Search dblp for Publications

export results for "Differential power analysis"

 download as .bib file

@article{DBLP:journals/access/KumarJDM21,
  author    = {Abhishek Kumar and
               Bablesh Kumar Jha and
               Swagatam Das and
               Rammohan Mallipeddi},
  title     = {Power Flow Analysis of Islanded Microgrids: {A} Differential Evolution
               Approach},
  journal   = {{IEEE} Access},
  volume    = {9},
  pages     = {61721--61738},
  year      = {2021},
  url       = {https://doi.org/10.1109/ACCESS.2021.3073509},
  doi       = {10.1109/ACCESS.2021.3073509},
  timestamp = {Sun, 16 May 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/access/KumarJDM21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/bioinformatics/HoffmanR21,
  author    = {Gabriel E. Hoffman and
               Panos Roussos},
  title     = {Dream: powerful differential expression analysis for repeated measures
               designs},
  journal   = {Bioinform.},
  volume    = {37},
  number    = {2},
  pages     = {192--201},
  year      = {2021},
  url       = {https://doi.org/10.1093/bioinformatics/btaa687},
  doi       = {10.1093/bioinformatics/btaa687},
  timestamp = {Tue, 01 Jun 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/bioinformatics/HoffmanR21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/SimJB21,
  author    = {Siang Meng Sim and
               Dirmanto Jap and
               Shivam Bhasin},
  title     = {{DAPA:} Differential Analysis aided Power Attack on (Non-) Linear
               Feedback Shift Registers},
  journal   = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume    = {2021},
  number    = {1},
  pages     = {169--191},
  year      = {2021},
  url       = {https://doi.org/10.46586/tches.v2021.i1.169-191},
  doi       = {10.46586/tches.v2021.i1.169-191},
  timestamp = {Fri, 29 Jan 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tches/SimJB21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ChenNCLG21,
  author    = {Juncheng Chen and
               Jun{-}Sheng Ng and
               Kwen{-}Siong Chong and
               Zhiping Lin and
               Bah{-}Hwee Gwee},
  title     = {A Novel Normalized Variance-Based Differential Power Analysis Against
               Masking Countermeasures},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {16},
  pages     = {3767--3779},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIFS.2021.3093783},
  doi       = {10.1109/TIFS.2021.3093783},
  timestamp = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/ChenNCLG21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iscas/ChenNKLHCLCG21,
  author    = {Juncheng Chen and
               Jun{-}Sheng Ng and
               Nay Aung Kyaw and
               Ne Kyaw Zwa Lwin and
               Weng{-}Geng Ho and
               Kwen{-}Siong Chong and
               Zhiping Lin and
               Joseph Sylvester Chang and
               Bah{-}Hwee Gwee},
  title     = {Normalized Differential Power Analysis - for Ghost Peaks Mitigation},
  booktitle = {{IEEE} International Symposium on Circuits and Systems, {ISCAS} 2021,
               Daegu, South Korea, May 22-28, 2021},
  pages     = {1--5},
  publisher = {{IEEE}},
  year      = {2021},
  url       = {https://doi.org/10.1109/ISCAS51556.2021.9401487},
  doi       = {10.1109/ISCAS51556.2021.9401487},
  timestamp = {Fri, 02 Jul 2021 12:26:54 +0200},
  biburl    = {https://dblp.org/rec/conf/iscas/ChenNKLHCLCG21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pqcrypto/GellersenSE21,
  author    = {Tim Gellersen and
               Okan Seker and
               Thomas Eisenbarth},
  editor    = {Jung Hee Cheon and
               Jean{-}Pierre Tillich},
  title     = {Differential Power Analysis of the Picnic Signature Scheme},
  booktitle = {Post-Quantum Cryptography - 12th International Workshop, PQCrypto
               2021, Daejeon, South Korea, July 20-22, 2021, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {12841},
  pages     = {177--194},
  publisher = {Springer},
  year      = {2021},
  url       = {https://doi.org/10.1007/978-3-030-81293-5\_10},
  doi       = {10.1007/978-3-030-81293-5\_10},
