Secure Hardware Implementation of Non-linear Functions in the Presence of Glitches
- 1 January 2009
- conference paper
- conference paper
- Published by Springer Science and Business Media LLC in Lecture Notes in Computer Science
Abstract
No abstract availableThis publication has 23 references indexed in Scilit:
- A Very Compact S-Box for AESLecture Notes in Computer Science, 2005
- Masking at Gate Level in the Presence of GlitchesLecture Notes in Computer Science, 2005
- Side-Channel Leakage of Masked CMOS GatesLecture Notes in Computer Science, 2005
- Two Power Analysis Attacks against One-Mask MethodsLecture Notes in Computer Science, 2004
- New Block Cipher: ARIALecture Notes in Computer Science, 2004
- Provably Secure Masking of AESLecture Notes in Computer Science, 2004
- Multiplicative Masking and Power Analysis of AESLecture Notes in Computer Science, 2003
- Private Circuits: Securing Hardware against Probing AttacksLecture Notes in Computer Science, 2003
- An Implementation of DES and AES, Secure against Some AttacksLecture Notes in Computer Science, 2001
- Differential Power AnalysisLecture Notes in Computer Science, 1999