Efficient Software Implementation of AES on 32-Bit Platforms, Cryptographic Hardware and Embedded Systems (ches), pp.159-171, 2002. ,
DOI : 10.1007/3-540-36400-5_13
Correlation Power Analysis with a Leakage Model, pp.16-29, 2004. ,
DOI : 10.1007/978-3-540-28632-5_2
Differential Power Analysis in the Presence of Hardware Countermeasures, Cryptographic Hardware and Embedded Systems (ches), pp.252-263, 1965. ,
DOI : 10.1007/3-540-44499-8_20
Watermarking, tamper-proofing, and obfuscation - tools for software protection, IEEE Transactions on Software Engineering, vol.28, issue.8, pp.735-746, 2002. ,
DOI : 10.1109/TSE.2002.1027797
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.19.6168
The Design of Rijndael, 2002. ,
DOI : 10.1007/978-3-662-04722-4
i-Hop Homomorphic Encryption and Rerandomizable Yao Circuits Advances in Cryptology crypto 2010, pp.155-172, 2010. ,
DOI : 10.1007/978-3-642-14623-7_9
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.470.281
An AES Smart Card Implementation Resistant to Power Analysis Attacks, Applied Cryptography and Network Security (accs), pp.239-252, 2006. ,
DOI : 10.1007/11767480_16
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.115.179
The Art of Computer Programming, Seminumerical Algorithms, vol.2, 1998. ,
Differential Power Analysis Advances in Cryptology crypto 1999, pp.388-397, 1999. ,
Nondeterministic Multithreading, IEEE Transactions on Computers, vol.56, issue.7, pp.992-998, 2007. ,
DOI : 10.1109/TC.2007.1049
generic and gimple: A new tree representation for entire functions, 2003. ,
Efficient Use of Random Delays in Embedded Software, Information Security Theory and Practices (wistp), pp.27-38, 2007. ,
Misleading Malware Similarities Analysis by Automatic Data Structure Obfuscation, isc 2010, Information Security, pp.181-195, 2011. ,
DOI : 10.1007/978-3-642-18178-8_16