Amplified Differential Power Cryptanalysis on Rijndael Implementations with Exponentially Fewer Power Traces
- 18 June 2003
- book chapter
- conference paper
- Published by Springer Science and Business Media LLC in Lecture Notes in Computer Science
- p. 106-117
- https://doi.org/10.1007/3-540-45067-x_10
Abstract
No abstract availableKeywords
This publication has 12 references indexed in Scilit:
- Securing the AES Finalists Against Power Analysis AttacksLecture Notes in Computer Science, 2001
- Checking before output may not be enough against fault-based cryptanalysisIEEE Transactions on Computers, 2000
- Differential Power Analysis in the Presence of Hardware CountermeasuresLecture Notes in Computer Science, 2000
- Using Second-Order Power Analysis to Attack DPA Resistant SoftwareLecture Notes in Computer Science, 2000
- Differential Power AnalysisLecture Notes in Computer Science, 1999
- Chinese Remaindering Based Cryptosystems in the Presence of FaultsJournal of Cryptology, 1999
- Power Analysis Attacks of Modular Exponentiation in SmartcardsLecture Notes in Computer Science, 1999
- On the Importance of Checking Cryptographic Protocols for FaultsLecture Notes in Computer Science, 1997
- Differential fault analysis of secret key cryptosystemsLecture Notes in Computer Science, 1997
- Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other SystemsLecture Notes in Computer Science, 1996