  timestamp = {Wed, 21 Jul 2021 15:51:05 +0200},
  biburl    = {https://dblp.org/rec/conf/pqcrypto/GellersenSE21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2108-11115,
  author    = {Behrooz Khadem and
               Hamid Ghanbari and
               Amin Masoumi Souteh},
  title     = {Correlation Differential Power Analysis Attack to Midori64},
  journal   = {CoRR},
  volume    = {abs/2108.11115},
  year      = {2021},
  url       = {https://arxiv.org/abs/2108.11115},
  eprinttype = {arXiv},
  eprint    = {2108.11115},
  timestamp = {Fri, 27 Aug 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/corr/abs-2108-11115.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/CaiLKT20,
  author    = {Xiaomin Cai and
               Renfa Li and
               Shijie Kuang and
               Jinhui Tan},
  title     = {An Energy Trace Compression Method for Differential Power Analysis
               Attack},
  journal   = {{IEEE} Access},
  volume    = {8},
  pages     = {89084--89092},
  year      = {2020},
  url       = {https://doi.org/10.1109/ACCESS.2020.2993701},
  doi       = {10.1109/ACCESS.2020.2993701},
  timestamp = {Tue, 16 Jun 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/access/CaiLKT20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/bmcbi/YuFB20,
  author    = {Lianbo Yu and
               Soledad Fernandez and
               Guy N. Brock},
  title     = {Power analysis for RNA-Seq differential expression studies using generalized
               linear mixed effects models},
  journal   = {{BMC} Bioinform.},
  volume    = {21},
  number    = {1},
  pages     = {198},
  year      = {2020},
  url       = {https://doi.org/10.1186/s12859-020-3541-7},
  doi       = {10.1186/s12859-020-3541-7},
  timestamp = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/bmcbi/YuFB20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcas/Masoumi20,
  author    = {Massoud Masoumi},
  title     = {Novel Hybrid CMOS/Memristor Implementation of the {AES} Algorithm
               Robust Against Differential Power Analysis Attack},
  journal   = {{IEEE} Trans. Circuits Syst. {II} Express Briefs},
  volume    = {67-II},
  number    = {7},
  pages     = {1314--1318},
  year      = {2020},
  url       = {https://doi.org/10.1109/TCSII.2019.2932337},
  doi       = {10.1109/TCSII.2019.2932337},
  timestamp = {Thu, 08 Oct 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tcas/Masoumi20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tvlsi/DodoBT20,
  author    = {Samir Ben Dodo and
               Rajendra Bishnoi and
               Mehdi Baradaran Tahoori},
  title     = {Secure {STT-MRAM} Bit-Cell Design Resilient to Differential Power
               Analysis Attacks},
  journal   = {{IEEE} Trans. Very Large Scale Integr. Syst.},
  volume    = {28},
  number    = {1},
  pages     = {263--272},
  year      = {2020},
  url       = {https://doi.org/10.1109/TVLSI.2019.2940449},
  doi       = {10.1109/TVLSI.2019.2940449},
  timestamp = {Wed, 11 Mar 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tvlsi/DodoBT20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icete/Negre20,
  author    = {Christophe N{\`{e}}gre},
  editor    = {Pierangela Samarati and
               Sabrina De Capitani di Vimercati and
               Mohammad S. Obaidat and
               Jalel Ben{-}Othman},
  title     = {Address-bit Differential Power Analysis on Boolean Split Exponent
               Counter-measure},
  booktitle = {Proceedings of the 17th International Joint Conference on e-Business
               and Telecommunications, {ICETE} 2020 - Volume 2: SECRYPT, Lieusaint,
               Paris, France, July 8-10, 2020},
  pages     = {632--637},
  publisher = {ScitePress},
  year      = {2020},
  url       = {https://doi.org/10.5220/0009891306320637},
  doi       = {10.5220/0009891306320637},
  timestamp = {Wed, 29 Jul 2020 16:57:35 +0200},
  biburl    = {https://dblp.org/rec/conf/icete/Negre20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GellersenSE20,
  author    = {Tim Gellersen and
               Okan Seker and
               Thomas Eisenbarth},
  title     = {Differential Power Analysis of the Picnic Signature Scheme},
