skip to main content
Skip header Section
Power Analysis Attacks: Revealing the Secrets of Smart Cards (Advances in Information Security)February 2007
Publisher:
  • Springer-Verlag
  • Berlin, Heidelberg
ISBN:978-0-387-30857-9
Published:01 February 2007
Skip Bibliometrics Section
Bibliometrics
Abstract

No abstract available.

Cited By

  1. ACM
    Nair M, Sadhukhan R, Pearce H, Mukhopadhyay D and Karri R Netlist Whisperer: AI and NLP Fight Circuit Leakage! Proceedings of the 2023 Workshop on Attacks and Solutions in Hardware Security, (83-92)
  2. ACM
    Singh A and Gerdes R Better Side-Channel Attacks Through Measurements Proceedings of the 2023 Workshop on Attacks and Solutions in Hardware Security, (15-26)
  3. ACM
    Picek S, Perin G, Mariot L, Wu L and Batina L (2022). SoK: Deep Learning-based Physical Side-channel Analysis, ACM Computing Surveys, 55:11, (1-35), Online publication date: 30-Nov-2023.
  4. Tran T, Dao B, Hoang T, Hoang V and Pham C (2023). Transition Factors of Power Consumption Models for CPA Attacks on Cryptographic RISC-V SoC, IEEE Transactions on Computers, 72:9, (2689-2700), Online publication date: 1-Sep-2023.
  5. ACM
    Morel L, Couroussé D and Hiscock T (2022). Code Polymorphism Meets Code Encryption: Confidentiality and Side-channel Protection of Software Components, Digital Threats: Research and Practice, 4:2, (1-27), Online publication date: 30-Jun-2023.
  6. ACM
    Mahmoud D, Lenders V and Stojilović M (2022). Electrical-Level Attacks on CPUs, FPGAs, and GPUs: Survey and Implications in the Heterogeneous Era, ACM Computing Surveys, 55:3, (1-40), Online publication date: 30-Apr-2023.
  7. ACM
    Cohen Y, Tharayil K, Haenel A, Genkin D, Keromytis A, Oren Y and Yarom Y HammerScope Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, (547-561)
  8. ACM
    Liu C, Chakraborty A, Chawla N and Roggel N Frequency Throttling Side-Channel Attack Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, (1977-1991)
  9. ACM
    Dhooghe S, Shahmirzadi A and Moradi A Second-Order Low-Randomness d + 1 Hardware Sharing of the AES Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, (815-828)
  10. Nassi B, Pirutin Y, Shams J, Swissa R, Elovici Y and Zadov B (2022). Optical Speech Recovery From Desktop Speakers, Computer, 55:11, (40-51), Online publication date: 1-Nov-2022.
  11. ACM
    Pham D, Marion D and Heuser A ULTRA: Ultimate Rootkit Detection over the Air Proceedings of the 25th International Symposium on Research in Attacks, Intrusions and Defenses, (232-251)
  12. Baksi A, Kumar S and Sarkar S (2022). A New Approach for Side Channel Analysis on Stream Ciphers and Related Constructions, IEEE Transactions on Computers, 71:10, (2527-2537), Online publication date: 1-Oct-2022.
  13. ACM
    Dubey A, Cammarota R, Suresh V and Aysu A (2022). Guarding Machine Learning Hardware Against Physical Side-channel Attacks, ACM Journal on Emerging Technologies in Computing Systems, 18:3, (1-31), Online publication date: 31-Jul-2022.
  14. ACM
    Chuengsatiansup C, Wagner M and Yarom Y Opportunities for genetic improvement of cryptographic code Proceedings of the Genetic and Evolutionary Computation Conference Companion, (1928-1929)
  15. ACM
    Calhoun A, Ortega E, Yaman F, Dubey A and Aysu A Hands-On Teaching of Hardware Security for Machine Learning Proceedings of the Great Lakes Symposium on VLSI 2022, (455-461)
  16. ACM
    Golder A, Bhat A and Raychowdhury A Exploration into the Explainability of Neural Network Models for Power Side-Channel Analysis Proceedings of the Great Lakes Symposium on VLSI 2022, (59-64)
  17. ACM
    Xu T, Cheng G and Fei Y Protected ECC Still Leaks: A Novel Differential-Bit Side-channel Power Attack on ECDH and Countermeasures Proceedings of the Great Lakes Symposium on VLSI 2022, (9-14)
  18. Spence A and Bangay S (2022). Security beyond cybersecurity: side-channel attacks against non-cyber systems and their countermeasures, International Journal of Information Security, 21:3, (437-453), Online publication date: 1-Jun-2022.
  19. Barenghi A, Carrera D, Mella S, Pace A, Pelosi G and Susella R (2022). Profiled side channel attacks against the RSA cryptosystem using neural networks, Journal of Information Security and Applications, 66:C, Online publication date: 1-May-2022.
  20. Brosch M, Probst M and Sigl G Counteract side-channel analysis of neural networks by shuffling Proceedings of the 2022 Conference & Exhibition on Design, Automation & Test in Europe, (1305-1310)
  21. Schönstedt M, Brasser F, Jauernig P, Stapf E and Sadeghi A SafeTEE Proceedings of the 2022 Conference & Exhibition on Design, Automation & Test in Europe, (520-525)
  22. Ege B, Eisenbarth T and Batina L Near Collision Side Channel Attacks Selected Areas in Cryptography – SAC 2015, (277-292)
  23. Chen Q, Zhao D, Liu L, Yan X, Yuan Y, Zhang X, Wu H and Wang Z (2022). Side-channel information leakage analysis and countermeasures in an embedded CPU microarchitecture, Computer Standards & Interfaces, 80:C, Online publication date: 1-Mar-2022.
  24. Fan X, Tong J, Li Y, Duan X, Ren Y and Babaie S (2022). Power Analysis Attack Based on Hamming Weight Model without Brute Force Cracking, Security and Communication Networks, 2022, Online publication date: 1-Jan-2022.
  25. Lee J, Kim J, Han D and Cao Y (2022). Novel Shuffling Countermeasure for Advanced Encryption Standard (AES) against Profiled Attack in Mobile Multimedia Services, Wireless Communications & Mobile Computing, 2022, Online publication date: 1-Jan-2022.
  26. Hou X, Breier J and Bhasin S (2022). SBCMA: Semi-Blind Combined Middle-Round Attack on Bit-Permutation Ciphers With Application to AEAD Schemes, IEEE Transactions on Information Forensics and Security, 17, (3677-3690), Online publication date: 1-Jan-2022.
  27. Paguada S, Batina L, Buhan I and Armendariz I (2022). Playing With Blocks: Toward Re-Usable Deep Learning Models for Side-Channel Profiled Attacks, IEEE Transactions on Information Forensics and Security, 17, (2835-2847), Online publication date: 1-Jan-2022.
  28. ACM
    Pham D, Marion D, Mastio M and Heuser A Obfuscation Revealed: Leveraging Electromagnetic Signals for Obfuscated Malware Classification Annual Computer Security Applications Conference, (706-719)
  29. ACM
    Jayasinghe D, Ignjatovic A, Ragel R, Ambrose J and Parameswaran S (2021). QuadSeal: Quadruple Balancing to Mitigate Power Analysis Attacks with Variability Effects and Electromagnetic Fault Injection Attacks, ACM Transactions on Design Automation of Electronic Systems, 26:5, (1-36), Online publication date: 30-Sep-2021.
  30. Kandar S, Pal S and Dhara B (2021). A Biometric based Remote User Authentication Technique Using Smart Card in Multi-Server Environment, Wireless Personal Communications: An International Journal, 120:2, (1003-1026), Online publication date: 1-Sep-2021.
  31. ACM
    Rioja U, Paguada S, Batina L and Armendariz I (2021). The Uncertainty of Side-channel Analysis: A Way to Leverage from Heuristics, ACM Journal on Emerging Technologies in Computing Systems, 17:3, (1-27), Online publication date: 31-Jul-2021.
  32. ACM
    Picek S and Jakobovic D Evolutionary computation and machine learning in cryptology Proceedings of the Genetic and Evolutionary Computation Conference Companion, (1089-1118)
  33. ACM
    Wang R, Wang H, Dubrova E and Brisfors M Advanced Far Field EM Side-Channel Attack on AES Proceedings of the 7th ACM on Cyber-Physical System Security Workshop, (29-39)
  34. ACM
    Keren O and Polian I On resilience of security-oriented error detecting architectures against power attacks Proceedings of the 18th ACM International Conference on Computing Frontiers, (229-237)
  35. ACM
    Gao P, Xie H, Song F and Chen T (2021). A Hybrid Approach to Formal Verification of Higher-Order Masked Arithmetic Programs, ACM Transactions on Software Engineering and Methodology, 30:3, (1-42), Online publication date: 1-May-2021.
