Found: 37
Select item for more details and to access through your institution.
Faster elliptic curve arithmetic for triple-base chain by reordering sequences of field operations.
- Published in:
- Multimedia Tools & Applications, 2016, v. 75, n. 22, p. 14819, doi. 10.1007/s11042-016-3272-y
- By:
- Publication type:
- Article
Side-channel attacks on HIGHT with reduced masked rounds suitable for the protection of multimedia computing system.
- Published in:
- Multimedia Tools & Applications, 2012, v. 56, n. 2, p. 267, doi. 10.1007/s11042-010-0590-3
- By:
- Publication type:
- Article
Efficient implementation of modular multiplication over 192-bit NIST prime for 8-bit AVR-based sensor node.
- Published in:
- Journal of Supercomputing, 2021, v. 77, n. 5, p. 4852, doi. 10.1007/s11227-020-03441-5
- By:
- Publication type:
- Article
RCB: leakage-resilient authenticated encryption via re-keying.
- Published in:
- Journal of Supercomputing, 2018, v. 74, n. 9, p. 4173, doi. 10.1007/s11227-016-1824-6
- By:
- Publication type:
- Article
Correction to: An efficient implementation of pairing-based cryptography on MSP430 processor.
- Published in:
- 2018
- By:
- Publication type:
- Correction Notice
An efficient implementation of pairing-based cryptography on MSP430 processor.
- Published in:
- Journal of Supercomputing, 2018, v. 74, n. 3, p. 1394, doi. 10.1007/s11227-017-2097-4
- By:
- Publication type:
- Article
A preimage attack on reduced GIMLI‐HASH with unbalanced squeezing phase.
- Published in:
- IET Information Security (Wiley-Blackwell), 2023, v. 17, n. 1, p. 66, doi. 10.1049/ise2.12060
- By:
- Publication type:
- Article
Collision Attacks on AES-192/256, Crypton-192/256, mCrypton-96/128, and Anubis.
- Published in:
- Journal of Applied Mathematics, 2013, p. 1, doi. 10.1155/2013/713673
- By:
- Publication type:
- Article
Security Analysis of HMAC/NMAC by Using Fault Injection.
- Published in:
- Journal of Applied Mathematics, 2013, p. 1, doi. 10.1155/2013/101907
- By:
- Publication type:
- Article
Enhancing Time-Frequency Analysis with Zero-Mean Preprocessing.
- Published in:
- Sensors (14248220), 2022, v. 22, n. 7, p. 2477, doi. 10.3390/s22072477
- By:
- Publication type:
- Article
Special Issue on "Side Channel Attacks".
- Published in:
- 2019
- By:
- Publication type:
- Editorial
Lightweight Conversion from Arithmetic to Boolean Masking for Embedded IoT Processor.
- Published in:
- Applied Sciences (2076-3417), 2019, v. 9, n. 7, p. 1438, doi. 10.3390/app9071438
- By:
- Publication type:
- Article
Single Trace Analysis on Constant Time CDT Sampler and Its Countermeasure.
- Published in:
- Applied Sciences (2076-3417), 2018, v. 8, n. 10, p. 1809, doi. 10.3390/app8101809
- By:
- Publication type:
- Article
Efficient Implementations of Four-Dimensional GLV-GLS Scalar Multiplication on 8-Bit, 16-Bit, and 32-Bit Microcontrollers.
- Published in:
- Applied Sciences (2076-3417), 2018, v. 8, n. 6, p. 900, doi. 10.3390/app8060900
- By:
- Publication type:
- Article
Known-IV, Known-in-Advance-IV, and Replayed-and-Known-IV Attacks on Multiple Modes of Operation of Block Ciphers.
- Published in:
- Journal of Cryptology, 2006, v. 19, n. 4, p. 441, doi. 10.1007/s00145-006-0205-3
- By:
- Publication type:
- Article
Design and Security Analysis of Cryptosystems.
- Published in:
- Applied Sciences (2076-3417), 2023, v. 13, n. 3, p. 1427, doi. 10.3390/app13031427
- By:
- Publication type:
- Article
Fast Implementation of NIST P-256 Elliptic Curve Cryptography on 8-Bit AVR Processor.
- Published in:
- Applied Sciences (2076-3417), 2020, v. 10, n. 24, p. 8816, doi. 10.3390/app10248816
- By:
- Publication type:
- Article
On the Performance Analysis for CSIDH-Based Cryptosystems.
- Published in:
- Applied Sciences (2076-3417), 2020, v. 10, n. 19, p. 6927, doi. 10.3390/app10196927
- By:
- Publication type:
- Article
Power-Balancing Software Implementation to Mitigate Side-Channel Attacks without Using Look-Up Tables.