  journal   = {{IACR} Cryptol. ePrint Arch.},
  pages     = {267},
  year      = {2020},
  url       = {https://eprint.iacr.org/2020/267},
  timestamp = {Mon, 11 May 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/iacr/GellersenSE20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Lathrop20,
  author    = {Leah Lathrop},
  title     = {Differential Power Analysis Attacks on Different Implementations of
               {AES} with the ChipWhisperer Nano},
  journal   = {{IACR} Cryptol. ePrint Arch.},
  pages     = {1008},
  year      = {2020},
  url       = {https://eprint.iacr.org/2020/1008},
  timestamp = {Wed, 02 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/iacr/Lathrop20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Sim20,
  author    = {Siang Meng Sim},
  title     = {Differential Power Analysis on (Non-)Linear Feedback Shift Registers},
  journal   = {{IACR} Cryptol. ePrint Arch.},
  pages     = {349},
  year      = {2020},
  url       = {https://eprint.iacr.org/2020/349},
  timestamp = {Mon, 11 May 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/iacr/Sim20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SimJB20,
  author    = {Siang Meng Sim and
               Dirmanto Jap and
               Shivam Bhasin},
  title     = {{DAPA:} Differential Analysis aided Power Attack on (Non-)Linear Feedback
               Shift Registers (Extended version)},
  journal   = {{IACR} Cryptol. ePrint Arch.},
  pages     = {1241},
  year      = {2020},
  url       = {https://eprint.iacr.org/2020/1241},
  timestamp = {Fri, 30 Oct 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/iacr/SimJB20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-cds/SainiG19,
  author    = {Harjap Saini and
               Anu Gupta},
  title     = {Constant power consumption design of novel differential logic gate
               for immunity against differential power analysis},
  journal   = {{IET} Circuits Devices Syst.},
  volume    = {13},
  number    = {1},
  pages     = {103--109},
  year      = {2019},
  url       = {https://doi.org/10.1049/iet-cds.2018.5093},
  doi       = {10.1049/iet-cds.2018.5093},
  timestamp = {Thu, 31 Dec 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/iet-cds/SainiG19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcta/AskariS19,
  author    = {Shirin Askari and
               Mohsen Saneei},
  title     = {Design and analysis of differential ring voltage controlled oscillator
               for wide tuning range and low power applications},
  journal   = {Int. J. Circuit Theory Appl.},
  volume    = {47},
  number    = {2},
  pages     = {204--216},
  year      = {2019},
  url       = {https://doi.org/10.1002/cta.2582},
  doi       = {10.1002/cta.2582},
  timestamp = {Mon, 11 May 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijcta/AskariS19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gcce/TakemotoNY19,
  author    = {Shu Takemoto and
               Yusuke Nozaki and
               Masaya Yoshikawa},
  title     = {Evaluation of the Hiding-Countermeasure {PRINCE} Using Differential
               Power Analysis},
  booktitle = {{IEEE} 8th Global Conference on Consumer Electronics, {GCCE} 2019,
               Osaka, Japan, October 15-18, 2019},
  pages     = {164--165},
  publisher = {{IEEE}},
  year      = {2019},
  url       = {https://doi.org/10.1109/GCCE46687.2019.9015513},
  doi       = {10.1109/GCCE46687.2019.9015513},
  timestamp = {Sun, 08 Mar 2020 16:12:27 +0100},
  biburl    = {https://dblp.org/rec/conf/gcce/TakemotoNY19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iscas/SainiG19,
  author    = {Harjap Singh Saini and
               Anu Gupta},
  title     = {Differential Power Analysis Immune Design of FinFET Based Novel Differential
               Logic Gate},
  booktitle = {{IEEE} International Symposium on Circuits and Systems, {ISCAS} 2019,
               Sapporo, Japan, May 26-29, 2019},
  pages     = {1--5},
  publisher = {{IEEE}},
  year      = {2019},
  url       = {https://doi.org/10.1109/ISCAS.2019.8702598},
  doi       = {10.1109/ISCAS.2019.8702598},
  timestamp = {Wed, 16 Oct 2019 14:14:49 +0200},
