Correlation-Enhanced Power Analysis Collision Attack. [Citation Graph (, )][DBLP]
On the Power of Power Analysis in the Real World: A Complete Break of the KeeLoqCode Hopping Scheme. [Citation Graph (, )][DBLP]
Differential Cache-Collision Timing Attacks on AES with Applications to Embedded CPUs. [Citation Graph (, )][DBLP]
Power Attacks Resistance of Cryptographic S-Boxes with Added Error Detection Circuits. [Citation Graph (, )][DBLP]
Can Knowledge Regarding the Presence of Countermeasures Against Fault Attacks Simplify Power Attacks on Cryptographic Devices?. [Citation Graph (, )][DBLP]
Establishing Chain of Trust in Reconfigurable Hardware. [Citation Graph (, )][DBLP]
KeeLoq and Side-Channel Analysis-Evolution of an Attack. [Citation Graph (, )][DBLP]
Power Analysis of Single-Rail Storage Elements as Used in MDPL. [Citation Graph (, )][DBLP]
Efficient implementation of eSTREAM ciphers on 8-bit AVR microcontrollers. [Citation Graph (, )][DBLP]
A Survey of Lightweight-Cryptography Implementations. [Citation Graph (, )][DBLP]
Search in 0.035secs, Finished in 0.037secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP