Author:
Liao Nan,Cui Xiaoxin,Liao Kai,Wang Tian,Yu Dunshan,Cui Xiaole
Publisher
Springer Science and Business Media LLC
Reference14 articles.
1. Oswald E, Mangard S, Herbst C, et al. Practical second-order DPA attacks for masked smart card implementations of block ciphers. In: Topics in Cryptology–CT-RSA 2006. Berlin: Springer-Verlag, 2006. 192–207
2. Tiri K, Verbauwhede I. A logic level design methodology for a secure DPA resistant ASIC or FPGA implementation. In: Proceedings of the Conference on Design, Automation and Test in Europe, Washington, 2004. 246–251
3. Boneh D, DeMillo R A, Lipton R J. On the importance of checking cryptographic protocols for faults. In: Advances in Cryptology-EUROCRYPT’97. Berlin: Springer-Verlag, 1997. 37–51
4. Biham E, Shamir A. Differential fault analysis of secret key cryptosystems. In: Advances in Cryptology-CRYPTO’97. Berlin: Springer-Verlag, 1997. 513–525
5. Biehl I, Meyer B, Müller V. Differential fault attacks on elliptic curve cryptosystems. In: Advances in Cryptology- CRYPTO 2000. Berlin: Springer-Verlag, 2000. 131–146
Cited by
10 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献