  biburl    = {https://dblp.org/rec/conf/iscas/SainiG19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/itw/GrigorescuB19,
  author    = {Andrea Grigorescu and
               Holger Boche},
  title     = {Differential Power Analysis Attacks from an Information-Theoretic
               Perspective},
  booktitle = {2019 {IEEE} Information Theory Workshop, {ITW} 2019, Visby, Sweden,
               August 25-28, 2019},
  pages     = {1--5},
  publisher = {{IEEE}},
  year      = {2019},
  url       = {https://doi.org/10.1109/ITW44776.2019.8989406},
  doi       = {10.1109/ITW44776.2019.8989406},
  timestamp = {Tue, 18 Feb 2020 15:54:58 +0100},
  biburl    = {https://dblp.org/rec/conf/itw/GrigorescuB19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/dnb/Kusters18,
  author    = {Ferdinand K{\"{u}}sters},
  title     = {Switch Observability for Differential-Algebraic Systems.: Analysis,
               Observer Design and Application to Power Networks},
  school    = {Kaiserslautern University of Technology, Germany},
  year      = {2018},
  url       = {https://d-nb.info/1165166232},
  isbn      = {978-3-8396-1374-0},
  timestamp = {Sat, 17 Jul 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/phd/dnb/Kusters18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computers/DiehlAKG18,
  author    = {William Diehl and
               Abubakr Abdulgadir and
               Jens{-}Peter Kaps and
               Kris Gaj},
  title     = {Comparing the Cost of Protecting Selected Lightweight Block Ciphers
               against Differential Power Analysis in Low-Cost FPGAs},
  journal   = {Comput.},
  volume    = {7},
  number    = {2},
  pages     = {28},
  year      = {2018},
  url       = {https://doi.org/10.3390/computers7020028},
  doi       = {10.3390/computers7020028},
  timestamp = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/computers/DiehlAKG18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/DiehlAFKG18,
  author    = {William Diehl and
               Abubakr Abdulgadir and
               Farnoud Farahmand and
               Jens{-}Peter Kaps and
               Kris Gaj},
  title     = {Comparison of Cost of Protection against Differential Power Analysis
               of Selected Authenticated Ciphers},
  journal   = {Cryptogr.},
  volume    = {2},
  number    = {3},
  pages     = {26},
  year      = {2018},
  url       = {https://doi.org/10.3390/cryptography2030026},
  doi       = {10.3390/cryptography2030026},
  timestamp = {Fri, 03 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/cryptography/DiehlAFKG18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-cdt/KaediDG18,
  author    = {Saman Kaedi and
               Mohammad{-}Ali Doostari and
               Mohammad Bagher Ghaznavi Ghoushchi},
  title     = {Low-complexity and differential power analysis (DPA)-resistant two-folded
               power-aware Rivest-Shamir-Adleman {(RSA)} security schema implementation
               for IoT-connected devices},
  journal   = {{IET} Comput. Digit. Tech.},
  volume    = {12},
  number    = {6},
  pages     = {279--288},
  year      = {2018},
  url       = {https://doi.org/10.1049/iet-cdt.2018.5098},
  doi       = {10.1049/iet-cdt.2018.5098},
  timestamp = {Tue, 14 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/iet-cdt/KaediDG18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcam/BurgosCVV18,
  author    = {Clara Burgos and
               Juan Carlos Cort{\'{e}}s and
               Laura Villafuerte and
               Rafael J. Villanueva},
  title     = {Solving random mean square fractional linear differential equations
               by generalized power series: Analysis and computing},
  journal   = {J. Comput. Appl. Math.},
  volume    = {339},
  pages     = {94--110},
  year      = {2018},
  url       = {https://doi.org/10.1016/j.cam.2017.12.042},
  doi       = {10.1016/j.cam.2017.12.042},
  timestamp = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/jcam/BurgosCVV18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jolpe/SasipriyaS18,
  author    = {P. Sasipriya and
               Kanchana Bhaaskaran Vettuvanam Somasundaram},
  title     = {Design and Analysis of Clocked {CMOS} Differential Adiabatic Logic
