Linked e-resources

Details

Does Coupling Affect the Security of Masked Implementations
Scaling Trends for Dual-Rail Logic Styles against Side-Channel Attacks: A Case-Study
Dissecting Leakage Resilient PRFs with Multivariate Localized EM Attacks
A Practical Security Evaluation on FPGA
Toward More Effcient DPA-Resistant AES Hardware Architecture Based on Threshold Implementation
Enhanced Elliptic Curve Scalar Multiplication Secure Against Side Channel Attacks and Safe Errors
SafeDRP: Yet Another Way Toward Power-Equalized Designs in FPGA
On the Construction of Side-Channel Attack Resilient S-boxes
Efficient Conversion Method from Arithmetic to Boolean Masking in Constrained Devices
Side-Channel Analysis of Keymill
On the Easiness of Turning Higher-Order Leakages into First-Order
Side-Channel Attacks against the Human Brain: The PIN Code Case Study
Impacts of Technology Trends on Physical Attacks
Low-cost Setup for Localized Semi-invasive Optical Fault Injection Attacks
How Low Can We Go
DFA on LS-Designs with a Practical Implementation on SCREAM
Multiple-Valued Debiasing for Physically Unclonable Functions and Its Application to Fuzzy Extractors
Getting the Most out of Leakage Detection
Statistical Tools and Measurement Setups Hand in Hand
Mind the Gap: Towards Secure 1st-Order Masking in Software.

Browse Subjects

Show more subjects...

Statistics

from
to
Export