coron, Ilya Kizhvatov Analysis of the split mask countermeasure for embedded systems. Search on Bibsonomy WESS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF cryptanalysis, DPA, side channel analysis, countermeasures, masking
42HyungSo Yoo, Christoph Herbst, Stefan Mangard, Elisabeth Oswald, Sang-Jae Moon Investigations of Power Analysis Attacks and Countermeasures for ARIA. Search on Bibsonomy WISA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF DPA, smartcard, ARIA
42Eric Peeters, François-Xavier Standaert, Nicolas Donckers, Jean-Jacques Quisquater Improved Higher-Order Side-Channel Attacks with FPGA Experiments. Search on Bibsonomy CHES The full citation details ... 2005 DBLP  DOI  BibTeX  RDF cryptographic devices, high-order power analysis, masking countermeasure, FPGA, block cipher, DPA, side-channel analysis
42Wieland Fischer, Berndt M. Gammel Masking at Gate Level in the Presence of Glitches. Search on Bibsonomy CHES The full citation details ... 2005 DBLP  DOI  BibTeX  RDF random masking, masked logic circuits, Cryptanalysis, side-channel attacks, DPA, power analysis, logic circuits, digital circuits, masking, glitches
42MahnKi Ahn, JaeCheol Ha, Hoon-Jae Lee 0001, Sang-Jae Moon A Random M-ary Method Based Countermeasure against Side Channel Attacks. Search on Bibsonomy ICCSA (2) The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Random m-ary Recoding Algorithm, Side Channel Attacks, DPA, Elliptic Curve Cryptosystems, SPA, Power Analysis Attacks
42Dong Jin Park, Sang Gyoo Sim, Pil Joong Lee Fast Scalar Multiplication Method Using Change-of-Basis Matrix to Prevent Power Analysis Attacks on Koblitz Curves. Search on Bibsonomy WISA The full citation details ... 2003 DBLP  DOI  BibTeX  RDF sliding window methods, basis conversion, Koblitz curve cryptosystems, DPA, scalar multiplication, SPA
42JaeCheol Ha, Sang-Jae Moon Randomized Signed-Scalar Multiplication of ECC to Resist Power Attacks. Search on Bibsonomy CHES The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Side-channel attack, DPA, Elliptic curve cryptosystems, SPA, Power analysis attack, Non-adjacent form
42Colin D. Walter Sliding Windows Succumbs to Big Mac Attack. Search on Bibsonomy CHES The full citation details ... 2001 DBLP  DOI  BibTeX  RDF Cryptography, smart card, RSA, differential power analysis, DPA, blinding, sliding windows, exponentiation
41Thomas Popp, Mario Kirschbaum, Stefan Mangard Practical Attacks on Masked Hardware. Search on Bibsonomy CT-RSA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF DPA-Resistant Masked Logic Styles, MDPL, Prototype Chip, Hardware AES, PDF-Attack, PRNG
41Stefan Tillich, Christoph Herbst Attacking State-of-the-Art Software Countermeasures-A Case Study for AES. Search on Bibsonomy CHES The full citation details ... 2008 DBLP  DOI  BibTeX  RDF software countermeasures, operation randomization, advanced DPA attacks, smart card, Advanced Encryption Standard, side channel attacks, power analysis, masking
41Thomas Popp, Mario Kirschbaum, Thomas Zefferer, Stefan Mangard Evaluation of the Masked Logic Style MDPL on a Prototype Chip. Search on Bibsonomy CHES The full citation details ... 2007 DBLP  DOI  BibTeX  RDF DPA-Resistant Logic Styles, Masked Logic, Dual-Rail Precharge Logic, Early Propagation Effect, Improved MDPL, Prototype Chip
37Zhenjiang Wang, Chenggang Wu, Pen-Chung Yew On improving heap memory layout by dynamic pool allocation. Search on Bibsonomy CGO The full citation details ... 2010 DBLP  DOI  BibTeX  RDF adaptive partial call chain, pool allocation, dynamic optimization, data layout
37Matthieu Rivain, Emmanuel Prouff, Julien Doget Higher-Order Masking and Shuffling for Software Implementations of Block Ciphers. Search on Bibsonomy CHES The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
37Kazuo Sakiyama, Tatsuya Yagi, Kazuo Ohta Fault Analysis Attack against an AES Prototype Chip Using RSL. Search on Bibsonomy CT-RSA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Random Switching Logic, Clock-based Attack, AES, Fault Analysis
