Polar differential power attacks and evaluation
From MaRDI portal
(Redirected from Publication:439840)
Recommendations
- Publication:4941869
- PKDPA: An enhanced probabilistic differential power attack methodology
- scientific article; zbMATH DE number 1759298
- Blind Differential Cryptanalysis for Enhanced Power Attacks
- Countering Power Analysis Attacks UsingReliable and Aggressive Designs
- Towards sound approaches to counteract power-analysis attacks
- scientific article; zbMATH DE number 1950622
- Practical power analysis attacks on software implementations of McEliece
Cites work
- scientific article; zbMATH DE number 1088257 (Why is no real title available?)
- scientific article; zbMATH DE number 1979273 (Why is no real title available?)
- scientific article; zbMATH DE number 1504807 (Why is no real title available?)
- scientific article; zbMATH DE number 1759284 (Why is no real title available?)
- scientific article; zbMATH DE number 1759297 (Why is no real title available?)
- scientific article; zbMATH DE number 1418307 (Why is no real title available?)
- A Design Methodology for a DPA-Resistant Cryptographic LSI with RSL Techniques
- Algebraic Side-Channel Attacks on the AES: Why Time also Matters in DPA
- Capability of evolutionary cryptosystems against differential cryptanalysis
- Changing the Odds Against Masked Logic
- Checking before output may not be enough against fault-based cryptanalysis
- Countermeasures against differential power analysis for hyperelliptic curve cryptosystems.
- Cryptographic Hardware and Embedded Systems - CHES 2004
- DPA Leakage Models for CMOS Logic Circuits
- Fast Software Encryption
- Mutual Information Analysis: How, When and Why?
- Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems
Cited in
(2)
This page was built for publication: Polar differential power attacks and evaluation
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q439840)