Journal articles on the topic 'Differential power analysis attacks'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Differential power analysis attacks.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Liu, Hongming, Yujie Zhou, and Nianhao Zhu. "A Novel Elliptic Curve Scalar Multiplication Algorithm against Power Analysis." Mathematical Problems in Engineering 2013 (2013): 1–7. http://dx.doi.org/10.1155/2013/862508.
Full textSoares, Rafael I., Ney L. V. Calazans, Victor Lomné, Amine Dehbaoui, Philippe Maurine, and Lionel Torres. "A GALS Pipeline DES Architecture to Increase Robustness against CPA and CEMA Attacks." Journal of Integrated Circuits and Systems 6, no. 1 (December 27, 2011): 25–34. http://dx.doi.org/10.29292/jics.v6i1.335.
Full textWang, An, Liji Wu, Zongyue Wang, Xuexin Zheng, Man Chen, and Jing Ma. "Two Improved Multiple-Differential Collision Attacks." Mathematical Problems in Engineering 2014 (2014): 1–11. http://dx.doi.org/10.1155/2014/209692.
Full textGhellar, Felipe, and Marcelo Lubaszewski. "A Novel AES Cryptographic Core Highly Resistant to Differential Power Analysis Attacks." Journal of Integrated Circuits and Systems 4, no. 1 (November 21, 2009): 29–35. http://dx.doi.org/10.29292/jics.v4i1.294.
Full textMuresan, Radu, and Stefano Gregori. "Protection Circuit against Differential Power Analysis Attacks for Smart Cards." IEEE Transactions on Computers 57, no. 11 (November 2008): 1540–49. http://dx.doi.org/10.1109/tc.2008.107.
Full textAlioto, Massimo, Massimo Poli, and Santina Rocchi. "A General Power Model of Differential Power Analysis Attacks to Static Logic Circuits." IEEE Transactions on Very Large Scale Integration (VLSI) Systems 18, no. 5 (May 2010): 711–24. http://dx.doi.org/10.1109/tvlsi.2009.2015327.
Full textLomné, V., A. Dehbaoui, T. Ordas, P. Maurine, L. Torres, M. Robert, R. Soares, N. Calazans, and F. Moraes. "Secure Triple Track Logic Robustness Against Differential Power and Electromagnetic Analyses." Journal of Integrated Circuits and Systems 4, no. 1 (November 21, 2009): 20–28. http://dx.doi.org/10.29292/jics.v4i1.293.
Full textMahanta, Hridoy Jyoti, and Ajoy Kumar Khan. "Improving Power Analysis Peak Distribution Using Canberra Distance to Address Ghost Peak Problem." International Journal of Information Security and Privacy 12, no. 3 (July 2018): 27–41. http://dx.doi.org/10.4018/ijisp.2018070103.
Full textYuan, Yanling, Zuyi Li, and Kui Ren. "Modeling Load Redistribution Attacks in Power Systems." IEEE Transactions on Smart Grid 2, no. 2 (June 2011): 382–90. http://dx.doi.org/10.1109/tsg.2011.2123925.
Full textJeongChoon Ryoo, Dong-Guk Han, Sung-Kyoung Kim, and Sangjin Lee. "Performance Enhancement of Differential Power Analysis Attacks With Signal Companding Methods." IEEE Signal Processing Letters 15 (2008): 625–28. http://dx.doi.org/10.1109/lsp.2008.2002930.
Full textLo, Owen, William J. Buchanan, and Douglas Carson. "Power analysis attacks on the AES-128 S-box using differential power analysis (DPA) and correlation power analysis (CPA)." Journal of Cyber Security Technology 1, no. 2 (September 19, 2016): 88–107. http://dx.doi.org/10.1080/23742917.2016.1231523.
Full textSun, Song, Zijun Yan, and Joseph Zambreno. "Demonstrable differential power analysis attacks on real-world FPGA-based embedded systems." Integrated Computer-Aided Engineering 16, no. 2 (March 20, 2009): 119–30. http://dx.doi.org/10.3233/ica-2009-0309.
Full textMangard, S., E. Oswald, and F. X. Standaert. "One for all – all for one: unifying standard differential power analysis attacks." IET Information Security 5, no. 2 (2011): 100. http://dx.doi.org/10.1049/iet-ifs.2010.0096.
