Securing the AES Finalists Against Power Analysis Attacks
- 1 January 2001
- book chapter
- conference paper
- Published by Springer Science and Business Media LLC in Lecture Notes in Computer Science
- p. 150-164
- https://doi.org/10.1007/3-540-44706-7_11
Abstract
No abstract availableKeywords
This publication has 13 references indexed in Scilit:
- Towards Sound Approaches to Counteract Power-Analysis AttacksLecture Notes in Computer Science, 1999
- Differential Power AnalysisLecture Notes in Computer Science, 1999
- Resistance Against Differential Power Analysis For Elliptic Curve CryptosystemsLecture Notes in Computer Science, 1999
- IPA: A New Class of Power AttacksLecture Notes in Computer Science, 1999
- DES and Differential Power Analysis The “Duplication” MethodLecture Notes in Computer Science, 1999
- Power Analysis Attacks of Modular Exponentiation in SmartcardsLecture Notes in Computer Science, 1999
- Side channel cryptanalysis of product ciphersLecture Notes in Computer Science, 1998
- On the Importance of Checking Cryptographic Protocols for FaultsLecture Notes in Computer Science, 1997
- Differential fault analysis of secret key cryptosystemsLecture Notes in Computer Science, 1997
- Electromagnetic radiation from video display units: An eavesdropping risk?Computers & Security, 1985