|
|
(One intermediate revision by one other user not shown) |
| Property / full work available at URL |
| | |
| Property / full work available at URL: https://doi.org/10.1007/s12095-014-0113-6 / rank |
| | Normal rank |
| Property / OpenAlex ID |
| | |
| Property / OpenAlex ID: W2118432793 / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Leakage-Resilient Symmetric Encryption via Re-keying / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Cryptographic hardware and embedded systems -- CHES 2013. 15th international workshop, Santa Barbara, CA, USA, August 20--23, 2013. Proceedings / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Towards sound approaches to counteract power-analysis attacks / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Q4425684 / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Side Channel Cryptanalysis of a Higher Order Masking Scheme / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Leakage-Resilient Pseudorandom Functions and Side-Channel Attacks on Feistel Networks / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Compact Implementation and Performance Evaluation of Block Ciphers in ATtiny Devices / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Practical Leakage-Resilient Symmetric Cryptography / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: A Statistical Model for DPA with Novel Algorithmic Confusion Analysis / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Q4502779 / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Applied Cryptography and Network Security / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Advances in Cryptology - CRYPTO 2003 / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Advances in cryptology -- EUROCRYPT 2013. 32nd annual international conference on the theory and applications of cryptographic techniques, Athens, Greece, May 26--30, 2013. Proceedings / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Advances in cryptology -- EUROCRYPT 2009. 28th annual international conference on the theory and applications of cryptographic techniques, Cologne, Germany, April 26--30, 2009. Proceedings / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Towards Green Cryptography: A Comparison of Lightweight Ciphers from the Energy Viewpoint / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Q4941869 / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Topics in Cryptology – CT-RSA 2004 / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Power Analysis Attacks / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Topics in Cryptology – CT-RSA 2005 / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Towards Super-Exponential Side-Channel Security with Efficient Leakage-Resilient PRFs / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Pushing the Limits: A Very Compact and a Threshold Implementation of AES / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Fast Software Encryption / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Cryptographic hardware and embedded systems -- CHES 2007. 9th international workshop, Vienna, Austria, September 10--13, 2007. Proceedings / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Advances in cryptology -- EUROCRYPT 2011. 30th annual international conference on the theory and applications of cryptographic techniques, Tallinn, Estonia, May 15--19, 2011. Proceedings / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: A Leakage-Resilient Mode of Operation / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Cryptographic hardware and embedded systems -- CHES 2011. 13th international workshop, Nara, Japan, September 28--October 1, 2011. Proceedings / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Masking against Side-Channel Attacks: A Formal Security Proof / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Higher-Order Glitches Free Implementation of the AES Using Secure Multi-party Computation Protocols / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Cryptographic hardware and embedded systems - CHES 2012. 14th international workshop, Leuven, Belgium, September 9--12, 2012. Proceedings / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Cryptographic hardware and embedded systems -- CHES 2005. 7th international workshop, Edinburgh, UK, August 29--September 1, 2005. Proceedings / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Algebraic Side-Channel Attacks / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Algebraic Side-Channel Attacks on the AES: Why Time also Matters in DPA / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: A Formal Study of Power Variability Issues and Side-Channel Attacks for Nanoscale Devices / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: On the Exact Success Rate of Side Channel Analysis in the Gaussian Model / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Provably Secure Higher-Order Masking of AES / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Topics in Cryptology – CT-RSA 2006 / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Leakage-Resilient Symmetric Cryptography under Empirically Verifiable Assumptions / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: The World Is Not Enough: Another Look on Second-Order DPA / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Security Evaluations beyond Computing Power / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Shuffling against Side-Channel Attacks: A Comprehensive Study with Cautionary Note / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Advances in cryptology - CRYPTO '99. 19th annual international cryptology conference Santa Barbara, CA, USA, August 15--19, 1999. Proceedings / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Practical Leakage-Resilient Pseudorandom Objects with Minimum Public Randomness / rank |
| | Normal rank |