Full textBen Dodo, Samir, Rajendra Bishnoi, and Mehdi B. Tahoori. "Secure STT-MRAM Bit-Cell Design Resilient to Differential Power Analysis Attacks." IEEE Transactions on Very Large Scale Integration (VLSI) Systems 28, no. 1 (January 2020): 263–72. http://dx.doi.org/10.1109/tvlsi.2019.2940449.
Full textJayasinghe, Darshana, Aleksandar Ignjatovic, Roshan Ragel, Jude Angelo Ambrose, and Sri Parameswaran. "QuadSeal: Quadruple Balancing to Mitigate Power Analysis Attacks with Variability Effects and Electromagnetic Fault Injection Attacks." ACM Transactions on Design Automation of Electronic Systems 26, no. 5 (June 5, 2021): 1–36. http://dx.doi.org/10.1145/3443706.
Full textKaedi, S., M. Doostari, and M. B. Ghaznavi-Ghoushchi. "NEMR: A Nonequidistant DPA Attack-Proof of Modular Reduction in a CRT Implementation of RSA." Journal of Circuits, Systems and Computers 27, no. 12 (June 22, 2018): 1850191. http://dx.doi.org/10.1142/s0218126618501918.
Full textZarrinchian, Ghobad, and Morteza Saheb Zamani. "Combinational Counters: A Low Overhead Approach to Address DPA Attacks." Journal of Circuits, Systems and Computers 29, no. 06 (August 23, 2019): 2050097. http://dx.doi.org/10.1142/s0218126620500978.
Full textXU, Kaiyong, Ming FANG, Tianchi YANG, Fanwei MENG, and Huixin HUANG. "Value-at-risk quantitative method about password chip under differential power analysis attacks." Journal of Computer Applications 33, no. 6 (October 29, 2013): 1642–45. http://dx.doi.org/10.3724/sp.j.1087.2013.01642.
Full textMahmoud, Hanan, Khaled Alghathbar, and Alaaeldin Hafez. "A Novel Stegnosystem Design for Defying Differential Power Analysis Attacks on Smart Cards." Journal of Applied Sciences 11, no. 6 (March 1, 2011): 1049–53. http://dx.doi.org/10.3923/jas.2011.1049.1053.
Full textAlioto, M., M. Poli, and S. Rocchi. "Differential Power Analysis Attacks to Precharged Buses: A General Analysis for Symmetric-Key Cryptographic Algorithms." IEEE Transactions on Dependable and Secure Computing 7, no. 3 (July 2010): 226–39. http://dx.doi.org/10.1109/tdsc.2009.1.
Full textLima, Vitor Gonçalves, Guilherme Paim, Rodrigo Wuerdig, Leandro Mateus Giacomini Rocha, Leomar Da Rosa Júnior, Felipe Marques, Vinicius Valduga, Eduardo Costa, Rafael Soares, and Sergio Bampi. "Enhancing Side Channel Attack-Resistance of the STTL Combining Multi-Vt Transistors with Capacitance and Current Paths Counterbalancing." Journal of Integrated Circuits and Systems 15, no. 1 (May 26, 2020): 1–11. http://dx.doi.org/10.29292/jics.v15i1.100.
Full textRandolph, Mark, and William Diehl. "Power Side-Channel Attack Analysis: A Review of 20 Years of Study for the Layman." Cryptography 4, no. 2 (May 19, 2020): 15. http://dx.doi.org/10.3390/cryptography4020015.
Full textBhat, Showkat Ahmad, and Amandeep Singh. "A Novel Image Encryption Algorithm Using Multiple Encryption Techniques for Mobile Devices." International Journal of Sensors, Wireless Communications and Control 10, no. 2 (September 15, 2020): 123–42. http://dx.doi.org/10.2174/2210327909666190408094102.
Full textBow, Ivan, Nahome Bete, Fareena Saqib, Wenjie Che, Chintan Patel, Ryan Robucci, Calvin Chan, and Jim Plusquellic. "Side-Channel Power Resistance for Encryption Algorithms Using Implementation Diversity." Cryptography 4, no. 2 (April 10, 2020): 13. http://dx.doi.org/10.3390/cryptography4020013.
Full textRajaram, M., and J. Vijaya. "A Defense Mechanism for Differential Power Analysis Attack in AES." Journal of Computer Science 11, no. 2 (February 1, 2015): 291–96. http://dx.doi.org/10.3844/jcssp.2015.291.296.