  36. Yuan Y, Zhang Y, Zhao Y, Zhang X, Tang M and Valenza F (2021). Process Variation-Resistant Golden-Free Hardware Trojan Detection through a Power Side Channel, Security and Communication Networks, 2021, Online publication date: 1-Jan-2021.
  37. Yang W, Jia A and Zhang L (2021). Side-Channel Leakage Detection with One-Way Analysis of Variance, Security and Communication Networks, 2021, Online publication date: 1-Jan-2021.
  38. Xu Y and Wang Q Searching for Balanced S-Boxes with High Nonlinearity, Low Differential Uniformity, and Improved DPA-Resistance Information Security, (95-106)
  39. Baksi A, Kumar V, Karmakar B, Bhasin S, Saha D and Chattopadhyay A A Novel Duplication Based Countermeasure to Statistical Ineffective Fault Analysis Information Security and Privacy, (525-542)
  40. ACM
    Wang R, Wang H and Dubrova E Far Field EM Side-Channel Attack on AES Using Deep Learning Proceedings of the 4th ACM Workshop on Attacks and Solutions in Hardware Security, (35-44)
  41. ACM
    Shiozaki M, Sugawara T and Fujino T Exploring Effect of Residual Electric Charges on Cryptographic Circuits Proceedings of the 4th ACM Workshop on Attacks and Solutions in Hardware Security, (57-66)
  42. Li H, Krček M and Perin G A Comparison of Weight Initializers in Deep Learning-Based Side-Channel Analysis Applied Cryptography and Network Security Workshops, (126-143)
  43. Paguada S, Rioja U and Armendariz I Controlling the Deep Learning-Based Side-Channel Analysis: A Way to Leverage from Heuristics Applied Cryptography and Network Security Workshops, (106-125)
  44. Jap D, Yli-Mäyry V, Ito A, Ueno R, Bhasin S and Homma N Practical Side-Channel Based Model Extraction Attack on Tree-Based Machine Learning Algorithm Applied Cryptography and Network Security Workshops, (93-105)
  45. Labafniya M, Etemadi Borujeni S and Mentens N Evolvable Hardware Architectures on FPGA for Side-Channel Security Applied Cryptography and Network Security Workshops, (163-180)
  46. Masure L, Belleville N, Cagli E, Cornélie M, Couroussé D, Dumas C and Maingault L Deep Learning Side-Channel Analysis on Large-Scale Traces Computer Security – ESORICS 2020, (440-460)
  47. Carlet C, Djurasevic M, Jakobovic D and Picek S A Search for Additional Structure: The Case of Cryptographic S-boxes Parallel Problem Solving from Nature – PPSN XVI, (343-356)
  48. Bellizia D, Bronchain O, Cassiers G, Grosso V, Guo C, Momin C, Pereira O, Peters T and Standaert F Mode-Level vs. Implementation-Level Physical Security in Symmetric Cryptography Advances in Cryptology – CRYPTO 2020, (369-400)
  49. Moghimi D, Sunar B, Eisenbarth T and Heninger N TPM-Fail Proceedings of the 29th USENIX Conference on Security Symposium, (2057-2073)
  50. Agosta G, Barenghi A and Pelosi G (2020). Compiler-Based Techniques to Secure Cryptographic Embedded Software Against Side-Channel Attacks, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 39:8, (1550-1554), Online publication date: 1-Aug-2020.
  51. Feng H, Zhou J, Lin W, Zhang Y and Qu Z (2020). Multiple-Input, Multilayer-Perception-Based Classification of Traces From Side-Channel Attacks, Computer, 53:8, (40-48), Online publication date: 1-Aug-2020.
  52. Hettwer B, Fennes D, Leger S, Richter-Brockmann J, Gehrer S and Güneysu T Deep learning multi-channel fusion attack against side-channel protected hardware Proceedings of the 57th ACM/EDAC/IEEE Design Automation Conference, (1-6)
  53. Rioja U, Batina L and Armendariz I When Similarities Among Devices are Taken for Granted: Another Look at Portability Progress in Cryptology - AFRICACRYPT 2020, (337-357)
  54. ACM
    Picek S and Jakobovic D Evolutionary computation and machine learning in cryptology Proceedings of the 2020 Genetic and Evolutionary Computation Conference Companion, (1147-1173)
  55. ACM
    Shao Z, Islam M and Ren S (2020). Your Noise, My Signal, Proceedings of the ACM on Measurement and Analysis of Computing Systems, 4:1, (1-39), Online publication date: 27-May-2020.
  56. ACM
    Durvaux F and Durvaux M (2020). SCA-Pitaya, Digital Threats: Research and Practice, 1:1, (1-16), Online publication date: 31-Mar-2020.
  57. Mo J, Hu Z, Lin Y and Thamilarasu G (2020). Cryptanalysis and Security Improvement of Two Authentication Schemes for Healthcare Systems Using Wireless Medical Sensor Networks, Security and Communication Networks, 2020, Online publication date: 1-Jan-2020.
  58. Aghaie A and Moradi A (2020). TI-PUF: Toward Side-Channel Resistant Physical Unclonable Functions, IEEE Transactions on Information Forensics and Security, 15, (3470-3481), Online publication date: 1-Jan-2020.
  59. Zhang F, Dong X, Yang B, Zhou Y and Ren K (2019). A Systematic Evaluation of Wavelet-Based Attack Framework on Random Delay Countermeasures, IEEE Transactions on Information Forensics and Security, 15, (1407-1422), Online publication date: 1-Jan-2020.
  60. Zhang H (2019). On the Exact Relationship Between the Success Rate of Template Attack and Different Parameters, IEEE Transactions on Information Forensics and Security, 15, (681-694), Online publication date: 1-Jan-2020.
  61. Utyamishev D and Partin-Vaisband I (2019). Real-Time Detection of Power Analysis Attacks by Machine Learning of Power Supply Variations On-Chip, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 39:1, (45-55), Online publication date: 1-Jan-2020.
  62. Li Y, Tang M, Wang P, Li Y and Fu S Practical Evaluation Methodology of Higher-Order Maskings at Different Operating Frequencies Information and Communications Security, (287-304)
  63. Arribas V, Nikova S and Rijmen V (2022). Guards in action, Microprocessors & Microsystems, 71:C, Online publication date: 1-Nov-2019.
  64. Agrawal R, Vemuri R and Borowczak M (2019). A State Machine Encoding Methodology Against Power Analysis Attacks, Journal of Electronic Testing: Theory and Applications, 35:5, (621-639), Online publication date: 1-Oct-2019.
  65. Wang Q (2019). Hadamard matrices, d-linearly independent sets and correlation-immune Boolean functions with minimum Hamming weights, Designs, Codes and Cryptography, 87:10, (2321-2333), Online publication date: 1-Oct-2019.
  66. ACM
    Eger M and Gruss D Wait a second Proceedings of the 14th International Conference on the Foundations of Digital Games, (1-7)
  67. Caleiro C, Casal F and Mordido A (2019). Generalized probabilistic satisfiability and applications to modelling attackers with side-channel capabilities, Theoretical Computer Science, 781:C, (39-62), Online publication date: 16-Aug-2019.
  68. Batina L, Bhasin S, Jap D and Picek S CSI NN Proceedings of the 28th USENIX Conference on Security Symposium, (515-532)
  69. Amadori A, Michiels W and Roelse P A DFA Attack on White-Box Implementations of AES with External Encodings Selected Areas in Cryptography – SAC 2019, (591-617)
  70. Sugawara T, Shoji N, Sakiyama K, Matsuda K, Miura N and Nagata M (2019). Side-channel leakage from sensor-based countermeasures against fault injection attack, Microelectronics Journal, 90:C, (63-71), Online publication date: 1-Aug-2019.
  71. ACM
    Husa J Designing correlation immune boolean functions with minimal hamming weight using various genetic programming methods Proceedings of the Genetic and Evolutionary Computation Conference Companion, (342-343)
  72. ACM
    Zhou L, Su C, Hu Z, Lee S and Seo H (2019). Lightweight Implementations of NIST P-256 and SM2 ECC on 8-bit Resource-Constraint Embedded Device, ACM Transactions on Embedded Computing Systems, 18:3, (1-13), Online publication date: 13-Jun-2019.
  73. ACM
    Batina L, Jauernig P, Mentens N, Sadeghi A and Stapf E In Hardware We Trust Proceedings of the 56th Annual Design Automation Conference 2019, (1-4)
  74. ACM
    Jayasinghe D, Ignjatovic A and Parameswaran S RFTC Proceedings of the 56th Annual Design Automation Conference 2019, (1-6)
  75. De P, Mandal C and Prampalli U (2019). Path-Balanced Logic Design to Realize Block Ciphers Resistant to Power and Timing Attacks, IEEE Transactions on Very Large Scale Integration (VLSI) Systems, 27:5, (1080-1092), Online publication date: 1-May-2019.
