Polar differential power attacks and evaluation
From MaRDI portal
Publication:439840
DOI10.1007/s11432-012-4588-5zbMath1245.94088OpenAlexW2062769673MaRDI QIDQ439840
Mu Yi, Ming Tang, Shubo Liu, Yingzhen Jin, Huanguo Zhang, Zhenlong Qiu, Si Gao
Publication date: 17 August 2012
Published in: Science China. Information Sciences (Search for Journal in Brave)
Full work available at URL: http://engine.scichina.com/doi/10.1007/s11432-012-4588-5
Cites Work
- Capability of evolutionary cryptosystems against differential cryptanalysis
- Checking before output may not be enough against fault-based cryptanalysis
- Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems
- DPA Leakage Models for CMOS Logic Circuits
- Algebraic Side-Channel Attacks on the AES: Why Time also Matters in DPA
- A Design Methodology for a DPA-Resistant Cryptographic LSI with RSL Techniques
- Mutual Information Analysis: How, When and Why?
- Countermeasures against Differential Power Analysis for Hyperelliptic Curve Cryptosystems
- Cryptographic Hardware and Embedded Systems - CHES 2004
- Changing the Odds Against Masked Logic
- Fast Software Encryption
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
This page was built for publication: Polar differential power attacks and evaluation