ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
Correlation power analysis attack of AES on FPGA using customized communication protocol
Proceedings of the Second International Conference on Computational Science, Engineering and Information Technology - CCSEIT '12
◽
10.1145/2393216.2393330
◽
2012
◽
Cited By ~ 3
Author(s):
N. Nalla Anandakumar
◽
S. Dillibabu
Keyword(s):
Power Analysis
◽
Communication Protocol
◽
Correlation Power Analysis
◽
Power Analysis Attack
Download Full-text
Related Documents
Cited By
References
Breaking Speck cryptosystem using correlation power analysis attack
Journal of the National Science Foundation of Sri Lanka
◽
10.4038/jnsfsr.v45i4.8233
◽
2017
◽
Vol 45
(4)
◽
pp. 393
◽
Cited By ~ 2
Author(s):
Hasindu Gamaarachchi
◽
Harsha Ganegoda
◽
Roshan Ragel
Keyword(s):
Power Analysis
◽
Correlation Power Analysis
◽
Power Analysis Attack
Download Full-text
Secure RSA implementation against horizontal correlation power analysis attack
International Journal of Internet Technology and Secured Transactions
◽
10.1504/ijitst.2018.10013304
◽
2018
◽
Vol 8
(1)
◽
pp. 62
Author(s):
Jaecheol Ha
◽
Soungwook Choi
◽
Dongwon Park
Keyword(s):
Power Analysis
◽
Correlation Power Analysis
◽
Power Analysis Attack
Download Full-text
Low Area-Overhead Low-Entropy Masking Scheme (LEMS) Against Correlation Power Analysis Attack
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems
◽
10.1109/tcad.2018.2802867
◽
2019
◽
Vol 38
(2)
◽
pp. 208-219
◽
Cited By ~ 2
Author(s):
Hai Huang
◽
Leibo Liu
◽
Qihuan Huang
◽
Yingjie Chen
◽
Shouyi Yin
◽
...
Keyword(s):
Power Analysis
◽
Low Area
◽
Area Overhead
◽
Correlation Power Analysis
◽
Low Entropy
◽
Power Analysis Attack
Download Full-text
Enhanced Correlation Power Analysis Attack on Smart Card
10.1109/icycs.2008.230
◽
2008
◽
Cited By ~ 9
Author(s):
Huiyun Li
◽
Keke Wu
◽
Bo Peng
◽
Yiwei Zhang
◽
Xinjian Zheng
◽
...
Keyword(s):
Smart Card
◽
Power Analysis
◽
Correlation Power Analysis
◽
Power Analysis Attack
Download Full-text
A Correlation Power Analysis Attack against Tate Pairing on FPGA
Lecture Notes in Computer Science - Reconfigurable Computing: Architectures, Tools and Applications
◽
10.1007/978-3-642-19475-7_36
◽
2011
◽
pp. 340-349
◽
Cited By ~ 5
Author(s):
Weibo Pan
◽
William P. Marnane
Keyword(s):
Power Analysis
◽
Tate Pairing
◽
Correlation Power Analysis
◽
Power Analysis Attack
Download Full-text
A simulation-based correlation power analysis attack to FPGA implementation of KASUMI block cipher
International Journal of Internet Technology and Secured Transactions
◽
10.1504/ijitst.2017.10008035
◽
2017
◽
Vol 7
(2)
◽
pp. 175
Author(s):
Sobhan Saie Moghadam
◽
Massoud Masoumi
Keyword(s):
Power Analysis
◽
Block Cipher
◽
Fpga Implementation
◽
Simulation Based
◽
Correlation Power Analysis
◽
Power Analysis Attack
Download Full-text
Bus-Invert Coding as a Low-Power Countermeasure Against Correlation Power Analysis Attack
2019 ACM/IEEE International Workshop on System Level Interconnect Prediction (SLIP)
◽
10.1109/slip.2019.8771332
◽
2019
◽
Cited By ~ 1
Author(s):
M. Ali Vosoughi
◽
Longfei Wang
◽
Selcuk Kose
Keyword(s):
Low Power
◽
Power Analysis
◽
Correlation Power Analysis
◽
Power Analysis Attack
Download Full-text
Correlation Power Analysis Attack on the Ping Pong-128 Key Stream Generator
2015 IEEE 29th International Conference on Advanced Information Networking and Applications
◽
10.1109/aina.2015.228
◽
2015
◽
Cited By ~ 1
Author(s):
Young-Jin Kang
◽
Hyun Ho Kim
◽
Ndibanje Bruce
◽
Younggoo Park
◽
Hoonjae Lee
Keyword(s):
Power Analysis
◽
Ping Pong
◽
Correlation Power Analysis
◽
Power Analysis Attack
Download Full-text
A novel correlation power analysis attack on PIC based AES-128 without access to crypto device
2017 IEEE 60th International Midwest Symposium on Circuits and Systems (MWSCAS)
◽
10.1109/mwscas.2017.8053174
◽
2017
◽
Author(s):
Oluwadara Adegbite
◽
Syed Rafay Hasan
Keyword(s):
Power Analysis
◽
Correlation Power Analysis
◽
Power Analysis Attack
Download Full-text
Enhanced correlation power analysis attack against trusted systems
Security and Communication Networks
◽
10.1002/sec.176
◽
2010
◽
Vol 4
(1)
◽
pp. 3-10
◽
Cited By ~ 4
Author(s):
Huiyun Li
◽
Keke Wu
◽
Fengqi Yu
Keyword(s):
Power Analysis
◽
Correlation Power Analysis
◽
Power Analysis Attack
Download Full-text
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close