Simple Power Analysis on AES Key Expansion Revisited
- 1 January 2014
- conference paper
- conference paper
- Published by Springer Science and Business Media LLC in Lecture Notes in Computer Science
Abstract
No abstract availableThis publication has 9 references indexed in Scilit:
- Mutual Information AnalysisLecture Notes in Computer Science, 2008
- Correlation Power Analysis with a Leakage ModelLecture Notes in Computer Science, 2004
- A Simple Power-Analysis (SPA) Attack on Implementations of the AES Key ExpansionLecture Notes in Computer Science, 2003
- Template AttacksLecture Notes in Computer Science, 2003
- Smartly Analyzing the Simplicity and the Power of Simple Power Analysis on SmartcardsLecture Notes in Computer Science, 2000
- Using Second-Order Power Analysis to Attack DPA Resistant SoftwareLecture Notes in Computer Science, 2000
- Cryptographic Hardware and Embedded Systems — CHES 2000Published by Springer Science and Business Media LLC ,2000
- Differential Power AnalysisLecture Notes in Computer Science, 1999
- Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other SystemsLecture Notes in Computer Science, 1996