An Implementation of DES and AES, Secure against Some Attacks, CHES, pp.309-318, 2001. ,
DOI : 10.1007/3-540-44709-1_26
Improved Side-Channel Collision Attacks on AES, Selected Areas in Cryptography -SAC 2007, pp.84-95, 2007. ,
DOI : 10.1007/978-3-540-77360-3_6
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.137.1652
Multiple-Differential Side-Channel Collision Attacks on AES, Cryptographic Hardware and Embedded Systems -CHES 2008, pp.30-44, 2008. ,
DOI : 10.1007/978-3-540-85053-3_3
Correlation Power Analysis with a Leakage Model, Cryptographic Hardware and Embedded Systems -CHES 2004, pp.16-29, 2004. ,
DOI : 10.1007/978-3-540-28632-5_2
A Very Compact ???Perfectly Masked??? S-Box for AES, Applied Cryptography and Network Security, 6th International Conference -ACNS 2008, pp.446-459, 2008. ,
DOI : 10.1007/978-3-540-68914-0_27
An Improved SCARE Cryptanalysis Against a Secret A3/A8 GSM Algorithm, International Conference on Information Systems Security - ICISS 2007, pp.143-155, 2007. ,
DOI : 10.1007/978-3-540-77086-2_11
Mutual Information Analysis, Cryptographic Hardware and Embedded Systems CHES 2008, pp.426-442, 2008. ,
DOI : 10.1007/978-3-540-85053-3_27
Multiplicative Masking and Power Analysis of AES, Cryptographic Hardware and Embedded Systems -CHES 2002, pp.198-212, 2002. ,
Differential Power Analysis, Advances in Cryptology -CRYPTO '99, pp.388-397, 1999. ,
DOI : 10.1007/3-540-48405-1_25
DES and Other Cryptographic Processes with Leak Minimization for Smartcards and other CryptoSystems, journal = US Patent, vol.6278, p.783, 1998. ,
Power Analysis Attacks: Revealing the Secrets of Smart Cards, 2007. ,
Successfully Attacking Masked AES Hardware Implementations, Cryptographic Hardware and Embedded Systems -CHES 2005, pp.157-171, 2005. ,
DOI : 10.1007/11545262_12
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.415.2680
Using Second-Order Power Analysis to Attack DPA Resistant Software, Cryptographic Hardware and Embedded Systems -CHES 2000, pp.238-251, 1965. ,
DOI : 10.1007/3-540-44499-8_19
Securing the AES Finalists Against Power Analysis Attacks, Fast Software Encryption, 7th International Workshop - FSE 2000, pp.150-164, 1978. ,
DOI : 10.1007/3-540-44706-7_11
Correlation-Enhanced Power Analysis Collision Attack, CHES, pp.125-139, 2010. ,
DOI : 10.1007/978-3-642-15031-9_9
A Side-Channel Analysis Resistant Description of the AES S-Box, Fast Software Encryption: 12th International Workshop, FSE 2005, pp.413-423, 2005. ,
DOI : 10.1007/11502760_28
Provably Secure Higher-Order Masking of AES, Cryptographic Hardware and Embedded Systems -CHES 2010, pp.413-427, 2010. ,
DOI : 10.1007/978-3-642-15031-9_28
A Collision-Attack on AES, Cryptographic Hardware and Embedded Systems -CHES 2004, pp.163-175, 2004. ,
DOI : 10.1007/978-3-540-28632-5_12
A New Class of Collision Attacks and Its Application to DES, Fast Software Encryption -FSE 2003, pp.206-222, 2003. ,
DOI : 10.1007/978-3-540-39887-5_16
A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks, Advances in Cryptology -EUROCRYPT 2009, pp.443-461, 2009. ,
DOI : 10.1007/978-3-540-85053-3_26
The World Is Not Enough: Another Look on Second-Order DPA, Advances in Cryptology -ASIACRYPT 2010, pp.112-129, 2010. ,
DOI : 10.1007/978-3-642-17373-8_7
Defeating rsa multiply-always and message blinding countermeasures, CT-RSA, pp.77-88, 2011. ,