Differential power analysis of stream ciphers with LFSRs
From MaRDI portal
Publication:2629409
Recommendations
Cites work
- scientific article; zbMATH DE number 1979272 (Why is no real title available?)
- scientific article; zbMATH DE number 1979273 (Why is no real title available?)
- scientific article; zbMATH DE number 1759284 (Why is no real title available?)
- scientific article; zbMATH DE number 1759354 (Why is no real title available?)
- scientific article; zbMATH DE number 1857508 (Why is no real title available?)
- scientific article; zbMATH DE number 1418307 (Why is no real title available?)
- Cryptographic Hardware and Embedded Systems - CHES 2004
- Cryptographic Hardware and Embedded Systems - CHES 2004
- Differential Power Analysis of Stream Ciphers
- Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems
- Towards sound approaches to counteract power-analysis attacks
Cited in
(8)- Cache timing analysis of LFSR-based stream ciphers
- scientific article; zbMATH DE number 1583930 (Why is no real title available?)
- An architectural countermeasure against power analysis attacks for FSR-based stream ciphers
- Yet Another Attack on Vest
- Differential Power Analysis of Stream Ciphers
- LFSR Based Stream Ciphers Are Vulnerable to Power Attacks
- On physical obfuscation of cryptographic algorithms
- Galois LFSR, Embedded Devices and Side Channel Weaknesses
This page was built for publication: Differential power analysis of stream ciphers with LFSRs
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2629409)