  76. ACM
    Yan Y and Oswald E Examining the practical side channel resilience of ARX-boxes Proceedings of the 16th ACM International Conference on Computing Frontiers, (373-379)
  77. Pammu A, Ho W, Lwin N, Chong K and Gwee B (2018). A High Throughput and Secure Authentication-Encryption AES-CCM Algorithm on Asynchronous Multicore Processor, IEEE Transactions on Information Forensics and Security, 14:4, (1023-1036), Online publication date: 1-Apr-2019.
  78. Zhang S, Yang X, Chen L, Zhong W and Agosta G (2019). A Highly Effective Data Preprocessing in Side-Channel Attack Using Empirical Mode Decomposition, Security and Communication Networks, 2019, Online publication date: 1-Jan-2019.
  79. Mo J, Chen H and Genge B (2019). A Lightweight Secure User Authentication and Key Agreement Protocol for Wireless Sensor Networks, Security and Communication Networks, 2019, Online publication date: 1-Jan-2019.
  80. Duc A, Dziembowski S and Faust S (2019). Unifying Leakage Models, Journal of Cryptology, 32:1, (151-177), Online publication date: 1-Jan-2019.
  81. ACM
    Belleville N, Couroussé D, Heydemann K and Charles H (2018). Automated Software Protection for the Masses Against Side-Channel Attacks, ACM Transactions on Architecture and Code Optimization, 15:4, (1-27), Online publication date: 31-Dec-2019.
  82. ACM
    Wichelmann J, Moghimi A, Eisenbarth T and Sunar B MicroWalk Proceedings of the 34th Annual Computer Security Applications Conference, (161-173)
  83. Ming T, Yanbin L, Dongyan Z, Yuguang L, Fei Y and Huanguo Z (2018). Leak Point Locating in Hardware Implementations of Higher-Order Masking Schemes, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 37:12, (3008-3019), Online publication date: 1-Dec-2018.
  84. ACM
    Delledonne L, Zaccaria V, Susella R, Bertoni G and Melzani F (2018). CASCA, ACM Transactions on Design Automation of Electronic Systems, 23:6, (1-17), Online publication date: 30-Nov-2018.
  85. Wang C, Cai Y, Wang H and Zhou Q Electromagnetic Equalizer: An Active Countermeasure Against EM Side-channel Attack 2018 IEEE/ACM International Conference on Computer-Aided Design (ICCAD), (1-8)
  86. ACM
    Guo S, Wu M and Wang C Adversarial symbolic execution for detecting concurrency-related cache timing leaks Proceedings of the 2018 26th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering, (377-388)
  87. ACM
    Kamel D, Bellizia D, Standaert F, Flandre D and Bol D Demonstrating an LPPN Processor Proceedings of the 2018 Workshop on Attacks and Solutions in Hardware Security, (18-23)
  88. ACM
    Zoni D, Barenghi A, Pelosi G and Fornaciari W (2018). A Comprehensive Side-Channel Information Leakage Analysis of an In-Order RISC CPU Microarchitecture, ACM Transactions on Design Automation of Electronic Systems, 23:5, (1-30), Online publication date: 30-Sep-2018.
  89. Hettwer B, Gehrer S and Güneysu T Profiled Power Analysis Attacks Using Convolutional Neural Networks with Domain Knowledge Selected Areas in Cryptography – SAC 2018, (479-498)
  90. Lanet J, Bouder H, Benattou M and Legay A (2018). When time meets test, International Journal of Information Security, 17:4, (395-409), Online publication date: 1-Aug-2018.
  91. ACM
    Wu M, Guo S, Schaumont P and Wang C Eliminating timing side-channel leaks using program repair Proceedings of the 27th ACM SIGSOFT International Symposium on Software Testing and Analysis, (15-26)
  92. ACM
    Park J, Xu X, Jin Y, Forte D and Tehranipoor M Power-based side-channel instruction-level disassembler Proceedings of the 55th Annual Design Automation Conference, (1-6)
  93. Park J, Xu X, Jin Y, Forte D and Tehranipoor M Power-based Side-Channel Instruction-level Disassembler 2018 55th ACM/ESDA/IEEE Design Automation Conference (DAC), (1-6)
  94. Althoff A, McMahan J, Vega L, Davidson S, Sherwood T, Taylor M and Kastner R Hiding intermittent information leakage with architectural support for blinking Proceedings of the 45th Annual International Symposium on Computer Architecture, (638-649)
  95. Montasari R, Hosseinian-Far A, Hill R, Montaseri F, Sharma M and Shabbir S (2018). Are Timing-Based Side-Channel Attacks Feasible in Shared, Modern Computing Hardware?, International Journal of Organizational and Collective Intelligence, 8:2, (32-59), Online publication date: 1-Apr-2018.
  96. ACM
    Couroussé D, Barry T, Robisson B, Belleville N, Jaillon P, Potin O, Le Bouder H, Lanet J and Heydemann K All paths lead to Rome Proceedings of the Fifth Workshop on Cryptography and Security in Computing Systems, (17-18)
  97. Li Y, Tang M, Li Y and Zhang H (2018). Several weaknesses of the implementation for the theoretically secure masking schemes under ISW framework, Integration, the VLSI Journal, 60:C, (92-98), Online publication date: 1-Jan-2018.
  98. ACM
    Yan M, Gopireddy B, Shull T and Torrellas J (2017). Secure Hierarchy-Aware Cache Replacement Policy (SHARP), ACM SIGARCH Computer Architecture News, 45:2, (347-360), Online publication date: 14-Sep-2017.
  99. Tang M, Guo Z, Heuser A, Ren Y, Li J and Danger J (2017). PFD—A Flexible Higher-Order Masking Scheme, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 36:8, (1327-1339), Online publication date: 1-Aug-2017.
  100. ACM
    Picek S Evolutionary computation and cryptology Proceedings of the Genetic and Evolutionary Computation Conference Companion, (1066-1093)
  101. ACM
    Yan M, Gopireddy B, Shull T and Torrellas J Secure Hierarchy-Aware Cache Replacement Policy (SHARP) Proceedings of the 44th Annual International Symposium on Computer Architecture, (347-360)
  102. ACM
    Samwel N and Daemen J DPA on hardware implementations of Ascon and Keyak Proceedings of the Computing Frontiers Conference, (415-424)
  103. ACM
    Liu Z, Weng J, Hu Z and Seo H (2016). Efficient Elliptic Curve Cryptography for Embedded Devices, ACM Transactions on Embedded Computing Systems, 16:2, (1-18), Online publication date: 14-Apr-2017.
  104. ACM
    Unterluggauer T, Werner M and Mangard S Securing Memory Encryption and Authentication Against Side-Channel Attacks Using Unprotected Primitives Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, (690-702)
  105. Genkin D, Shamir A and Tromer E (2017). Acoustic Cryptanalysis, Journal of Cryptology, 30:2, (392-443), Online publication date: 1-Apr-2017.
  106. Homma N, Hayashi Y, Miura N, Fujimoto D, Nagata M and Aoki T (2017). Design Methodology and Validity Verification for a Reactive Countermeasure Against EM Attacks, Journal of Cryptology, 30:2, (373-391), Online publication date: 1-Apr-2017.
  107. Moos T, Moradi A and Richter B Static power side-channel analysis of a threshold implementation prototype chip Proceedings of the Conference on Design, Automation & Test in Europe, (1324-1329)
  108. Unterluggauer T, Werner M and Mangard S Side-channel plaintext-recovery attacks on leakage-resilient encryption Proceedings of the Conference on Design, Automation & Test in Europe, (1318-1323)
  109. ACM
    Seuschek H, De Santis F and Guillen O Side-channel leakage aware instruction scheduling Proceedings of the Fourth Workshop on Cryptography and Security in Computing Systems, (7-12)
  110. Wang A, Zhang Y, Zhu L, Tian W, Xu R, Zhang G and Du X (2017). RFA, Security and Communication Networks, 2017, Online publication date: 1-Jan-2017.
  111. ACM
    Mazumdar B, Ali S and Sinanoglu O (2016). A Compact Implementation of Salsa20 and Its Power Analysis Vulnerabilities, ACM Transactions on Design Automation of Electronic Systems, 22:1, (1-26), Online publication date: 28-Dec-2016.
  112. ACM
    Frieslaar I and Irwin B Investigating Multi-Thread Utilization as a Software Defence Mechanism Against Side Channel Attacks Proceedings of the 8th International Conference on Signal Processing Systems, (189-193)
  113. Fan G, Zhou Y, Zhang H and Feng D (2016). Towards optimal leakage exploitation rate in template attacks, Security and Communication Networks, 9:16, (3116-3126), Online publication date: 10-Nov-2016.
  114. ACM
    Samotyja J and Lemke-Rust K Practical Results of ECC Side Channel Countermeasures on an ARM Cortex M3 Processor Proceedings of the 2016 ACM Workshop on Theory of Implementation Security, (27-35)
  115. ACM
    Genkin D, Pachmanov L, Pipman I, Tromer E and Yarom Y ECDSA Key Extraction from Mobile Devices via Nonintrusive Physical Side Channels Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, (1626-1638)
  116. Oren Y and Wool A (2016). Side-channel cryptographic attacks using pseudo-boolean optimization, Constraints, 21:4, (616-645), Online publication date: 1-Oct-2016.
