Examining smart-card security under the threat of power analysis attacks
From MaRDI portal
Publication:4571295
DOI10.1109/TC.2002.1004593zbMath1391.94781WikidataQ114985503 ScholiaQ114985503MaRDI QIDQ4571295
Thomas S. Messerges, Ezzat A. Dabbish, Robert H. Sloan
Publication date: 9 July 2018
Published in: IEEE Transactions on Computers (Search for Journal in Brave)
Related Items (20)
Standard model leakage-resilient authenticated key exchange using inner-product extractors ⋮ A secure three-factor authentication scheme for wireless sensor networks using ECC ⋮ Cryptanalysis and design of a three-party authenticated key exchange protocol using smart card ⋮ Three-factor-based confidentiality-preserving remote user authentication scheme in multi-server environment ⋮ Robust extended chaotic maps-based three-factor authentication scheme preserving biometric template privacy ⋮ Cryptanalysis and an Improvement of New Remote Mutual Authentication Scheme using Smart Cards ⋮ Cryptanalyzing a Feistel Chaotic Block Cryptosystem Based on Correlation Power Analysis ⋮ On the leakage-resilient key exchange ⋮ Fault Attacks on Public Key Elements: Application to DLP-Based Schemes ⋮ Physical attacks and beyond ⋮ Security on “Secure Remote Login Scheme with Password and Smart Card Update Facilities” ⋮ Design of improved password authentication and update scheme based on elliptic curve cryptography ⋮ Cryptanalysis of a chaotic map-based password-authenticated key agreement protocol using smart cards ⋮ Маскирование ГОСТ 28147-89 для защиты от атак по побочным каналам ⋮ Design and analysis of a three party password-based authenticated key exchange protocol using extended chaotic maps ⋮ Preserving privacy for free: efficient and provably secure two-factor authentication scheme with user anonymity ⋮ Two-factor mutual authentication based on smart cards and passwords ⋮ On two DES implementations secure against differential power analysis in smart-cards ⋮ A simple power analysis attack against the key schedule of the Camellia block cipher ⋮ Keeping Secrets in Resource Aware Components
This page was built for publication: Examining smart-card security under the threat of power analysis attacks