Buying AES design resistance with speed and energy
From MaRDI portal
Publication:2803624
Recommendations
Cites work
- scientific article; zbMATH DE number 1878339 (Why is no real title available?)
- scientific article; zbMATH DE number 1418307 (Why is no real title available?)
- Fault analysis in cryptography. Foreword by Dan Boneh
- Power Analysis Attacks
- Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems
Cited in
(4)- Protecting AES Software Implementations on 32-Bit Processors Against Power Analysis
- SCA-resistance for AES: how cheap can we go?
- Glitch and laser fault attacks onto a secure AES implementation on a SRAM-based FPGA
- Exploring the feasibility of low cost fault injection attacks on sub-threshold devices through an example of a 65nm AES implementation
This page was built for publication: Buying AES design resistance with speed and energy
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2803624)