Examining smart-card security under the threat of power analysis attacks

From MaRDI portal
Publication:4571295

DOI10.1109/TC.2002.1004593zbMath1391.94781WikidataQ114985503 ScholiaQ114985503MaRDI QIDQ4571295

Thomas S. Messerges, Ezzat A. Dabbish, Robert H. Sloan

Publication date: 9 July 2018

Published in: IEEE Transactions on Computers (Search for Journal in Brave)




Related Items (20)

Standard model leakage-resilient authenticated key exchange using inner-product extractorsA secure three-factor authentication scheme for wireless sensor networks using ECCCryptanalysis and design of a three-party authenticated key exchange protocol using smart cardThree-factor-based confidentiality-preserving remote user authentication scheme in multi-server environmentRobust extended chaotic maps-based three-factor authentication scheme preserving biometric template privacyCryptanalysis and an Improvement of New Remote Mutual Authentication Scheme using Smart CardsCryptanalyzing a Feistel Chaotic Block Cryptosystem Based on Correlation Power AnalysisOn the leakage-resilient key exchangeFault Attacks on Public Key Elements: Application to DLP-Based SchemesPhysical attacks and beyondSecurity on “Secure Remote Login Scheme with Password and Smart Card Update Facilities”Design of improved password authentication and update scheme based on elliptic curve cryptographyCryptanalysis of a chaotic map-based password-authenticated key agreement protocol using smart cardsМаскирование ГОСТ 28147-89 для защиты от атак по побочным каналамDesign and analysis of a three party password-based authenticated key exchange protocol using extended chaotic mapsPreserving privacy for free: efficient and provably secure two-factor authentication scheme with user anonymityTwo-factor mutual authentication based on smart cards and passwordsOn two DES implementations secure against differential power analysis in smart-cardsA simple power analysis attack against the key schedule of the Camellia block cipherKeeping Secrets in Resource Aware Components




This page was built for publication: Examining smart-card security under the threat of power analysis attacks