37Khurram Waheed, Robert B. Staszewski Mitigation of CMOS device variability in the transmitter amplitude path using Digital RF Processing. Search on Bibsonomy ISCAS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
37Massimo Alioto, Massimo Poli, Santina Rocchi A general model for differential power analysis attacks to static logic circuits. Search on Bibsonomy ISCAS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
37Yingxi Lu, Máire O'Neill, John V. McCanny Differential Power Analysis of a SHACAL-2 hardware implementation. Search on Bibsonomy ISCAS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
37Jing Pan, J. I. den Hartog, Erik P. de Vink An Operation-Based Metric for CPA Resistance. Search on Bibsonomy SEC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
37Dong Liu, Weiyan Xing, Rui Li, Chunyuan Zhang, Haiyan Li A Fault-Tolerant Real-Time Scheduling Algorithm in Software Fault-Tolerant Module. Search on Bibsonomy International Conference on Computational Science (4) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF real-time system, scheduling algorithm, software fault-tolerance
37Mikko Alatossava, Lassi Hentilä, Veli-Matti Holappa, Juha Meinilä Comparison of Outdoor to Indoor and Indoor to Outdoor MIMO Propagation Characteristics at 5.25 GHz. Search on Bibsonomy VTC Spring The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
37Massimo Alioto, Massimo Poli, Santina Rocchi, Valerio Vignoli Mixed Techniques to Protect Precharged Busses against Differential Power Analysis Attacks. Search on Bibsonomy ISCAS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
37Elisabeth Oswald, Stefan Mangard Template Attacks on Masking - Resistance Is Futile. Search on Bibsonomy CT-RSA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
37Guillaume Fumaroli, Emmanuel Mayer, Renaud Dubois First-Order Differential Power Analysis on the Duplication Method. Search on Bibsonomy INDOCRYPT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF zero attack, differential power analysis, spectral analysis, Side-channel analysis
37JaeCheol Ha, JeaHoon Park, Sang-Jae Moon, Sung-Ming Yen Provably Secure Countermeasure Resistant to Several Types of Power Attack for ECC. Search on Bibsonomy WISA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Smart card, ECC, Side channel attack, Power analysis attack
37Catherine H. Gebotys A table masking countermeasure for low-energy secure embedded systems. Search on Bibsonomy IEEE Trans. VLSI Syst. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
37Catherine H. Gebotys A split-mask countermeasure for low-energy secure embedded systems. Search on Bibsonomy ACM Trans. Embedded Comput. Syst. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF EM analysis, Side channel analysis, countermeasures, power attacks
37Wen-Syan Li, Daniel C. Zilio, Vishal S. Batra, Mahadevan Subramanian, Calisto Zuzarte, Inderpal Narang Load Balancing for Multi-tiered Database Systems through Autonomic Placement of Materialized Views. Search on Bibsonomy ICDE The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
37Kwangil Lee, Tim S. Yao Dynamic Path Adaptation Routing Protocol for Mobile Ad Hoc Networks. Search on Bibsonomy VTC Spring The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
37Zhanrong Yang, R. Muresan The Impact of the Implementation Style on Power Consumption and Security in Embedded Cryptosystems. Search on Bibsonomy CCECE The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
37Kay C. Wiese, Andrew Hendriks, Jagdeep Poonian Algorithms for RNA folding: a comparison of dynamic programming and parallel evolutionary algorithms. Search on Bibsonomy Congress on Evolutionary Computation The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
37Pao-Lung Chen, Ching-Che Chung, Chen-Yi Lee An all-digital PLL with cascaded dynamic phase average loop for wide multiplication range applications. Search on Bibsonomy ISCAS (5) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #100 of 520 (100 per page; Change: )
Pages: [1][2][3][4][5][6][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license