Search alternatives:
"power analysis" » "fourier analysis"

1
Published 2007
Springer Berlin Heidelberg
Table of Contents: ... -- First-Order Differential Power Analysis on the Duplication Method -- Solving Discrete Logarithms from...

2
Published 2004
Springer Berlin Heidelberg
Table of Contents: ..., and Systems II -- Sign-Based Differential Power Analysis -- Asymmetric Watermarking Scheme Using Permutation...

3
Published 2007
Springer Berlin Heidelberg
Table of Contents: ... Software Implementations on 32-Bit Processors Against Power Analysis -- Group-Oriented Security -- Constant...

4
Published 2006
Springer Berlin Heidelberg
Table of Contents: ... Combiners -- Symmetric-Key Cryptography -- Designing Power Analysis Resistant and High Performance Block...

5
Published 2007
Springer Berlin Heidelberg
Table of Contents: ... in Lock-Keeper -- Smart Cards/Secure Hardware -- Investigations of Power Analysis Attacks...

6
Published 2009
Springer Berlin Heidelberg
Table of Contents: ... behind the Mask: Power Analysis on a Provably Secure S-Box Implementation -- A Comparative Study...

7
Published 2007
Springer Berlin Heidelberg
Table of Contents: ...Differential Power Analysis of HMAC Based on SHA-2, and Countermeasures -- Provably Secure...

8
Published 2010
Springer Berlin Heidelberg
Table of Contents: ... against First and Second-Order Differential Power Analysis -- Adaptive Chosen-Message Side-Channel Attacks...

9
Published 2006
Springer Berlin Heidelberg
Table of Contents: ... -- Security of Limited Devices -- An AES Smart Card Implementation Resistant to Power Analysis Attacks...