Full textCai, Xiaomin, Renfa Li, Shijie Kuang, and Jinhui Tan. "An Energy Trace Compression Method for Differential Power Analysis Attack." IEEE Access 8 (2020): 89084–92. http://dx.doi.org/10.1109/access.2020.2993701.
Full textDiehl, William, Abubakr Abdulgadir, Farnoud Farahmand, Jens-Peter Kaps, and Kris Gaj. "Comparison of Cost of Protection against Differential Power Analysis of Selected Authenticated Ciphers." Cryptography 2, no. 3 (September 19, 2018): 26. http://dx.doi.org/10.3390/cryptography2030026.
Full textYoung, Rachel, Stephanie Miles, and Saleem Alhabash. "Attacks by Anons: A Content Analysis of Aggressive Posts, Victim Responses, and Bystander Interventions on a Social Media Site." Social Media + Society 4, no. 1 (January 2018): 205630511876244. http://dx.doi.org/10.1177/2056305118762444.
Full textMohammad Kootiani, A. Zadali, and P. Abedi. "Investigation Role of Sbox to Leakage DPA Information for TDES in FPGA Targets." Applied Mechanics and Materials 256-259 (December 2012): 2820–25. http://dx.doi.org/10.4028/www.scientific.net/amm.256-259.2820.
Full textLi, Jie, Wei Wei Shan, and Chao Xuan Tian. "Hamming Distance Model Based Power Analysis for Cryptographic Algorithms." Applied Mechanics and Materials 121-126 (October 2011): 867–71. http://dx.doi.org/10.4028/www.scientific.net/amm.121-126.867.
Full textZhou, Fang, Benjun Zhang, Ning Wu, and Xiangli Bu. "The Design of Compact SM4 Encryption and Decryption Circuits That Are Resistant to Bypass Attack." Electronics 9, no. 7 (July 6, 2020): 1102. http://dx.doi.org/10.3390/electronics9071102.
Full textZhao, Jia. "RVLSI Implementation of an AES Algorithm Resistant to Differential Power Analysis Attack." Journal of Computer Research and Development 44, no. 3 (2007): 378. http://dx.doi.org/10.1360/crad20070302.
Full textHa, Jaecheol. "Vulnerability of Carry Random Scalar Recoding Method against Differential Power Analysis Attack." Journal of the Korea Institute of Information Security and Cryptology 26, no. 5 (October 31, 2016): 1099–103. http://dx.doi.org/10.13089/jkiisc.2016.26.5.1099.
Full textde Coo, Ilse F., Juana CA Marin, Stephen D. Silberstein, Deborah I. Friedman, Charly Gaul, Candace K. McClure, Alok Tyagi, et al. "Differential efficacy of non-invasive vagus nerve stimulation for the acute treatment of episodic and chronic cluster headache: A meta-analysis." Cephalalgia 39, no. 8 (June 10, 2019): 967–77. http://dx.doi.org/10.1177/0333102419856607.
Full textHernández-Díaz, Erick, Héctor Pérez-Meana, Víctor Silva-García, and Rolando Flores-Carapia. "JPEG Images Encryption Scheme Using Elliptic Curves and A New S-Box Generated by Chaos." Electronics 10, no. 4 (February 8, 2021): 413. http://dx.doi.org/10.3390/electronics10040413.
Full textMasoumi, Massoud. "Novel Hybrid CMOS/Memristor Implementation of the AES Algorithm Robust Against Differential Power Analysis Attack." IEEE Transactions on Circuits and Systems II: Express Briefs 67, no. 7 (July 2020): 1314–18. http://dx.doi.org/10.1109/tcsii.2019.2932337.
Full textBansod, Gaurav, Narayan Pisharoty, and Abhijit Patil. "PICO : An Ultra Lightweight and Low Power Encryption Design for Ubiquitous Computing." Defence Science Journal 66, no. 3 (April 25, 2016): 259. http://dx.doi.org/10.14429/dsj.66.9276.
Full textHwang, D. D., K. Tiri, A. Hodjat, B. C. Lai, S. Yang, P. Schaumont, and I. Verbauwhede. "AES-Based Security Coprocessor IC in 0.18-<tex>$muhbox m$</tex>CMOS With Resistance to Differential Power Analysis Side-Channel Attacks." IEEE Journal of Solid-State Circuits 41, no. 4 (April 2006): 781–92. http://dx.doi.org/10.1109/jssc.2006.870913.