               {(CCDAL)} for Low Power},
  journal   = {J. Low Power Electron.},
  volume    = {14},
  number    = {4},
  pages     = {548--557},
  year      = {2018},
  url       = {https://doi.org/10.1166/jolpe.2018.1578},
  doi       = {10.1166/jolpe.2018.1578},
  timestamp = {Fri, 22 May 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jolpe/SasipriyaS18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcas/MohammadnezhadW18,
  author    = {Hossein Mohammadnezhad and
               Huan Wang and
               Payam Heydari},
  title     = {Analysis and Design of a Wideband, Balun-Based, Differential Power
               Splitter at mm-Wave},
  journal   = {{IEEE} Trans. Circuits Syst. {II} Express Briefs},
  volume    = {65-II},
  number    = {11},
  pages     = {1629--1633},
  year      = {2018},
  url       = {https://doi.org/10.1109/TCSII.2017.2766141},
  doi       = {10.1109/TCSII.2017.2766141},
  timestamp = {Wed, 27 May 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tcas/MohammadnezhadW18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/WangYSLGG18,
  author    = {Weijia Wang and
               Yu Yu and
               Fran{\c{c}}ois{-}Xavier Standaert and
               Junrong Liu and
               Zheng Guo and
               Dawu Gu},
  title     = {Ridge-Based {DPA:} Improvement of Differential Power Analysis For
               Nanoscale Chips},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {13},
  number    = {5},
  pages     = {1301--1316},
  year      = {2018},
  url       = {https://doi.org/10.1109/TIFS.2017.2787985},
  doi       = {10.1109/TIFS.2017.2787985},
  timestamp = {Mon, 19 Sep 2022 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tifs/WangYSLGG18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cosade/KannwischerGBK018,
  author    = {Matthias J. Kannwischer and
               Aymeric Gen{\^{e}}t and
               Denis Butin and
               Juliane Kr{\"{a}}mer and
               Johannes Buchmann},
  editor    = {Junfeng Fan and
               Benedikt Gierlichs},
  title     = {Differential Power Analysis of {XMSS} and {SPHINCS}},
  booktitle = {Constructive Side-Channel Analysis and Secure Design - 9th International
               Workshop, {COSADE} 2018, Singapore, April 23-24, 2018, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {10815},
  pages     = {168--188},
  publisher = {Springer},
  year      = {2018},
  url       = {https://doi.org/10.1007/978-3-319-89641-0\_10},
  doi       = {10.1007/978-3-319-89641-0\_10},
  timestamp = {Tue, 14 May 2019 10:00:39 +0200},
  biburl    = {https://dblp.org/rec/conf/cosade/KannwischerGBK018.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/host/DiehlAFKG18,
  author    = {William Diehl and
               Abubakr Abdulgadir and
               Farnoud Farahmand and
               Jens{-}Peter Kaps and
               Kris Gaj},
  title     = {Comparison of cost of protection against differential power analysis
               of selected authenticated ciphers},
  booktitle = {2018 {IEEE} International Symposium on Hardware Oriented Security
               and Trust, {HOST} 2018, Washington, DC, USA, April 30 - May 4, 2018},
  pages     = {147--152},
  publisher = {{IEEE} Computer Society},
  year      = {2018},
  url       = {https://doi.org/10.1109/HST.2018.8383904},
  doi       = {10.1109/HST.2018.8383904},
  timestamp = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/conf/host/DiehlAFKG18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccsp/ZhangQL18,
  author    = {Yang Zhang and
               Hou{-}de Quan and
               Xiong{-}wei Li},
  title     = {Data Activated Processor Hardware Trojan Detection Using Differential
               Bit Power Analysis},
  booktitle = {Proceedings of the 2nd International Conference on Cryptography, Security
               and Privacy, {ICCSP} 2018, Guiyang, China, March 16-19, 2018},
  pages     = {134--137},
  publisher = {{ACM}},
  year      = {2018},
  url       = {https://doi.org/10.1145/3199478.3199480},
  doi       = {10.1145/3199478.3199480},
  timestamp = {Sat, 01 Jan 2022 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/conf/iccsp/ZhangQL18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icecsys/LimaFCMJS18,