  117. Dziembowski S, Faust S, Herold G, Journault A, Masny D and Standaert F Towards Sound Fresh Re-keying with Hard Physical Learning Problems Proceedings, Part II, of the 36th Annual International Cryptology Conference on Advances in Cryptology --- CRYPTO 2016 - Volume 9815, (272-301)
  118. ACM
    Seo H, Liu Z, Nogami Y, Choi J and Kim H (2016). Hybrid Montgomery Reduction, ACM Transactions on Embedded Computing Systems, 15:3, (1-13), Online publication date: 21-Jul-2016.
  119. ACM
    Picek S Evolutionary Computation and Cryptology Proceedings of the 2016 on Genetic and Evolutionary Computation Conference Companion, (883-909)
  120. ACM
    Dessouky G and Sadeghi A POSTER Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and Mobile Networks, (223-224)
  121. ACM
    Bultel X, Gambs S, Gérault D, Lafourcade P, Onete C and Robert J A Prover-Anonymous and Terrorist-Fraud Resistant Distance-Bounding Protocol Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and Mobile Networks, (121-133)
  122. Chen C, Eisenbarth T, von Maurich I and Steinwandt R (2016). Horizontal and Vertical Side Channel Analysis of a McEliece Cryptosystem, IEEE Transactions on Information Forensics and Security, 11:6, (1093-1105), Online publication date: 1-Jun-2016.
  123. Bartkewitz T (2016). Leakage Prototype Learning for Profiled Differential Side-Channel Cryptanalysis, IEEE Transactions on Computers, 65:6, (1761-1774), Online publication date: 1-Jun-2016.
  124. ACM
    Ou C, Wang Z, Ai J, Zhou X, Sun D and DeBrunner V Error Tolerance based Single Interesting Point Side Channel CPA Distinguisher Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, (819-827)
  125. ACM
    Liu Z, Gao N, Tu C, Zhou J, Ma Y and Zhao Y Leakage Fingerprints Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, (807-818)
  126. ACM
    Genkin D, Pachmanov L, Pipman I, Shamir A and Tromer E (2016). Physical key extraction attacks on PCs, Communications of the ACM, 59:6, (70-79), Online publication date: 23-May-2016.
  127. ACM
    O'Neill M, O'Sullivan E, McWilliams G, Saarinen M, Moore C, Khalid A, Howe J, del Pino R, Abdalla M, Regazzoni F, Valencia F, Güneysu T, Oder T, Waller A, Jones G, Barnett A, Griffin R, Byrne A, Ammar B and Lund D Secure architectures of future emerging cryptography SAFEcrypto Proceedings of the ACM International Conference on Computing Frontiers, (315-322)
  128. Durvaux F and Standaert F From Improved Leakage Detection to the Detection of Points of Interests in Leakage Traces Proceedings, Part I, of the 35th Annual International Conference on Advances in Cryptology --- EUROCRYPT 2016 - Volume 9665, (240-262)
  129. Maghrebi H, Servant V and Bringer J There Is Wisdom in Harnessing the Strengths of Your Enemy Revised Selected Papers of the 23rd International Conference on Fast Software Encryption - Volume 9783, (223-243)
  130. Regazzoni F and Ienne P Instruction set extensions for secure applications Proceedings of the 2016 Conference on Design, Automation & Test in Europe, (1529-1534)
  131. Liu N, Chong K, Ho W, Gwee B and Chang J Low normalized energy derivation asynchronous circuit synthesis flow through fork-join slack matching for cryptographic applications Proceedings of the 2016 Conference on Design, Automation & Test in Europe, (850-853)
  132. Pessl P and Mangard S Enhancing Side-Channel Analysis of Binary-Field Multiplication with Bit Reliability Proceedings of the RSA Conference on Topics in Cryptology - CT-RSA 2016 - Volume 9610, (255-270)
  133. Genkin D, Pachmanov L, Pipman I and Tromer E ECDH Key-Extraction via Low-Bandwidth Electromagnetic Attacks on PCs Proceedings of the RSA Conference on Topics in Cryptology - CT-RSA 2016 - Volume 9610, (219-235)
  134. ACM
    Dubeuf J, Hely D and Beroulle V (2016). ECDSA Passive Attacks, Leakage Sources, and Common Design Mistakes, ACM Transactions on Design Automation of Electronic Systems, 21:2, (1-24), Online publication date: 28-Jan-2016.
  135. Martin D, Oswald E, Stam M and Wójcik M A Leakage Resilient MAC Proceedings of the 15th IMA International Conference on Cryptography and Coding - Volume 9496, (295-310)
  136. Picek S, Guilley S, Carlet C, Jakobovic D and Miller J Evolutionary Approach for Finding Correlation Immune Boolean Functions of Order t with Minimal Hamming Weight Proceedings of the Fourth International Conference on Theory and Practice of Natural Computing - Volume 9477, (71-82)
  137. ACM
    Sasdrich P and Güneysu T (2015). Implementing Curve25519 for Side-Channel--Protected Elliptic Curve Cryptography, ACM Transactions on Reconfigurable Technology and Systems, 9:1, (1-15), Online publication date: 24-Nov-2015.
  138. ACM
    Yan L, Guo Y, Chen X and Mei H A Study on Power Side Channels on Mobile Devices Proceedings of the 7th Asia-Pacific Symposium on Internetware, (30-38)
  139. Won Y, Hodgers P, O'Neill M and Han D On the Security of Balanced Encoding Countermeasures Revised Selected Papers of the 14th International Conference on Smart Card Research and Advanced Applications - Volume 9514, (242-256)
  140. Portella Do Canto R, Korkikian R and Naccache D Buying AES Design Resistance withźSpeedźandźEnergy LNCS Essays on The New Codebreakers - Volume 9100, (134-147)
  141. Dutertre J, Mirbaha A, Naccache D and Tria A Photonic Power Firewalls LNCS Essays on The New Codebreakers - Volume 9100, (342-354)
  142. ACM
    Oren Y, Kemerlis V, Sethumadhavan S and Keromytis A The Spy in the Sandbox Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, (1406-1418)
  143. ACM
    Pereira O, Standaert F and Vivek S Leakage-Resilient Authentication and Encryption from Symmetric Cryptographic Primitives Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, (96-108)
  144. Al Faruque M, Regazzoni F and Pajic M Design methodologies for securing cyber-physical systems Proceedings of the 10th International Conference on Hardware/Software Codesign and System Synthesis, (30-36)
  145. Jayasinghe D, Ignjatovic A, Ambrose J, Ragel R and Parameswaran S QuadSeal Proceedings of the 2015 International Conference on Compilers, Architecture and Synthesis for Embedded Systems, (21-30)
  146. ACM
    Malagón P, de Goyeneche J, Fraga D and Moya J Bitslice software implementation of KeeLoq as a side-channel countermeasure Proceedings of the WESS'15: Workshop on Embedded Systems Security, (1-8)
  147. Nascimento E, López J and Dahab R Efficient and Secure Elliptic Curve Cryptography for 8-bit AVR Microcontrollers Proceedings of the 5th International Conference on Security, Privacy, and Applied Cryptography Engineering - Volume 9354, (289-309)
  148. Picek S, Mazumdar B, Mukhopadhyay D and Batina L Modified Transparency Order Property Proceedings of the 5th International Conference on Security, Privacy, and Applied Cryptography Engineering - Volume 9354, (210-227)
  149. Eldib H, Chao Wang , Taha M and Schaumont P (2015). Quantitative Masking Strength: Quantifying the Power Side-Channel Resistance of Software Code, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 34:10, (1558-1568), Online publication date: 1-Oct-2015.
  150. Ahn H, Hanley N, O'Neill M and Han D An Improved Second-Order Power Analysis Attack Based on a New Refined Expecter Revised Selected Papers of the 16th International Workshop on Information Security Applications - Volume 9503, (174-186)
  151. Gornik A, Moradi A, Oehm J and Paar C (2015). A Hardware-Based Countermeasure to Reduce Side-Channel Leakage: Design, Implementation, and Evaluation, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 34:8, (1308-1319), Online publication date: 1-Aug-2015.
  152. Xinmu Wang , Yu Zheng , Basak A and Bhunia S (2015). IIPS: Infrastructure IP for Secure SoC Design, IEEE Transactions on Computers, 64:8, (2226-2238), Online publication date: 1-Aug-2015.
