The following pages link to (Q4502778):
Displayed 19 items.
- AES side-channel countermeasure using random tower field constructions (Q369425) (← links)
- New fault attacks using Jacobi symbol and application to regular right-to-left algorithms (Q407590) (← links)
- Polar differential power attacks and evaluation (Q439840) (← links)
- Thwarting side-channel analysis against RSA cryptosystems with additive blinding (Q778376) (← links)
- Complete reverse-engineering of AES-like block ciphers by SCARE and FIRE attacks (Q892289) (← links)
- Generalizing statistical ineffective fault attacks in the spirit of side-channel attacks (Q2145289) (← links)
- Secure evolvable hardware for public-key cryptosystems (Q2493297) (← links)
- On two DES implementations secure against differential power analysis in smart-cards (Q2500477) (← links)
- A Heuristic Approach to Assist Side Channel Analysis of the Data Encryption Standard (Q2803642) (← links)
- Black-Box Side-Channel Attacks Highlight the Importance of Countermeasures (Q2889990) (← links)
- Generic Cryptanalysis of Combined Countermeasures with Randomized BSD Representations (Q3452232) (← links)
- Power Analysis to ECC Using Differential Power Between Multiplication and Squaring (Q3452234) (← links)
- Multivariate Leakage Model for Improving Non-profiling DPA on Noisy Power Traces (Q3454163) (← links)
- Securing RSA against Fault Analysis by Double Addition Chain Exponentiation (Q3623066) (← links)
- On the Exact Success Rate of Side Channel Analysis in the Gaussian Model (Q3644199) (← links)
- Distinguishing Multiplications from Squaring Operations (Q3644212) (← links)
- Online Template Attack on ECDSA: (Q5048978) (← links)
- Cryptographic Side-Channels from Low-Power Cache Memory (Q5447515) (← links)
- Power Analysis for Secret Recovering and Reverse Engineering of Public Key Algorithms (Q5452251) (← links)