Author:
Sasdrich Pascal,Bock René,Moradi Amir
Publisher
Springer International Publishing
Reference42 articles.
1. Lecture Notes in Computer Science;M-L Akkar,2001
2. Atmel: 8-bit AVR Microcontroller with 16K Bytes In-System Programmable Flash, Rev. 1142E-02/2003
3. Lecture Notes in Computer Science;J Balasch,2015
4. Bayrak, A.G., Regazzoni, F., Novo, D., Brisk, P., Standaert, F.-X., Ienne, P.: Automatic application of power analysis countermeasures. IEEE Trans. Comput. 64(2), 329–341 (2015)
5. Bhasin, S., Danger, J.-L., Guilley, S., Najm, Z.: A low-entropy first-degree secure provable masking scheme for resource-constrained devices. In: Proceedings of the Workshop on Embedded Systems Security, WESS 2013, Montreal, Quebec, Canada, 29 September–4 October 2013, pp. 7:1–7:10. ACM (2013)
Cited by
7 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Security Order of Gate-Level Masking Schemes;2023 IEEE International Symposium on Hardware Oriented Security and Trust (HOST);2023-05-01
2. Secure and Efficient Masking of Lightweight Ciphers in Software and Hardware;The Computer Journal;2023-03-01
3. A Comprehensive Survey on the Non-Invasive Passive Side-Channel Analysis;Sensors;2022-10-22
4. Rosita++: Automatic Higher-Order Leakage Elimination from Cryptographic Code;Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security;2021-11-12
5. PUF-G;Proceedings of the 39th International Conference on Computer-Aided Design;2020-11-02