  153. ACM
    Picek S, Carlet C, Jakobovic D, Miller J and Batina L Correlation Immunity of Boolean Functions Proceedings of the 2015 Annual Conference on Genetic and Evolutionary Computation, (1095-1102)
  154. ACM
    DeTrano A, Guilley S, Guo X, Karimi N and Karri R Exploiting small leakages in masks to turn a second-order attack into a first-order attack Proceedings of the Fourth Workshop on Hardware and Architectural Support for Security and Privacy, (1-5)
  155. ACM
    Miura N, Fujimoto D, Nagata M, Homma N, Hayashi Y and Aoki T EM attack sensor Proceedings of the 52nd Annual Design Automation Conference, (1-6)
  156. ACM
    Agosta G, Barenghi A, Pelosi G and Scandale M Information leakage chaff Proceedings of the 52nd Annual Design Automation Conference, (1-6)
  157. ACM
    Chen J, Liu M, Li H and Shi H Mind Your Nonces Moving Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security, (609-614)
  158. Sasdrich P, Mischke O, Moradi A and Güneysu T Side-Channel Protection by Randomizing Look-Up Tables on Reconfigurable Hardware Revised Selected Papers of the 6th International Workshop on Constructive Side-Channel Analysis and Secure Design - Volume 9064, (95-107)
  159. Wild A, Moradi A and Güneysu T Evaluating the Duplication of Dual-Rail Precharge Logics on FPGAs Revised Selected Papers of the 6th International Workshop on Constructive Side-Channel Analysis and Secure Design - Volume 9064, (81-94)
  160. Sugawara T, Suzuki D and Saeki M Two Operands of Multipliers in Side-Channel Attack Revised Selected Papers of the 6th International Workshop on Constructive Side-Channel Analysis and Secure Design - Volume 9064, (64-78)
  161. Muehlberghuber M, Korak T, Dunst P and Hutter M Towards Evaluating DPA Countermeasures for Keccak K1012ECCAK on a Real ASIC Revised Selected Papers of the 6th International Workshop on Constructive Side-Channel Analysis and Secure Design - Volume 9064, (222-236)
  162. Vadnala P and Groβschädl J Faster Mask Conversion with Lookup Tables Revised Selected Papers of the 6th International Workshop on Constructive Side-Channel Analysis and Secure Design - Volume 9064, (207-221)
  163. Picek S, Batina L, Buzing P and Jakobovic D Fault Injection with a New Flavor Revised Selected Papers of the 6th International Workshop on Constructive Side-Channel Analysis and Secure Design - Volume 9064, (159-173)
  164. Specht R, Heyszl J, Kleinsteuber M and Sigl G Improving Non-profiled Attacks on Exponentiations Based on Clustering and Extracting Leakage from Multi-channel High-Resolution EM Measurements Revised Selected Papers of the 6th International Workshop on Constructive Side-Channel Analysis and Secure Design - Volume 9064, (3-19)
  165. ACM
    Hernández J, Ferber A, Prowell S and Hively L Phase-Space Detection of Cyber Events Proceedings of the 10th Annual Cyber and Information Security Research Conference, (1-4)
  166. Avital M, Dagan H, Keren O and Fish A (2015). Randomized Multitopology Logic Against Differential Power Analysis, IEEE Transactions on Very Large Scale Integration (VLSI) Systems, 23:4, (702-711), Online publication date: 1-Apr-2015.
  167. Agosta G, Barenghi A, Pelosi G and Scandale M (2015). Trace-based schedulability analysis to enhance passive side-channel attack resilience of embedded software, Information Processing Letters, 115:2, (292-297), Online publication date: 1-Feb-2015.
  168. ACM
    Swierczynski P, Moradi A, Oswald D and Paar C (2014). Physical Security Evaluation of the Bitstream Encryption Mechanism of Altera Stratix II and Stratix III FPGAs, ACM Transactions on Reconfigurable Technology and Systems, 7:4, (1-23), Online publication date: 23-Jan-2015.
  169. ACM
    Carbone M, Teglia Y, Maurine P and Ducharme G Interest of MIA in frequency domain? Proceedings of the Second Workshop on Cryptography and Security in Computing Systems, (35-38)
  170. ACM
    Eldib H, Wang C and Schaumont P (2014). Formal Verification of Software Countermeasures against Side-Channel Attacks, ACM Transactions on Software Engineering and Methodology, 24:2, (1-24), Online publication date: 23-Dec-2014.
  171. Fan G, Zhou Y, Zhang H and Feng D Template Attacks Based on Priori Knowledge Revised Selected Papers of the 6th International Conference on Trusted Systems - Volume 9473, (346-363)
  172. Fan G, Zhou Y, Zhang H and Feng D How to Choose Interesting Points for Template Attacks More Effectively? Revised Selected Papers of the 6th International Conference on Trusted Systems - Volume 9473, (168-183)
  173. ACM
    Guillen O, Brederlow R, Ledwa R and Sigl G Risk management in embedded devices using metering applications as example Proceedings of the 9th Workshop on Embedded Systems Security, (1-9)
  174. Moradi A and Immler V Early Propagation and Imbalanced Routing, How to Diminish in FPGAs Proceedings of the 16th International Workshop on Cryptographic Hardware and Embedded Systems --- CHES 2014 - Volume 8731, (598-615)
  175. Oren Y, Weisse O and Wool A A New Framework for Constraint-Based Probabilistic Template Side Channel Attacks Proceedings of the 16th International Workshop on Cryptographic Hardware and Embedded Systems --- CHES 2014 - Volume 8731, (17-34)
  176. Genkin D, Pipman I and Tromer E Get Your Hands Off My Laptop Proceedings of the 16th International Workshop on Cryptographic Hardware and Embedded Systems --- CHES 2014 - Volume 8731, (242-260)
  177. Homma N, Hayashi Y, Miura N, Fujimoto D, Tanaka D, Nagata M and Aoki T EM Attack Is Non-invasive? - Design Methodology and Validity Verification of EM Attack Sensor Proceedings of the 16th International Workshop on Cryptographic Hardware and Embedded Systems --- CHES 2014 - Volume 8731, (1-16)
  178. ACM
    Loder L, de Souza A, Fay M and Soares R Towards a Framework to Perform DPA Attack on GALS Pipeline Architectures Proceedings of the 27th Symposium on Integrated Circuits and Systems Design, (1-7)
  179. Eldib H and Wang C Synthesis of Masking Countermeasures against Side Channel Attacks Proceedings of the 16th International Conference on Computer Aided Verification - Volume 8559, (114-130)
  180. Bringer J, Carlet C, Chabanne H, Guilley S and Maghrebi H Orthogonal Direct Sum Masking Proceedings of the 8th IFIP WG 11.2 International Workshop on Information Security Theory and Practice. Securing the Internet of Things - Volume 8501, (40-56)
  181. ACM
    Eldib H, Wang C, Taha M and Schaumont P QMS Proceedings of the 51st Annual Design Automation Conference, (1-6)
  182. Wang D, Wang A and Zheng X Fault-Tolerant Linear Collision Attack Proceedings of the 10th International Conference on Information Security Practice and Experience - Volume 8434, (232-246)
  183. ACM
    Picek S, Ege B, Batina L, Jakobovic D, Chmielewski Ł and Golub M On using genetic algorithms for intrinsic side-channel resistance Proceedings of the First Workshop on Cryptography and Security in Computing Systems, (13-18)
  184. Santis F, Kasper M, Mangard S, Sigl G, Stein O and Stöttinger M On the Relationship between Correlation Power Analysis and the Stochastic Approach Proceedings of the 14th International Conference on Progress in Cryptology — INDOCRYPT 2013 - Volume 8250, (215-226)
  185. Lomné V, Prouff E and Roche T Behind the Scene of Side Channel Attacks Part I of the Proceedings of the 19th International Conference on Advances in Cryptology - ASIACRYPT 2013 - Volume 8269, (506-525)
  186. Wang D and Wang P Offline Dictionary Attack on Password Authentication Schemes Using Smart Cards Proceedings of the 16th International Conference on Information Security - Volume 7807, (221-237)
  187. ACM
    Weiner M, Massar M, Tews E, Giese D and Wieser W Security analysis of a widely deployed locking system Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security, (929-940)
  188. Oswald D, Richter B and Paar C Side-Channel Attacks on the Yubikey 2 One-Time Password Generator Proceedings of the 16th International Symposium on Research in Attacks, Intrusions, and Defenses - Volume 8145, (204-222)
  189. Antonini A, Barenghi A and Pelosi G Security Analysis of Building Automation Networks Proceedings of the 18th Nordic Conference on Secure IT Systems - Volume 8208, (199-214)
  190. Pöppelmann T and Güneysu T Towards Practical Lattice-Based Public-Key Encryption on Reconfigurable Hardware Revised Selected Papers on Selected Areas in Cryptography -- SAC 2013 - Volume 8282, (68-85)
  191. Oswald D, Strobel D, Schellenberg F, Kasper T and Paar C When Reverse-Engineering Meets Side-Channel Analysis --- Digital Lockpicking in Practice Revised Selected Papers on Selected Areas in Cryptography -- SAC 2013 - Volume 8282, (571-588)
  192. ACM
    Carlet C and Guilley S Side-channel indistinguishability Proceedings of the 2nd International Workshop on Hardware and Architectural Support for Security and Privacy, (1-8)
  193. ACM
    Oren Y, Weisse O and Wool A Practical template-algebraic side channel attacks with extremely low data complexity Proceedings of the 2nd International Workshop on Hardware and Architectural Support for Security and Privacy, (1-8)
  194. ACM
    Cobb W, Baldwin R and Laspe E (2013). Leakage Mapping, ACM Transactions on Information and System Security, 16:1, (1-29), Online publication date: 1-Jun-2013.
