Using Second-Order Power Analysis to Attack DPA Resistant Software
Top Cited Papers
- 1 January 2000
- book chapter
- Published by Springer Nature
- p. 238-251
- https://doi.org/10.1007/3-540-44499-8_19
Abstract
No abstract availableKeywords
This publication has 8 references indexed in Scilit:
- Securing the AES Finalists Against Power Analysis AttacksPublished by Springer Nature ,2001
- Bitslice Ciphers and Power Analysis AttacksPublished by Springer Nature ,2001
- Towards Sound Approaches to Counteract Power-Analysis AttacksPublished by Springer Nature ,1999
- Differential Power AnalysisPublished by Springer Nature ,1999
- Resistance Against Differential Power Analysis For Elliptic Curve CryptosystemsPublished by Springer Nature ,1999
- DES and Differential Power Analysis The “Duplication” MethodPublished by Springer Nature ,1999
- Power Analysis Attacks of Modular Exponentiation in SmartcardsPublished by Springer Nature ,1999
- Side channel cryptanalysis of product ciphersPublished by Springer Nature ,1998