  author    = {Vitor G. Lima and
               Plinio Finkenauer and
               Vinicius V. Camargo and
               Felipe S. Marques and
               Leomar R. Junior and
               Rafael Iankowski Soares},
  title     = {A Novel Sizing Method Aiming Security Against Differential Power Analysis},
  booktitle = {25th {IEEE} International Conference on Electronics, Circuits and
               Systems, {ICECS} 2018, Bordeaux, France, December 9-12, 2018},
  pages     = {429--432},
  publisher = {{IEEE}},
  year      = {2018},
  url       = {https://doi.org/10.1109/ICECS.2018.8617849},
  doi       = {10.1109/ICECS.2018.8617849},
  timestamp = {Tue, 15 Mar 2022 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/conf/icecsys/LimaFCMJS18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/meco/MiskovskyKN18,
  author    = {Vojtech Miskovsk{\'{y}} and
               Hana Kub{\'{a}}tov{\'{a}} and
               Martin Novotn{\'{y}}},
  title     = {Speeding up differential power analysis using integrated power traces},
  booktitle = {7th Mediterranean Conference on Embedded Computing, {MECO} 2018, Budva,
               Montenegro, June 10-14, 2018},
  pages     = {1--5},
  publisher = {{IEEE}},
  year      = {2018},
  url       = {https://doi.org/10.1109/MECO.2018.8406012},
  doi       = {10.1109/MECO.2018.8406012},
  timestamp = {Mon, 09 Aug 2021 14:54:01 +0200},
  biburl    = {https://dblp.org/rec/conf/meco/MiskovskyKN18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/XuFLS18,
  author    = {Jiaming Xu and
               Ao Fan and
               Minyi Lu and
               Weiwei Shan},
  title     = {Differential Power Analysis of 8-Bit Datapath {AES} for IoT Applications},
  booktitle = {17th {IEEE} International Conference On Trust, Security And Privacy
               In Computing And Communications / 12th {IEEE} International Conference
               On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
               York, NY, USA, August 1-3, 2018},
  pages     = {1470--1473},
  publisher = {{IEEE}},
  year      = {2018},
  url       = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00205},
  doi       = {10.1109/TrustCom/BigDataSE.2018.00205},
  timestamp = {Wed, 16 Oct 2019 14:14:49 +0200},
  biburl    = {https://dblp.org/rec/conf/trustcom/XuFLS18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vlsi/GiacominG18,
  author    = {Edouard Giacomin and
               Pierre{-}Emmanuel Gaillardon},
  title     = {Differential Power Analysis Mitigation Technique Using Three-Independent-Gate
               Field Effect Transistors},
  booktitle = {{IFIP/IEEE} International Conference on Very Large Scale Integration,
               VLSI-SoC 2018, Verona, Italy, October 8-10, 2018},
  pages     = {107--112},
  publisher = {{IEEE}},
  year      = {2018},
  url       = {https://doi.org/10.1109/VLSI-SoC.2018.8644747},
  doi       = {10.1109/VLSI-SoC.2018.8644747},
  timestamp = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/conf/vlsi/GiacominG18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DiehlAFKG18,
  author    = {William Diehl and
               Abubakr Abdulgadir and
               Farnoud Farahmand and
               Jens{-}Peter Kaps and
               Kris Gaj},
  title     = {Comparison of Cost of Protection Against Differential Power Analysis
               of Selected Authenticated Ciphers},
  journal   = {{IACR} Cryptol. ePrint Arch.},
  pages     = {341},
  year      = {2018},
  url       = {https://eprint.iacr.org/2018/341},
  timestamp = {Mon, 11 May 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/iacr/DiehlAFKG18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KannwischerGBKB18,
  author    = {Matthias J. Kannwischer and
               Aymeric Gen{\^{e}}t and
               Denis Butin and
               Juliane Kr{\"{a}}mer and
               Johannes Buchmann},
  title     = {Differential Power Analysis of {XMSS} and {SPHINCS}},
  journal   = {{IACR} Cryptol. ePrint Arch.},
  pages     = {673},
  year      = {2018},
  url       = {https://eprint.iacr.org/2018/673},
