has been cited by the following article(s):
[1]
|
Generación de falsas claves criptográficas como medida de protección frente a ataques por canal lateral
|
|
NULL |
|
|
[2]
|
FSM State Assignment for Security and Power Optimization
|
|
Dissertation, University of Cincinnati,
2018 |
|
|
[3]
|
Attacks & Analysis of OpenSSL AES crypto material from memory dumps
|
|
Master’s Thesis,
2017 |
|
|
[4]
|
Análisis comparativo de variantes de AES dinámico
|
|
2016 |
|
|
[5]
|
抗差分能量攻击的 DES 加密芯片设计 (英文)
|
|
2014 |
|
|
[6]
|
Differential power analysis of an AES software implementation
|
|
NULL
2014 |
|
|
[7]
|
抗差分能量攻击的 DES 加密芯片设计
|
|
北京大学学报: 自然科学版,
2014 |
|
|
[8]
|
Power analysis of stream ciphers based on feedback shift registers
|
|
2014 |
|
|
[9]
|
Differential Power Analysis of a Software Implementation of an Advanced Encryption Standard
|
|
NULL
2013 |
|
|
[10]
|
AHardware implementation of DES with combined countermeasure against DPA
|
|
ASIC (ASICON), 2013 IEEE …,
2013 |
|
|
[11]
|
Embedded Systems Security
|
|
Cyber Security Standards, Practices and Industrial Applications: Systems and Methodologies,
2012 |
|
|
[12]
|
Smart card security
|
|
2012 |
|
|
[13]
|
Optimized power trace numbers in CPA attacks
|
|
Systems, Signals and …,
2011 |
|
|
[14]
|
The Research of Correlation Power Analysis on a AES Implementations
|
|
Journal of Intelligent Computing Volume,
2011 |
|
|
[15]
|
Differential power cryptanalysis attacks against PRESENT implementation
|
|
2010 |
|
|
[1]
|
RASCv2: Enabling Remote Access to Side-Channels for Mission Critical and IoT Systems
ACM Transactions on Design Automation of Electronic Systems,
2022
DOI:10.1145/3524123
|
|
|
[2]
|
RASCv2: Enabling Remote Access to Side-Channels for Mission Critical and IoT Systems
ACM Transactions on Design Automation of Electronic Systems,
2022
DOI:10.1145/3524123
|
|
|
[3]
|
A Low-Overhead Countermeasure against Differential Power Analysis for AES Block Cipher
Applied Sciences,
2021
DOI:10.3390/app112110314
|
|
|
[4]
|
AHardware implementation of DES with combined countermeasure against DPA
2013 IEEE 10th International Conference on ASIC,
2013
DOI:10.1109/ASICON.2013.6812024
|
|
|
[5]
|
Optimized power trace numbers in CPA attacks
Eighth International Multi-Conference on Systems, Signals & Devices,
2011
DOI:10.1109/SSD.2011.5767431
|
|
|