  195. ACM
    Agosta G, Barenghi A, Maggi M and Pelosi G Compiler-based side channel vulnerability analysis and optimized countermeasures application Proceedings of the 50th Annual Design Automation Conference, (1-6)
  196. ACM
    Wang X, Yueh W, Roy D, Narasimhan S, Zheng Y, Mukhopadhyay S, Mukhopadhyay D and Bhunia S Role of power grid in side channel attack and power-grid-aware secure design Proceedings of the 50th Annual Design Automation Conference, (1-9)
  197. Plos T and Maierhofer C (2013). On measuring the parasitic backscatter of sensor-enabled UHF RFID tags, Information Security Tech. Report, 17:4, (239-252), Online publication date: 1-May-2013.
  198. Bayrak A, Velickovic N, Regazzoni F, Novo D, Brisk P and Ienne P An EDA-friendly protection scheme against side-channel attacks Proceedings of the Conference on Design, Automation and Test in Europe, (410-415)
  199. Li Y, Endo S, Debande N, Homma N, Aoki T, Le T, Danger J, Ohta K and Sakiyama K Exploring the relations between fault sensitivity and power consumption Proceedings of the 4th international conference on Constructive Side-Channel Analysis and Secure Design, (137-153)
  200. Roche T and Lomné V Collision-Correlation attack against some 1st-order boolean masking schemes in the context of secure devices Proceedings of the 4th international conference on Constructive Side-Channel Analysis and Secure Design, (114-136)
  201. Kutzner S, Nguyen P, Poschmann A and Wang H On 3-share threshold implementations for 4-bit s-boxes Proceedings of the 4th international conference on Constructive Side-Channel Analysis and Secure Design, (99-113)
  202. Krämer J, Nedospasov D, Schlösser A and Seifert J Differential photonic emission analysis Proceedings of the 4th international conference on Constructive Side-Channel Analysis and Secure Design, (1-16)
  203. ACM
    Moradi A, Oswald D, Paar C and Swierczynski P Side-channel attacks on the bitstream encryption mechanism of Altera Stratix II Proceedings of the ACM/SIGDA international symposium on Field programmable gate arrays, (91-100)
  204. ACM
    Hively L and McDonald J Theorem-based, data-driven, cyber event detection Proceedings of the Eighth Annual Cyber Security and Information Intelligence Research Workshop, (1-4)
  205. ACM
    Krieg A, Grinschgl J, Steger C, Weiss R, Bock H and Haid J (2012). POWER-MODES, ACM Transactions on Reconfigurable Technology and Systems, 5:4, (1-21), Online publication date: 1-Dec-2012.
  206. Bertoni G, Daemen J, Debande N, Le T, Peeters M and Van Assche G Power Analysis of Hardware Implementations Protected with Secret Sharing Proceedings of the 2012 45th Annual IEEE/ACM International Symposium on Microarchitecture Workshops, (9-16)
  207. Durvaux F, Renauld M, Standaert F, van Oldeneel tot Oldenzeel L and Veyrat-Charvillon N Efficient removal of random delays from embedded software implementations using hidden markov models Proceedings of the 11th international conference on Smart Card Research and Advanced Applications, (123-140)
  208. Bettale L Secure multiple SBoxes implementation with arithmetically masked input Proceedings of the 11th international conference on Smart Card Research and Advanced Applications, (91-105)
  209. Bartkewitz T and Lemke-Rust K Efficient template attacks based on probabilistic multi-class support vector machines Proceedings of the 11th international conference on Smart Card Research and Advanced Applications, (263-276)
  210. Heyszl J, Merli D, Heinz B, De Santis F and Sigl G Strengths and limitations of high-resolution electromagnetic field measurements for side-channel analysis Proceedings of the 11th international conference on Smart Card Research and Advanced Applications, (248-262)
  211. Oswald D and Paar C Improving side-channel analysis with optimal linear transforms Proceedings of the 11th international conference on Smart Card Research and Advanced Applications, (219-233)
  212. Yalçın T and Kavun E On the implementation aspects of sponge-based authenticated encryption for pervasive devices Proceedings of the 11th international conference on Smart Card Research and Advanced Applications, (141-157)
  213. ACM
    Geng H, Wu J, Liu J, Choi M and Shi Y Utilizing random noise in cryptography Proceedings of the International Conference on Computer-Aided Design, (163-167)
  214. ACM
    Anandakumar N and Dillibabu S Correlation power analysis attack of AES on FPGA using customized communication protocol Proceedings of the Second International Conference on Computational Science, Engineering and Information Technology, (683-688)
  215. ACM
    Hein D, Toegl R, Pirker M, Gatial E, Balogh Z, Brandl H and Hluchý L Securing mobile agents for crisis management support Proceedings of the seventh ACM workshop on Scalable trusted computing, (85-90)
  216. Moradi A and Mischke O How far should theory be from practice? Proceedings of the 14th international conference on Cryptographic Hardware and Embedded Systems, (92-106)
  217. Fei Y, Luo Q and Ding A A statistical model for DPA with novel algorithmic confusion analysis Proceedings of the 14th international conference on Cryptographic Hardware and Embedded Systems, (233-250)
  218. Medwed M, Standaert F and Joux A Towards super-exponential side-channel security with efficient leakage-resilient PRFs Proceedings of the 14th international conference on Cryptographic Hardware and Embedded Systems, (193-212)
  219. Pamula D and Tisserand A GF(2) finite-field multipliers with reduced activity variations Proceedings of the 4th international conference on Arithmetic of Finite Fields, (152-167)
  220. Mohamed N, Hashim M and Hutter M Improved fixed-base comb method for fast scalar multiplication Proceedings of the 5th international conference on Cryptology in Africa, (342-359)
  221. Ye X and Eisenbarth T Wide collisions in practice Proceedings of the 10th international conference on Applied Cryptography and Network Security, (329-343)
  222. ACM
    Agosta G, Barenghi A and Pelosi G A code morphing methodology to automate power analysis countermeasures Proceedings of the 49th Annual Design Automation Conference, (77-82)
  223. Mansouri S and Dubrova E An architectural countermeasure against power analysis attacks for FSR-Based stream ciphers Proceedings of the Third international conference on Constructive Side-Channel Analysis and Secure Design, (54-68)
  224. Korak T, Plos T and Hutter M Attacking an AES-Enabled NFC tag Proceedings of the Third international conference on Constructive Side-Channel Analysis and Secure Design, (17-32)
  225. Zohner M, Kasper M and Stöttinger M Butterfly-Attack on skein's modular addition Proceedings of the Third international conference on Constructive Side-Channel Analysis and Secure Design, (215-230)
  226. Hutter M, Kirschbaum M, Plos T, Schmidt J and Mangard S Exploiting the difference of side-channel leakages Proceedings of the Third international conference on Constructive Side-Channel Analysis and Secure Design, (1-16)
  227. Wang A, Chen M, Wang Z and Ding Y Overcoming significant noise Proceedings of the 8th international conference on Information Security Practice and Experience, (393-404)
  228. Heuser A, Schindler W and Stöttinger M Revealing side-channel issues of complex circuits by enhanced leakage models Proceedings of the Conference on Design, Automation and Test in Europe, (1179-1184)
  229. Nassar M, Souissi Y, Guilley S and Danger J RSM Proceedings of the Conference on Design, Automation and Test in Europe, (1173-1178)
  230. Zohner M, Kasper M, Stöttinger M and Huss S Side channel analysis of the SHA-3 finalists Proceedings of the Conference on Design, Automation and Test in Europe, (1012-1017)
  231. Fan J and Verbauwhede I An updated survey on secure ECC implementations Cryptography and Security, (265-282)
  232. ACM
    Bayrak A, Velickovic N, Ienne P and Burleson W (2012). An architecture-independent instruction shuffler to protect against side-channel attacks, ACM Transactions on Architecture and Code Optimization, 8:4, (1-19), Online publication date: 1-Jan-2012.