  timestamp = {Mon, 11 May 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/iacr/KannwischerGBKB18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/bioinformatics/DonaPMKS17,
  author    = {Malathi S. I. Dona and
               Luke A. Prendergast and
               Suresh Mathivanan and
               Shivakumar Keerthikumar and
               Agus Salim},
  title     = {Powerful differential expression analysis incorporating network topology
               for next-generation sequencing data},
  journal   = {Bioinform.},
  volume    = {33},
  number    = {10},
  pages     = {1505--1513},
  year      = {2017},
  url       = {https://doi.org/10.1093/bioinformatics/btw833},
  doi       = {10.1093/bioinformatics/btw833},
  timestamp = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/bioinformatics/DonaPMKS17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/bmcbi/YuFB17,
  author    = {Lianbo Yu and
               Soledad Fernandez and
               Guy N. Brock},
  title     = {Power analysis for RNA-Seq differential expression studies},
  journal   = {{BMC} Bioinform.},
  volume    = {18},
  number    = {1},
  pages     = {234:1--234:9},
  year      = {2017},
  url       = {https://doi.org/10.1186/s12859-017-1648-2},
  doi       = {10.1186/s12859-017-1648-2},
  timestamp = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/bmcbi/YuFB17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mam/MiskovskyKN17,
  author    = {Vojtech Miskovsk{\'{y}} and
               Hana Kub{\'{a}}tov{\'{a}} and
               Martin Novotn{\'{y}}},
  title     = {Influence of passive hardware redundancy on differential power analysis
               resistance of {AES} cipher implemented in {FPGA}},
  journal   = {Microprocess. Microsystems},
  volume    = {51},
  pages     = {220--226},
  year      = {2017},
  url       = {https://doi.org/10.1016/j.micpro.2017.04.014},
  doi       = {10.1016/j.micpro.2017.04.014},
  timestamp = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/mam/MiskovskyKN17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/WangYSGSZ17,
  author    = {Weijia Wang and
               Yu Yu and
               Fran{\c{c}}ois{-}Xavier Standaert and
               Dawu Gu and
               Sen Xu and
               Chi Zhang},
  editor    = {Helena Handschuh},
  title     = {Ridge-Based Profiled Differential Power Analysis},
  booktitle = {Topics in Cryptology - {CT-RSA} 2017 - The Cryptographers' Track at
               the {RSA} Conference 2017, San Francisco, CA, USA, February 14-17,
               2017, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {10159},
  pages     = {347--362},
  publisher = {Springer},
  year      = {2017},
  url       = {https://doi.org/10.1007/978-3-319-52153-4\_20},
  doi       = {10.1007/978-3-319-52153-4\_20},
  timestamp = {Mon, 19 Sep 2022 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/conf/ctrsa/WangYSGSZ17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fpt/DiehlAKG17,
  author    = {William Diehl and
               Abubakr Abdulgadir and
               Jens{-}Peter Kaps and
               Kris Gaj},
  title     = {Comparing the cost of protecting selected lightweight block ciphers
               against differential power analysis in low-cost FPGAs},
  booktitle = {International Conference on Field Programmable Technology, {FPT} 2017,
               Melbourne, Australia, December 11-13, 2017},
  pages     = {128--135},
  publisher = {{IEEE}},
  year      = {2017},
  url       = {https://doi.org/10.1109/FPT.2017.8280130},
  doi       = {10.1109/FPT.2017.8280130},
  timestamp = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/conf/fpt/DiehlAKG17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isgteurope/LiJBYLL17,
  author    = {Yanbin Li and
               Ke Jia and
               Tianshu Bi and
               Renfu Yan and
               Wei Li and
               Bohan Liu},
  title     = {Analysis of line current differential protection considering inverter-interfaced
               renewable energy power plants},
  booktitle = {2017 {IEEE} {PES} Innovative Smart Grid Technologies Conference Europe,
               ISGT-Europe 2017, Torino, Italy, September 26-29, 2017},
