ScienceOpen:
research and publishing network
For Publishers
Discovery
Metadata
Peer review
Hosting
Publishing
For Researchers
Join
Publish
Review
Collect
My ScienceOpen
Sign in
Register
Dashboard
Blog
About
Search
Advanced search
My ScienceOpen
Sign in
Register
Dashboard
Search
Search
Advanced search
For Publishers
Discovery
Metadata
Peer review
Hosting
Publishing
For Researchers
Join
Publish
Review
Collect
Blog
About
31
views
17
references
Top references
cited by
8
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
5,027
similar
All similar
Record
: found
Abstract
: not found
Book Chapter
: not found
A Statistical Model for DPA with Novel Algorithmic Confusion Analysis
other
Author(s):
Yunsi Fei
,
Qiasi Luo
,
A. Adam Ding
Publication date
(Print):
2012
Publisher:
Springer Berlin Heidelberg
Read this book at
Publisher
Further versions
open (via free pdf)
Powered by
Buy book
Review
Review book
Invite someone to review
Bookmark
Cite as...
There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
Core Readings in Statistical Mediation Analysis
Most cited references
17
Record
: found
Abstract
: not found
Article
: not found
Communication Theory of Secrecy Systems*
C. Shannon
(1949)
0
comments
Cited
1008
times
– based on
0
reviews
Review now
Bookmark
Record
: found
Abstract
: not found
Book Chapter
: not found
ElectroMagnetic Analysis (EMA): Measures and Counter-measures for Smart Cards
Jean-Jacques Quisquater
,
David Samyde
(2001)
0
comments
Cited
76
times
– based on
0
reviews
Bookmark
Record
: found
Abstract
: not found
Book Chapter
: not found
Electromagnetic Analysis: Concrete Results
Karine Gandolfi
,
Christophe Mourtel
,
Francis Olivier
(2001)
0
comments
Cited
74
times
– based on
0
reviews
Bookmark
All references
Author and book information
Book Chapter
Publication date (Print):
2012
Pages
: 233-250
DOI:
10.1007/978-3-642-33027-8_14
SO-VID:
f3b09a91-7711-4777-8863-efa9c5e4c5fe
History
Data availability:
Comments
Comment on this book
Sign in to comment
Book chapters
pp. 1
3D Hardware Canaries
pp. 23
Breakthrough Silicon Scanning Discovers Backdoor in Military Chip
pp. 41
Simple Photonic Emission Analysis of AES
pp. 58
Compiler Assisted Masking
pp. 76
Threshold Implementations of All 3 ×3 and 4 ×4 S-Boxes
pp. 92
How Far Should Theory Be from Practice?
pp. 107
Efficient and Provably Secure Methods for Switching from Arithmetic to Boolean Masking
pp. 122
A Differential Fault Attack on the Grain Family of Stream Ciphers
pp. 140
Algebraic Side-Channel Attacks Beyond the Hamming Weight Leakage Model
pp. 155
Selecting Time Samples for Multivariate DPA Attacks
pp. 175
Unified and Optimized Linear Collision Attacks and Their Application in a Non-profiled Setting
pp. 193
Towards Super-Exponential Side-Channel Security with Efficient Leakage-Resilient PRFs
pp. 213
Practical Leakage-Resilient Symmetric Cryptography
pp. 233
A Statistical Model for DPA with Novel Algorithmic Confusion Analysis
pp. 251
Practical Security Analysis of PUF-Based Two-Player Protocols
pp. 268
Soft Decision Error Correction for Compact Memory-Based PUFs Using a Single Enrollment
pp. 283
PUFs: Myth, Fact or Busted? A Security Evaluation of Physically Unclonable Functions (PUFs) Cast in Silicon
pp. 302
PUFKY: A Fully Functional PUF-Based Cryptographic Key Generator
pp. 320
NEON Crypto
pp. 340
Towards One Cycle per Bit Asymmetric Encryption: Code-Based Cryptography on Reconfigurable Hardware
pp. 356
Solving Quadratic Equations with XL on Parallel Architectures
pp. 374
Efficient Implementations of MQPKS on Constrained Devices
pp. 390
Towards Green Cryptography: A Comparison of Lightweight Ciphers from the Energy Viewpoint
pp. 408
Lightweight Cryptography for the Cloud: Exploit the Power of Bitslice Implementation
pp. 426
Low-Latency Encryption – Is “Lightweight = Light + Wait”?
pp. 447
Attacking RSA–CRT Signatures with Faults on Montgomery Multiplication
pp. 463
Reduce-by-Feedback: Timing Resistant and DPA-Aware Modular Multiplication Plus: How to Break RSA by DPA
pp. 476
Side Channel Attack to Actual Cryptanalysis: Breaking CRT-RSA with Low Weight Decryption Exponents
pp. 494
Pushing the Limits of High-Speed GF(2 m ) Elliptic Curve Scalar Multiplication on FPGAs
pp. 512
On the Design of Hardware Building Blocks for Modern Lattice-Based Encryption Schemes
pp. 530
Practical Lattice-Based Cryptography: A Signature Scheme for Embedded Systems
pp. 548
An Efficient Countermeasure against Correlation Power-Analysis Attacks with Randomized Montgomery Operations for DF-ECC Processor
Similar content
5,027
Optical Spectra and Electronic State Structure of Dy3+ in Hexagonal Na3[Yb1-xDyx(dpa)3].cntdot.NaClO4.cntdot.10H2O Crystals
Authors:
Todd A Hopkins
,
David Metcalf
,
F Richardson
AN ISOPIESTIC INVESTIGATION OF DI-(2-ETHYLHEXYL)-PHOSPHORIC ACID (DPA) AND TRI-n-OCTYLPHOSPHINE OXIDE (TPO) IN n-OCTANE1
Authors:
C. F. Baes
Preparation, crystal structure and magnetic properties of Ni2(dpa)2(pyz)(H2O)4
Authors:
Chen Liu
,
Erik Čižmár
,
Ju-Hyun Park
…
See all similar
Cited by
8
Making Masking Security Proofs Concrete
Authors:
Alexandre Duc
,
Sebastian Faust
,
François-Xavier Standaert
Characterisation and Estimation of the Key Rank Distribution in the Context of Side Channel Evaluations
Authors:
Daniel P. Martin
,
Luke Mather
,
Elisabeth Oswald
…
Less is More
Authors:
Nicolas Bruneau
,
Sylvain Guilley
,
Annelie Heuser
…
See all cited by