Detection of Counterfeit ICs Using Public Identification Sequences and Side-Channel Leakage. | 0 | 0.34 | 2019 |
Exploring Embedded Software with Side Channels and Fault Analysis | 0 | 0.34 | 2018 |
Practical Results of ECC Side Channel Countermeasures on an ARM Cortex M3 Processor | 0 | 0.34 | 2016 |
Fault-Channel Watermarks. | 0 | 0.34 | 2016 |
Remote IP Protection Using Timing Channels. | 1 | 0.43 | 2014 |
Efficient template attacks based on probabilistic multi-class support vector machines | 19 | 0.74 | 2012 |
A high-performance implementation of differential power analysis on graphics cards | 4 | 0.48 | 2011 |
On an Integration of an Information Security Management System into an Enterprise Architecture | 0 | 0.34 | 2010 |
Differential Cluster Analysis | 20 | 0.93 | 2009 |
Efficient implementation of eSTREAM ciphers on 8-bit AVR microcontrollers | 9 | 1.06 | 2008 |
Comparative Evaluation of Rank Correlation Based DPA on an AES Prototype Chip | 26 | 1.48 | 2008 |
E-Passport: cracking basic access control keys | 16 | 1.15 | 2007 |
Gaussian Mixture Models for Higher-Order Side Channel Analysis | 20 | 1.56 | 2007 |
Analyzing side channel leakage of masked implementations with stochastic methods | 16 | 0.88 | 2007 |
E-passport: the global traceability or how to feel like a UPS package | 23 | 2.06 | 2006 |
An adversarial model for fault analysis against low-cost cryptographic devices | 7 | 0.57 | 2006 |
Templates vs. stochastic methods | 63 | 3.40 | 2006 |