Sciweavers

4101 search results - page 18 / 821
» Differential Power Analysis
Sort
View
56
Voted
ISSAC
1997
Springer
98views Mathematics» more  ISSAC 1997»
15 years 1 months ago
On Symmetric Powers of Differential Operators
Manuel Bronstein, Thom Mulders, Jacques-Arthur Wei...
CHES
2004
Springer
216views Cryptology» more  CHES 2004»
15 years 1 months ago
Efficient Countermeasures against RPA, DPA, and SPA
In the execution on a smart card, side channel attacks such as simple power analysis (SPA) and the differential power analysis (DPA) have become serious threat [15]. Side channel a...
Hideyo Mamiya, Atsuko Miyaji, Hiroaki Morimoto
CHES
2009
Springer
265views Cryptology» more  CHES 2009»
15 years 10 months ago
Higher-Order Masking and Shuffling for Software Implementations of Block Ciphers
Differential Power Analysis (DPA) is a powerful side channel key recovery attack that efficiently breaks block ciphers implementations. In software, two main techniques are usually...
Matthieu Rivain, Emmanuel Prouff, Julien Doget
95
Voted
BMCBI
2004
150views more  BMCBI 2004»
14 years 9 months ago
Rank Difference Analysis of Microarrays (RDAM), a novel approach to statistical analysis of microarray expression profiling data
Background: A key step in the analysis of microarray expression profiling data is the identification of genes that display statistically significant changes in expression signals ...
Dietmar E. Martin, Philippe Demougin, Michael N. H...
CHES
2006
Springer
137views Cryptology» more  CHES 2006»
15 years 1 months ago
Provably Secure S-Box Implementation Based on Fourier Transform
Cryptographic algorithms implemented in embedded devices must withstand Side Channel Attacks such as the Differential Power Analysis (DPA). A common method of protecting symmetric ...
Emmanuel Prouff, Christophe Giraud, Sébasti...