Author:
Mayhew Matthew,Muresan Radu
Publisher
Springer Science and Business Media LLC
Subject
Computer Networks and Communications,Software
Reference80 articles.
1. Kocher, P., Lee, R., McGraw, G., Raghunathan, A., Ravi, S.: Security as a new dimension in embedded system design. In: Proceedings of the Design Automation Conference, pp. 753–760 (2004)
2. Kocher, P., Jaffe, J., Jun, B.: Differential power analysis. In: Advances in Cryptology—(CRYPTO ’99). LNCS, vol. 1666, pp. 388–397 (1999)
3. Alioto, M., Polie, M., Rocchi, S.: Power analysis attacks to cryptographic circuits: a comparative analysis of DPA and CPA. In: Proceedings of the ICM ’08, pp. 333–336 (2008)
4. Gandolfi, K., Mourter, C., Oliver, F.: Electromagnetic analysis: concrete results. In: Proceedings of the CHES 2001. LNCS, vol. 2162, pp. 251–261 (2001)
5. Kocher, P.: Timing attacks on implementations of Diffie–Hellman, RSA, DSS, other systems. In: Proceedings of the Advances in Cryptology—CRYPTO ’96, pp. 104–113 (1996)
Cited by
5 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献