Search

Your search keyword '"differential power analysis"' showing total 319 results

Search Constraints

Start Over You searched for: Descriptor "differential power analysis" Remove constraint Descriptor: "differential power analysis"
319 results on '"differential power analysis"'

Search Results

2. Nove lincidence matrix differential power analysis for resisting ghost peak

3. Trace Alignment Preprocessing in Side-Channel Analysis Using the Adaptive Filter.

4. Pincering SKINNY by Exploiting Slow Diffusion

6. Canonical DPA Attack on HMAC-SHA1/SHA2

8. A Substitution Box for Lightweight Ciphers to Secure Internet of Things.

9. 新的抵抗鬼峰的关联矩阵差分能量分析.

10. Research on Differential Power Analysis of Lightweight Block Cipher LED

11. On the confusion coefficient of Boolean functions

12. Power analysis attack resilient block cipher implementation based on 1‐of‐4 data encoding

13. Power efficient and power attacks resistant system design and analysis using aggressive scaling with timing speculation

14. Searching for Balanced S-Boxes with High Nonlinearity, Low Differential Uniformity, and Improved DPA-Resistance

15. Exploiting the Back-Gate Biasing Technique as a Countermeasure Against Power Analysis Attacks

16. An Effective Software Based Method to Analyze SCA Countermeasures for Advanced Encryption Standard.

17. CKGS: A Way Of Compressed Key Guessing Space to Reduce Ghost Peaks.

18. On the confusion coefficient of Boolean functions.

19. A Low-Overhead Countermeasure against Differential Power Analysis for AES Block Cipher.

20. Power analysis attack resilient block cipher implementation based on 1‐of‐4 data encoding.

21. FPGA-Masked S-Box Implementation for AES Engine

22. Categorising and Comparing Cluster-Based DPA Distinguishers

23. Gini-Impurity Index Analysis.

24. Low-Latency Hardware Masking with Application to AES

25. A Side-Channel Assisted Cryptanalytic Attack Against QcBits

26. Side-Channel Analysis of Keymill

29. Low area overhead DPA countermeasure exploiting tunnel transistor‐based random number generator.

30. Combinational Counters: A Low Overhead Approach to Address DPA Attacks.

31. A Low-Overhead Countermeasure against Differential Power Analysis for AES Block Cipher

34. Characterisation and Estimation of the Key Rank Distribution in the Context of Side Channel Evaluations

35. Differential Computation Analysis: Hiding Your White-Box Designs is Not Enough

36. Towards Easy Leakage Certification

37. Detecting Flawed Masking Schemes with Leakage Detection Tests

38. An Improved Masking Scheme for S-Box Software Implementations

39. Near Collision Side Channel Attacks

40. Comparing Approaches to Rank Estimation for Side-Channel Security Evaluations

41. Additively Homomorphic Ring-LWE Masking

42. Towards Securing Low-Power Digital Circuits with Ultra-Low-Voltage Vdd Randomizers

43. Diversity Within the Rijndael Design Principles for Resistance to Differential Power Analysis

44. Differential Power Analysis of HMAC SHA-1 and HMAC SHA-2 in the Hamming Weight Model

46. Leakage Assessment Methodology : A Clear Roadmap for Side-Channel Evaluations

47. Evaluation and Improvement of Generic-Emulating DPA Attacks

48. A Masked Ring-LWE Implementation

49. Simpler and More Efficient Rank Estimation for Side-Channel Security Assessment

50. Conversion from Arithmetic to Boolean Masking with Logarithmic Complexity

Catalog

Books, media, physical & digital resources