An Implementation of DES and AES, Secure against Some Attacks, Cryptographic Hardware and Embedded Systems ? CHES 2001, pp.309-318, 2001. ,
DOI : 10.1007/3-540-44709-1_26
Keccak sponge function family main document Submission to NIST (Round 1) Threshold Implementations of All 3 ×3 and 4 ×4 S-Boxes, Cryptographic Hardware and Embedded Systems -CHES 2012, pp.76-91, 2008. ,
Threshold implementations of small S-boxes, Can16] Anne Canteaut. Lecture Notes on Cryptographic Boolean, pp.3-33, 2015. ,
DOI : 10.1109/DATE.2004.1268856
Towards Sound Approaches to Counteract Power-Analysis Attacks, Advances in Cryptology - CRYPTO '99, pp.398-412, 1999. ,
DOI : 10.1007/3-540-48405-1_26
Analysis and Design of Symmetric Encryption Algorithms [GP99] Louis Goubin and Jacques Patarin. DES and diierential power analysis (the "duplication" method), Cryptographic Hardware and Embedded Systems, CHES'99GU63] René Goscinny and Albert Uderzo. Astérix et Cléopatre. Dargaud, pp.158-172, 1963. ,
Timing Attacks on Implementations of Diie-Hellman, RSA, DSS, and Other Systems, Advances in Cryptology -CRYPTO '96, pp.104-113, 1996. ,
Successfully Attacking Masked AES Hardware Implementations, Cryptographic Hardware and Embedded Systems -CHES 2005, pp.157-171, 2005. ,
DOI : 10.1007/11545262_12
URL : http://www.iacr.org/cryptodb/archive/2005/CHES/583/583.pdf
The Theory of Error-Correcting Codes, 1977. ,
Threshold Implementations Against Side-Channel Attacks and Glitches, Information and Communications Security, pp.529-545, 2006. ,
DOI : 10.1007/11935308_38
Secure Hardware Implementation of Nonlinear Functions in the Presence of Glitches, Journal of Cryptology, vol.22, issue.11, pp.292-321, 2011. ,
DOI : 10.1145/359168.359176
Introduction to Side-Channel Attacks, Secure Integrated Circuits and Systems, pp.27-42 ,
DOI : 10.1007/978-0-387-71829-3_2