Examining Smart-Card Security under the Threat of Power Analysis Attacks
IEEE Transactions on Computers
Comparative Evaluation of Rank Correlation Based DPA on an AES Prototype Chip
ISC '08 Proceedings of the 11th international conference on Information Security
Information Security and Cryptology --- ICISC 2008
Random Order m-ary Exponentiation
ACISP '09 Proceedings of the 14th Australasian Conference on Information Security and Privacy
Power analysis for secret recovering and reverse engineering of public key algorithms
SAC'07 Proceedings of the 14th international conference on Selected areas in cryptography
Shape analysis for power signal cryptanalysis on secure components
Journal of Systems and Software
Montgomery's trick and fast implementation of masked AES
AFRICACRYPT'11 Proceedings of the 4th international conference on Progress in cryptology in Africa
FSE'05 Proceedings of the 12th international conference on Fast Software Encryption
Cache based power analysis attacks on AES
ACISP'06 Proceedings of the 11th Australasian conference on Information Security and Privacy
CT-RSA'12 Proceedings of the 12th conference on Topics in Cryptology
COSADE'13 Proceedings of the 4th international conference on Constructive Side-Channel Analysis and Secure Design
Proceedings of the First Workshop on Cryptography and Security in Computing Systems
Hi-index | 0.00 |