  233. Nassar M, Guilley S and Danger J Formal analysis of the entropy / security trade-off in first-order masking countermeasures against side-channel attacks Proceedings of the 12th international conference on Cryptology in India, (22-39)
  234. Saha D, Mukhopadhyay D and RoyChowdhury D PKDPA Proceedings of the 12th international conference on Cryptology in India, (3-21)
  235. Strobel D and Paar C An efficient method for eliminating random delays in power traces of embedded software Proceedings of the 14th international conference on Information Security and Cryptology, (48-60)
  236. Yang S, Zhou Y, Liu J and Chen D Back propagation neural network based leakage characterization for practical security analysis of cryptographic implementations Proceedings of the 14th international conference on Information Security and Cryptology, (169-185)
  237. Krämer J, Nedospasov D and Seifert J Weaknesses in current RSA signature schemes Proceedings of the 14th international conference on Information Security and Cryptology, (155-168)
  238. ACM
    Li J, Zhang D, Qiu M, Zhu Y and Shen J Security protection on FPGA against differential power analysis attacks Proceedings of the Seventh Annual Workshop on Cyber Security and Information Intelligence Research, (1-1)
  239. Hermans J, Pashalidis A, Vercauteren F and Preneel B A new RFID privacy model Proceedings of the 16th European conference on Research in computer security, (568-587)
  240. Veyrat-Charvillon N and Standaert F Generic side-channel distinguishers Proceedings of the 31st annual conference on Advances in cryptology, (354-372)
  241. Whitnall C and Oswald E A comprehensive evaluation of mutual information analysis using a fair evaluation framework Proceedings of the 31st annual conference on Advances in cryptology, (316-334)
  242. Hutter M, Joye M and Sierra Y Memory-constrained implementations of elliptic curve cryptography in co-Z coordinate representation Proceedings of the 4th international conference on Progress in cryptology in Africa, (170-187)
  243. Kasper T, Oswald D and Paar C Side-channel analysis of cryptographic RFIDs with analog demodulation Proceedings of the 7th international conference on RFID Security and Privacy, (61-77)
  244. Pendl C, Pelnar M and Hutter M Elliptic curve cryptography on the WISP UHF RFID tag Proceedings of the 7th international conference on RFID Security and Privacy, (32-47)
  245. ACM
    Bayrak A, Regazzoni F, Brisk P, Standaert F and Ienne P A first step towards automatic application of power analysis countermeasures Proceedings of the 48th Design Automation Conference, (230-235)
  246. Maghrebi H, Guilley S and Danger J Leakage squeezing countermeasure against high-order attacks Proceedings of the 5th IFIP WG 11.2 international conference on Information security theory and practice: security and privacy of mobile devices in wireless communication, (208-223)
  247. Hutter M, Feldhofer M and Wolkerstorfer J A cryptographic processor for low-resource devices Proceedings of the 5th IFIP WG 11.2 international conference on Information security theory and practice: security and privacy of mobile devices in wireless communication, (144-159)
  248. Barenghi A, Pelosi G and Teglia Y Information leakage discovery techniques to enhance secure chip design Proceedings of the 5th IFIP WG 11.2 international conference on Information security theory and practice: security and privacy of mobile devices in wireless communication, (128-143)
  249. Guilley S, Khalfallah K, Lomne V and Danger J Formal framework for the evaluation of waveform resynchronization algorithms Proceedings of the 5th IFIP WG 11.2 international conference on Information security theory and practice: security and privacy of mobile devices in wireless communication, (100-115)
  250. Wang A, Li Z, Yang X and Yu Y A new security proof of practical cryptographic devices based on hardware, software and protocols Proceedings of the 7th international conference on Information security practice and experience, (386-400)
  251. Liu J, Zhou Y, Han Y, Li J, Yang S and Feng D How to characterize side-channel leakages more accurately? Proceedings of the 7th international conference on Information security practice and experience, (196-207)
  252. Moradi A, Poschmann A, Ling S, Paar C and Wang H Pushing the limits Proceedings of the 30th Annual international conference on Theory and applications of cryptographic techniques: advances in cryptology, (69-88)
  253. ACM
    Sharif Mansouri S and Dubrova E A countermeasure against power analysis attacks for FSR-based stream ciphers Proceedings of the 21st edition of the great lakes symposium on Great lakes symposium on VLSI, (235-240)
  254. ACM
    Burmester M and Munilla J (2011). Lightweight RFID authentication with forward and backward security, ACM Transactions on Information and System Security, 14:1, (1-26), Online publication date: 1-May-2011.
  255. van Woudenberg J, Witteman M and Bakker B Improving differential power analysis by elastic alignment Proceedings of the 11th international conference on Topics in cryptology: CT-RSA 2011, (104-119)
  256. Strenzke F Manger's attack revisited Proceedings of the 12th international conference on Information and communications security, (31-45)
  257. Gallais J, Großschädl J, Hanley N, Kasper M, Medwed M, Regazzoni F, Schmidt J, Tillich S and Wójcik M Hardware trojans for inducing or amplifying side-channel leakage of cryptographic software Proceedings of the Second international conference on Trusted Systems, (253-270)
  258. ACM
    Tillich S, Kirschbaum M and Szekely A SCA-resistant embedded processors Proceedings of the 26th Annual Computer Security Applications Conference, (211-220)
  259. Dyrkolbotn G, Wold K and Snekkenes E Security implications of crosstalk in switching CMOS gates Proceedings of the 13th international conference on Information security, (269-275)
  260. ACM
    Chen Z, Sinha A and Schaumont P Implementing virtual secure circuit using a custom-instruction approach Proceedings of the 2010 international conference on Compilers, architectures and synthesis for embedded systems, (57-66)
  261. ACM
    Sinha A, Chen Z and Schaumont P A comprehensive analysis of performance and side-channel-leakage of AES SBOX implementations in embedded software Proceedings of the 5th Workshop on Embedded Systems Security, (1-9)
  262. ACM
    Mateos E and Gebotys C A new correlation frequency analysis of the side channel Proceedings of the 5th Workshop on Embedded Systems Security, (1-8)
  263. ACM
    Barenghi A, Pelosi G and Teglia Y Improving first order differential power attacks through digital signal processing Proceedings of the 3rd international conference on Security of information and networks, (124-133)
  264. ACM
    Lin L, Holcomb D, Krishnappa D, Shabadi P and Burleson W Low-power sub-threshold design of secure physical unclonable functions Proceedings of the 16th ACM/IEEE international symposium on Low power electronics and design, (43-48)
  265. Tunstall M and Joye M Coordinate blinding over large prime fields Proceedings of the 12th international conference on Cryptographic hardware and embedded systems, (443-455)
  266. Oren Y, Kirschbaum M, Popp T and Wool A Algebraic side-channel analysis in the presence of errors Proceedings of the 12th international conference on Cryptographic hardware and embedded systems, (428-442)
  267. Järvinen K, Kolesnikov V, Sadeghi A and Schneider T Garbled circuits for leakage-resilience Proceedings of the 12th international conference on Cryptographic hardware and embedded systems, (383-397)
  268. Moradi A, Mischke O and Eisenbarth T Correlation-enhanced power analysis collision attack Proceedings of the 12th international conference on Cryptographic hardware and embedded systems, (125-139)
  269. Coron J and Kizhvatov I Analysis and improvement of the random delay countermeasure of CHES 2009 Proceedings of the 12th international conference on Cryptographic hardware and embedded systems, (95-109)
  270. Fumaroli G, Martinelli A, Prouff E and Rivain M Affine masking against higher-order side channel analysis Proceedings of the 17th international conference on Selected areas in cryptography, (262-280)
  271. Pan J, Van Woudenberg J, Den Hartog J and Witteman M Improving DPA by peak distribution analysis Proceedings of the 17th international conference on Selected areas in cryptography, (241-261)
  272. Schmidt J, Tunstall M, Avanzi R, Kizhvatov I, Kasper T and Oswald D Combined implementation attack resistant exponentiation Proceedings of the First international conference on Progress in cryptology: cryptology and information security in Latin America, (305-322)
  273. Armknecht F, Sadeghi A, Visconti I and Wachsmann C On RFID privacy with mutual authentication and tag corruption Proceedings of the 8th international conference on Applied cryptography and network security, (493-510)
  274. Lu J, Pan J and den Hartog J Principles on the security of AES against first and second-order differential power analysis Proceedings of the 8th international conference on Applied cryptography and network security, (168-185)
  275. Strenzke F A timing attack against the secret permutation in the mceliece PKC Proceedings of the Third international conference on Post-Quantum Cryptography, (95-107)
  276. Heyse S Low-reiter Proceedings of the Third international conference on Post-Quantum Cryptography, (165-181)
  277. Alioto M, Poli M and Rocchi S (2010). A general power model of differential power analysis attacks to static logic circuits, IEEE Transactions on Very Large Scale Integration (VLSI) Systems, 18:5, (711-724), Online publication date: 1-May-2010.