Full textLi, Huizhong, Yongbin Zhou, Jingdian Ming, Guang Yang, and Chengbin Jin. "The Notion of Transparency Order, Revisited." Computer Journal 63, no. 12 (July 3, 2020): 1915–38. http://dx.doi.org/10.1093/comjnl/bxaa069.
Full textArani, A. Tabatabaie, Ali Ghorbanpour Arani, and Reza Kolahchi. "Non-Newtonian pulsating blood flow-induced dynamic instability of visco-carotid artery within soft surrounding visco-tissue using differential cubature method." Proceedings of the Institution of Mechanical Engineers, Part C: Journal of Mechanical Engineering Science 229, no. 16 (January 7, 2015): 3002–12. http://dx.doi.org/10.1177/0954406214566038.
Full textZhang, Shuaiwei, and Weidong Zhong. "A New Type of Countermeasure against DPA in Multi-Sbox of Block Cipher." Wireless Communications and Mobile Computing 2018 (June 28, 2018): 1–11. http://dx.doi.org/10.1155/2018/5945312.
Full textSaber, Mohamed, and Esam Hagras. "Parallel multi-layer selector S-Box based on lorenz chaotic system with FPGA implementation." Indonesian Journal of Electrical Engineering and Computer Science 19, no. 2 (August 1, 2020): 784. http://dx.doi.org/10.11591/ijeecs.v19.i2.pp784-792.
Full textZhang, Yuanyuan, Ning Wu, Fang Zhou, Jinbao Zhang, and Muhammad Yahya. "A Countermeasure against DPA on SIMON with an Area-Efficient Structure." Electronics 8, no. 2 (February 20, 2019): 240. http://dx.doi.org/10.3390/electronics8020240.
Full textMatalytski, Mikhail. "ANALYSIS OF THE NETWORK WITH MULTIPLE CLASSES OF POSITIVE AND NEGATIVE CUSTOMERS AT A TRANSIENT REGIME." Probability in the Engineering and Informational Sciences 33, no. 2 (April 10, 2018): 172–85. http://dx.doi.org/10.1017/s0269964818000086.
Full textBarabash, O., and Y. Halakhov. "RESEARCH OF THE FUNCTION OF INTENSITY OF CYBER ATTACKS USING THE DEGREE OF P-TRANSFORMATION OF ANALYTICAL FUNCTION." Collection of scientific works of the Military Institute of Kyiv National Taras Shevchenko University, no. 66 (2019): 54–65. http://dx.doi.org/10.17721/2519-481x/2020/66-06.
Full textTang, Ming, ZhenLong Qiu, Si Gao, Mu Yi, ShuBo Liu, HuanGuo Zhang, and YingZhen Jin. "Polar differential power attacks and evaluation." Science China Information Sciences 55, no. 7 (April 20, 2012): 1588–604. http://dx.doi.org/10.1007/s11432-012-4588-5.
Full textUkrainczyk, Neven, Murugan Muthu, Oliver Vogt, and Eddie Koenders. "Geopolymer, Calcium Aluminate, and Portland Cement-Based Mortars: Comparing Degradation Using Acetic Acid." Materials 12, no. 19 (September 24, 2019): 3115. http://dx.doi.org/10.3390/ma12193115.
Full textPopp, Thomas, Stefan Mangard, and Elisabeth Oswald. "Power Analysis Attacks and Countermeasures." IEEE Design & Test of Computers 24, no. 6 (November 2007): 535–43. http://dx.doi.org/10.1109/mdt.2007.200.
Full textPopp, Thomas, Stefan Mangard, and Elisabeth Oswald. "Power analysis attacks and countermeasures." IEEE Design & Test of Computers 24, no. 99 (2007): x6. http://dx.doi.org/10.1109/mdt.2007.4343583.
Full textMatalytski, Mikhail, and Dmitry Kopats. "FINDING EXPECTED REVENUES IN G-NETWORK WITH SIGNALS AND CUSTOMERS BATCH REMOVAL." Probability in the Engineering and Informational Sciences 31, no. 4 (September 25, 2017): 561–75. http://dx.doi.org/10.1017/s0269964817000274.
Full text