Sciweavers
Explore
Publications
Books
Software
Tutorials
Presentations
Lectures Notes
Datasets
Labs
Conferences
Community
Upcoming
Conferences
Top Ranked Papers
Most Viewed Conferences
Conferences by Acronym
Conferences by Subject
Conferences by Year
Tools
Sci2ools
International Keyboard
Graphical Social Symbols
CSS3 Style Generator
OCR
Web Page to Image
Web Page to PDF
Merge PDF
Split PDF
Latex Equation Editor
Extract Images from PDF
Convert JPEG to PS
Convert Latex to Word
Convert Word to PDF
Image Converter
PDF Converter
Community
Sciweavers
About
Terms of Use
Privacy Policy
Cookies
168
search results - page 12 / 34
»
Side-Channel Attack Pitfalls
Sort
relevance
views
votes
recent
update
View
thumb
title
26
click to vote
ISW
2001
Springer
98
views
Information Technology
»
more
ISW 2001
»
Securing Elliptic Curve Point Multiplication against Side-Channel Attacks
14 years 2 days ago
Download
www.cdc.informatik.tu-darmstadt.de
Bodo Möller
claim paper
Read More »
18
click to vote
CHES
2006
Springer
75
views
Cryptology
»
more
CHES 2006
»
Towards Security Limits in Side-Channel Attacks
13 years 11 months ago
Download
www.iacr.org
François-Xavier Standaert, Eric Peeters, C&...
claim paper
Read More »
17
click to vote
CTRSA
2010
Springer
135
views
Cryptology
»
more
CTRSA 2010
»
Unrolling Cryptographic Circuits: A Simple Countermeasure Against Side-Channel Attacks
13 years 11 months ago
Download
www.secure-ic.com
Shivam Bhasin, Sylvain Guilley, Laurent Sauvage, J...
claim paper
Read More »
15
click to vote
CHES
2010
Springer
141
views
Cryptology
»
more
CHES 2010
»
When Failure Analysis Meets Side-Channel Attacks
13 years 8 months ago
Download
www.iacr.org
Jerome Di-Battista, Jean-Christophe Courrèg...
claim paper
Read More »
19
click to vote
CRYPTO
2010
Springer
151
views
Cryptology
»
more
CRYPTO 2010
»
Leakage-Resilient Pseudorandom Functions and Side-Channel Attacks on Feistel Networks
13 years 8 months ago
Download
homepages.cwi.nl
Abstract. A cryptographic primitive is leakage-resilient, if it remains secure even if an adversary can learn a bounded amount of arbitrary information about the computation with e...
Yevgeniy Dodis, Krzysztof Pietrzak
claim paper
Read More »
« Prev
« First
page 12 / 34
Last »
Next »