  278. Schmidt J, Plos T, Kirschbaum M, Hutter M, Medwed M and Herbst C Side-Channel leakage across borders Proceedings of the 9th IFIP WG 8.8/11.2 international conference on Smart Card Research and Advanced Application, (36-48)
  279. Luo Q Enhance multi-bit spectral analysis on hiding in temporal dimension Proceedings of the 9th IFIP WG 8.8/11.2 international conference on Smart Card Research and Advanced Application, (13-23)
  280. Li Y, Sakiyama K, Batina L, Nakatsu D and Ohta K Power variance analysis breaks a masked ASIC implementation of AES Proceedings of the Conference on Design, Automation and Test in Europe, (1059-1064)
  281. Meynard O, Guilley S, Danger J and Sauvage L Far correlation-based EMA with a precharacterized leakage model Proceedings of the Conference on Design, Automation and Test in Europe, (977-980)
  282. Hutter M, Plos T and Feldhofer M (2010). On the security of RFID devices against implementation attacks, International Journal of Security and Networks, 5:2/3, (106-118), Online publication date: 1-Mar-2010.
  283. Moradi A and Poschmann A Lightweight cryptography and DPA countermeasures Proceedings of the 14th international conference on Financial cryptograpy and data security, (68-79)
  284. Armknecht F, Sadeghi A, Scafuro A, Visconti I and Wachsmann C Impossibility results for RFID privacy notions Transactions on computational science XI, (39-63)
  285. Kasper T, Oswald D and Paar C A versatile framework for implementation attacks on cryptographic RFIDs and embedded devices Transactions on computational science X, (100-130)
  286. Kasper T, Oswald D and Paar C EM Side-Channel Attacks on Commercial Contactless Smartcards Using Low-Cost Equipment Information Security Applications, (79-93)
  287. Sugawara T, Hayashi Y, Homma N, Mizuki T, Aoki T, Sone H and Satoh A Mechanism behind Information Leakage in Electromagnetic Analysis of Cryptographic Modules Information Security Applications, (66-78)
  288. Moradi A, Mousavi N, Paar C and Salmasizadeh M A Comparative Study of Mutual Information Analysis under a Gaussian Assumption Information Security Applications, (193-205)
  289. Pan J, Hartog J and Lu J You Cannot Hide behind the Mask Information Security Applications, (178-192)
  290. Plos T, Hutter M and Feldhofer M On Comparing Side-Channel Preprocessing Techniques for Attacking RFID Devices Information Security Applications, (163-177)
  291. Hanley N, Tunstall M and Marnane W Unknown Plaintext Template Attacks Information Security Applications, (148-162)
  292. Moradi A and Kasper T A new remote keyless entry system resistant to power analysis attacks Proceedings of the 7th international conference on Information, communications and signal processing, (1062-1067)
  293. Moradi A, Eisenbarth T, Poschmann A and Paar C Power analysis of single-rail storage elements as used in MDPL Proceedings of the 12th international conference on Information security and cryptology, (146-160)
  294. ACM
    Kizhvatov I Side channel analysis of AVR XMEGA crypto engine Proceedings of the 4th Workshop on Embedded Systems Security, (1-7)
  295. ACM
    Coron J and Kizhvatov I Analysis of the split mask countermeasure for embedded systems Proceedings of the 4th Workshop on Embedded Systems Security, (1-10)
  296. ACM
    Grabher P, Großschädl J and Page D Non-deterministic processors Proceedings of the 4th Workshop on Embedded Systems Security, (1-10)
  297. Eisenbarth T, Güneysu T, Heyse S and Paar C MicroEliece Proceedings of the 11th International Workshop on Cryptographic Hardware and Embedded Systems, (49-64)
  298. Regazzoni F, Cevrero A, Standaert F, Badel S, Kluter T, Brisk P, Leblebici Y and Ienne P A Design Flow and Evaluation Framework for DPA-Resistant Instruction Set Extensions Proceedings of the 11th International Workshop on Cryptographic Hardware and Embedded Systems, (205-219)
  299. Rivain M, Prouff E and Doget J Higher-Order Masking and Shuffling for Software Implementations of Block Ciphers Proceedings of the 11th International Workshop on Cryptographic Hardware and Embedded Systems, (171-188)
  300. Popp T An introduction to implementation attacks and countermeasures Proceedings of the 7th IEEE/ACM international conference on Formal Methods and Models for Codesign, (108-115)
  301. Tunstall M Random Order m-ary Exponentiation Proceedings of the 14th Australasian Conference on Information Security and Privacy, (437-451)
  302. Joye M and Tunstall M Exponent Recoding and Regular Exponentiation Algorithms Proceedings of the 2nd International Conference on Cryptology in Africa: Progress in Cryptology, (334-349)
  303. Chen Z, Haider S and Schaumont P Side-Channel Leakage in Masked Circuits Caused by Higher-Order Circuit Effects Proceedings of the 3rd International Conference and Workshops on Advances in Information Security and Assurance, (327-336)
  304. Plos T Evaluation of the Detached Power Supply as Side-Channel Analysis Countermeasure for Passive UHF RFID Tags Proceedings of the The Cryptographers' Track at the RSA Conference 2009 on Topics in Cryptology, (444-458)
  305. Popp T, Kirschbaum M and Mangard S Practical Attacks on Masked Hardware Proceedings of the The Cryptographers' Track at the RSA Conference 2009 on Topics in Cryptology, (211-225)
  306. Regazzoni F, Eisenbarth T, Poschmann A, Großschädl J, Gurkaynak F, Macchetti M, Toprak Z, Pozzi L, Paar C, Leblebici Y and Ienne P Evaluating Resistance of MCML Technology to Power Analysis Attacks Using a Simulation-Based Methodology Transactions on Computational Science IV, (230-243)
  307. Junod P, Karlov A and Lenstra A Improving the Boneh-Franklin Traitor Tracing Scheme Proceedings of the 12th International Conference on Practice and Theory in Public Key Cryptography: PKC '09, (88-104)
  308. ACM
    McEvoy R, Murphy C, Marnane W and Tunstall M (2009). Isolated WDDL, ACM Transactions on Reconfigurable Technology and Systems, 2:1, (1-23), Online publication date: 1-Mar-2009.
  309. ACM
    Khatir M, Moradi A, Ejlali A, Manzuri Shalmani M and Salmasizadeh M A secure and low-energy logic style using charge recovery approach Proceedings of the 2008 international symposium on Low Power Electronics & Design, (259-264)
  310. Bogdanov A Multiple-Differential Side-Channel Collision Attacks on AES Proceeding sof the 10th international workshop on Cryptographic Hardware and Embedded Systems, (30-44)
  311. Tillich S and Herbst C Attacking State-of-the-Art Software Countermeasures--A Case Study for AES Proceeding sof the 10th international workshop on Cryptographic Hardware and Embedded Systems, (228-243)
  312. Plos T Susceptibility of UHF RFID tags to electromagnetic analysis Proceedings of the 2008 The Cryptopgraphers' Track at the RSA conference on Topics in cryptology, (288-300)
  313. ACM
    Kulikowski K, Venkataraman V, Wang Z and Taubin A Power balanced gates insensitive to routing capacitance mismatch Proceedings of the conference on Design, automation and test in Europe, (1280-1285)
  314. Bernstein D and Lange T Faster addition and doubling on elliptic curves Proceedings of the Advances in Crypotology 13th international conference on Theory and application of cryptology and information security, (29-50)
  315. Popp T, Mangard S and Oswald E (2007). Power Analysis Attacks and Countermeasures, IEEE Design & Test, 24:6, (535-543), Online publication date: 1-Nov-2007.
  316. Schaumont P and Tiri K Masking and Dual-Rail Logic Don't Add Up Proceedings of the 9th international workshop on Cryptographic Hardware and Embedded Systems, (95-106)
  317. Popp T, Kirschbaum M, Zefferer T and Mangard S Evaluation of the Masked Logic Style MDPL on a Prototype Chip Proceedings of the 9th international workshop on Cryptographic Hardware and Embedded Systems, (81-94)
  318. Tillich S and Großschädl J Power Analysis Resistant AES Implementation with Instruction Set Extensions Proceedings of the 9th international workshop on Cryptographic Hardware and Embedded Systems, (303-319)
  319. McEvoy R, Tunstall M, Murphy C and Marnane W Differential power analysis of HMAC based on SHA-2, and countermeasures Proceedings of the 8th international conference on Information security applications, (317-332)
  320. Leadbitter P, Page D and Smart N (2007). Nondeterministic Multithreading, IEEE Transactions on Computers, 56:7, (992-998), Online publication date: 1-Jul-2007.
  321. Tillich S, Herbst C and Mangard S Protecting AES Software Implementations on 32-Bit Processors Against Power Analysis Proceedings of the 5th international conference on Applied Cryptography and Network Security, (141-157)
  322. Verbauwhede I and Schaumont P Design methods for security and trust Proceedings of the conference on Design, automation and test in Europe, (672-677)
  323. Jiang K, Eles P, Peng Z, Chattopadhyay S and Batina L SPARTA: A scheduling policy for thwarting differential power analysis attacks 2016 21st Asia and South Pacific Design Automation Conference (ASP-DAC), (667-672)
Contributors
  • Graz University of Technology
  • University of Bristol
  • Graz University of Technology

Recommendations