- Published in:
- Applied Sciences (2076-3417), 2020, v. 10, n. 7, p. 2454, doi. 10.3390/app10072454
- By:
- Publication type:
- Article
Single Trace Analysis against HyMES by Exploitation of Joint Distributions of Leakages.
- Published in:
- Applied Sciences (2076-3417), 2020, v. 10, n. 5, p. 1831, doi. 10.3390/app10051831
- By:
- Publication type:
- Article
Efficient Isogeny Computations on Twisted Edwards Curves.
- Published in:
- Security & Communication Networks, 2018, p. 1, doi. 10.1155/2018/5747642
- By:
- Publication type:
- Article
Related-Key Cryptanalysis on the Full PRINTcipher Suitable for IC-Printing.
- Published in:
- International Journal of Distributed Sensor Networks, 2014, p. 1, doi. 10.1155/2014/389476
- By:
- Publication type:
- Article
Security Analysis of Scalable Block Cipher PP-1 Applicable to Distributed Sensor Networks.
- Published in:
- International Journal of Distributed Sensor Networks, 2013, p. 1, doi. 10.1155/2013/169638
- By:
- Publication type:
- Article
New space-efficient quantum algorithm for binary elliptic curves using the optimized division algorithm.
- Published in:
- Quantum Information Processing, 2023, v. 22, n. 6, p. 1, doi. 10.1007/s11128-023-03991-6
- By:
- Publication type:
- Article
Recent advances in deep learning‐based side‐channel analysis.
- Published in:
- ETRI Journal, 2020, v. 42, n. 2, p. 292, doi. 10.4218/etrij.2019-0163
- By:
- Publication type:
- Article
New Type of Collision Attack on First-Order Masked AESs.
- Published in:
- ETRI Journal, 2016, v. 38, n. 2, p. 387, doi. 10.4218/etrij.16.0114.0854
- By:
- Publication type:
- Article
Mutual Information Analysis for Three-Phase Dynamic Current Mode Logic against Side-Channel Attack.
- Published in:
- ETRI Journal, 2015, v. 37, n. 3, p. 584, doi. 10.4218/etrij.15.0114.0297
- By:
- Publication type:
- Article
Mutual Information Analysis for Three Phase Dynamic Current Mode Logic against side channel attack.
- Published in:
- ETRI Journal, 2015, v. 37, n. 2, p. 1, doi. 10.4218/etrij.15.0114.0297
- By:
- Publication type:
- Article
An Efficient DPA Countermeasure for the Eta<sub>T</sub> Pairing Algorithm over GF(2<sup>n</sup>) Based on Random Value Addition.
- Published in:
- ETRI Journal, 2011, v. 33, n. 5, p. 780, doi. 10.4218/etrij.11.0110.0597
- By:
- Publication type:
- Article
Efficient Masked Implementation for SEED Based on Combined Masking.
- Published in:
- ETRI Journal, 2011, v. 33, n. 2, p. 267, doi. 10.4218/etrij.11.1510.0112
- By:
- Publication type:
- Article
Efficient Masking Methods Appropriate for the Block Ciphers ARIA and AES.
- Published in:
- ETRI Journal, 2010, v. 32, n. 3, p. 370, doi. 10.4218/etrij.10.0109.0181
- By:
- Publication type:
- Article
Practical Second-Order Correlation Power Analysis on the Message Blinding Method and Its Novel Countermeasure for RSA.
- Published in:
- ETRI Journal, 2010, v. 32, n. 1, p. 102, doi. 10.4218/etrij.10.0109.0249
- By:
- Publication type:
- Article
Improved Side-Channel Attack on DES with the First Four Rounds Masked.
- Published in:
- ETRI Journal, 2009, v. 31, n. 5, p. 625, doi. 10.4218/etrij.09.0209.0144
- By:
- Publication type:
- Article
The Switching Generator: New Clock-Controlled Generator with Resistance against the Algebraic and Side Channel Attacks.
- Published in:
- Entropy, 2015, v. 17, n. 6, p. 3692, doi. 10.3390/e17063692
- By:
- Publication type:
- Article
Reduction of Operating Current by Harnessing the Field‐ and Damping‐Like Torque Ratios in Nonmagnet–Ferromagnet Heterojunctions.
- Published in:
- Small Science, 2024, v. 4, n. 2, p. 1, doi. 10.1002/smsc.202300224
- By:
- Publication type:
- Article
Side-Channel Attack Using Meet-in-the-Middle Technique.
- Published in:
- Computer Journal, 2010, v. 53, n. 7, p. 934, doi. 10.1093/comjnl/bxp054
- By:
- Publication type:
- Article
Weakness of lightweight block ciphers mCrypton and LED against biclique cryptanalysis.
- Published in:
- Peer-to-Peer Networking & Applications, 2015, v. 8, n. 4, p. 716, doi. 10.1007/s12083-013-0208-4
- By:
- Publication type:
- Article