scientific article; zbMATH DE number 1759298
From MaRDI portal
Publication:4536231
zbMATH Open0998.94539MaRDI QIDQ4536231FDOQ4536231
Authors: Christophe Clavier, Jean-Sébastien Coron, Nora Dabbous
Publication date: 28 November 2002
Title of this publication is not available (Why is that?)
Recommendations
- Publication:4941869
- A practical countermeasure against address-bit differential power analysis.
- Topics in Cryptology – CT-RSA 2004
- scientific article; zbMATH DE number 1950622
- Towards sound approaches to counteract power-analysis attacks
- A generic protection against high-order differential power analysis.
Cited In (25)
- Statistical Analysis of Second Order Differential Power Analysis
- SCATTER: a new dimension in side-channel
- Improving differential power analysis by elastic alignment
- Getting more from PCA: First results of using principal component analysis for extensive power analysis
- On the Importance of the Number of Fanouts to Prevent the Glitches in DPA-Resistant Devices
- On the Exact Success Rate of Side Channel Analysis in the Gaussian Model
- Improving DPA by peak distribution analysis
- Taylor expansion of maximum likelihood attacks for masked and shuffled implementations
- Title not available (Why is that?)
- Power Analysis Attacks
- Towards sound approaches to counteract power-analysis attacks
- Secure wire shuffling in the probing model
- An efficient method for eliminating random delays in power traces of embedded software
- Polar differential power attacks and evaluation
- Multivariate leakage model for improving non-profiling DPA on noisy power traces
- Global Signal Vulnerability (GSV) Analysis for Selective State Element Hardening in Modern Microprocessors
- Stronger lower bounds for leakage-resilient secret sharing
- Mode-level vs. implementation-level physical security in symmetric cryptography. A practical guide through the leakage-resistance jungle
- Photonic power firewalls
- Dummy shuffling against algebraic attacks in white-box implementations
- Sliding-window correlation attacks against encryption devices with an unstable clock
- On the exact relationship between the mutual information metric and the success rate metric
- Differential power and electromagnetic attacks on a FPGA implementation of elliptic curve cryptosystems
- Topics in Cryptology – CT-RSA 2004
- Unifying leakage models: from probing attacks to noisy leakage
This page was built for publication:
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q4536231)