Sciweavers

4101 search results - page 3 / 821
» Differential Power Analysis
Sort
View
CRYPTO
1999
Springer
107views Cryptology» more  CRYPTO 1999»
13 years 11 months ago
Differential Power Analysis
Paul C. Kocher, Joshua Jaffe, Benjamin Jun
BMCBI
2006
155views more  BMCBI 2006»
13 years 7 months ago
A powerful method for detecting differentially expressed genes from GeneChip arrays that does not require replicates
Background: Studies of differential expression that use Affymetrix GeneChip arrays are often carried out with a limited number of replicates. Reasons for this include financial co...
Anne-Mette K. Hein, Sylvia Richardson
CN
2008
280views more  CN 2008»
13 years 7 months ago
Joint transmit power and physical carrier sensing adaptation based on loss differentiation for high density IEEE 802.11 WLAN
In high density (HD) IEEE 802.11 WLAN, packet loss can occur due to co-channel interference (asynchronous interference) or collisions (synchronous interference). In order to effec...
Hui Ma, Jing Zhu, Sumit Roy, Soo Young Shin
CHES
2000
Springer
204views Cryptology» more  CHES 2000»
13 years 11 months ago
Using Second-Order Power Analysis to Attack DPA Resistant Software
Under a simple power leakage model based on Hamming weight, a software implementation of a data-whitening routine is shown to be vulnerable to a first-order Differential Power Anal...
Thomas S. Messerges
JDCTA
2010
175views more  JDCTA 2010»
13 years 2 months ago
Evolution Cipher against Differential Power Attack
: Differntial Power Attack (DPA) is one kind of Side Channel Attacks (SCAs). There are two phases in DPA attacks: sample collection and statistical analysis, which can be utilized ...
Shubo Liu, Ming Tang, Si Gao, Huanguo Zhang