  pages     = {1--6},
  publisher = {{IEEE}},
  year      = {2017},
  url       = {https://doi.org/10.1109/ISGTEurope.2017.8260157},
  doi       = {10.1109/ISGTEurope.2017.8260157},
  timestamp = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/conf/isgteurope/LiJBYLL17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/meco/MazurN17,
  author    = {Lukas Mazur and
               Martin Novotn{\'{y}}},
  title     = {Differential power analysis on {FPGA} board: Boundaries of success},
  booktitle = {6th Mediterranean Conference on Embedded Computing, {MECO} 2017, Bar,
               Montenegro, June 11-15, 2017},
  pages     = {1--4},
  publisher = {{IEEE}},
  year      = {2017},
  url       = {https://doi.org/10.1109/MECO.2017.7977168},
  doi       = {10.1109/MECO.2017.7977168},
  timestamp = {Mon, 09 Aug 2021 14:54:01 +0200},
  biburl    = {https://dblp.org/rec/conf/meco/MazurN17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cmmm/AllahyariJB16,
  author    = {Elahe Allahyari and
               Peyman Jafari and
               Zahra Bagheri},
  title     = {A Simulation Study to Assess the Effect of the Number of Response
               Categories on the Power of Ordinal Logistic Regression for Differential
               Item Functioning Analysis in Rating Scales},
  journal   = {Comput. Math. Methods Medicine},
  volume    = {2016},
  pages     = {5080826:1--5080826:8},
  year      = {2016},
  url       = {https://doi.org/10.1155/2016/5080826},
  doi       = {10.1155/2016/5080826},
  timestamp = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/cmmm/AllahyariJB16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/TangJW16,
  author    = {Wenyi Tang and
               Song Jia and
               Yuan Wang},
  title     = {A Short-Time Three-Phase Single-Rail Precharge Logic against Differential
               Power Analysis},
  journal   = {{IEICE} Trans. Electron.},
  volume    = {99-C},
  number    = {8},
  pages     = {956--962},
  year      = {2016},
  url       = {https://doi.org/10.1587/transele.E99.C.956},
  doi       = {10.1587/transele.E99.C.956},
  timestamp = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ieicet/TangJW16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcta/CenturelliMT16,
  author    = {Francesco Centurelli and
               Pietro Monsurr{\`{o}} and
               Alessandro Trifiletti},
  title     = {Comparative performance analysis and complementary triode based {CMFB}
               circuits for fully differential class {AB} symmetrical OTAs with low
               power consumption},
  journal   = {Int. J. Circuit Theory Appl.},
  volume    = {44},
  number    = {5},
  pages     = {1039--1054},
  year      = {2016},
  url       = {https://doi.org/10.1002/cta.2123},
  doi       = {10.1002/cta.2123},
  timestamp = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijcta/CenturelliMT16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEssd/AbdelmoulaMR16,
  author    = {Mohamed Abdelmoula and
               Said Moughamir and
               Bruno Robert},
  title     = {Analysis and implementation of nonlinear implicit differential-algebraic
               equations solver: Application to a photovoltaic power system},
  booktitle = {13th International Multi-Conference on Systems, Signals {\&} Devices,
               {SSD} 2016, Leipzig, Germany, March 21-24, 2016},
  pages     = {735--741},
  publisher = {{IEEE}},
  year      = {2016},
  url       = {https://doi.org/10.1109/SSD.2016.7473766},
  doi       = {10.1109/SSD.2016.7473766},
  timestamp = {Mon, 09 Aug 2021 14:54:04 +0200},
  biburl    = {https://dblp.org/rec/conf/IEEEssd/AbdelmoulaMR16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aspdac/JiangEP0B16,
  author    = {Ke Jiang and
               Petru Eles and
               Zebo Peng and
               Sudipta Chattopadhyay and
               Lejla Batina},
  title     = {{SPARTA:} {A} scheduling policy for thwarting differential power analysis
               attacks},
  booktitle = {21st Asia and South Pacific Design Automation Conference, {ASP-DAC}
               2016, Macao, Macao, January 25-28, 2016},
  pages     = {667--672},
  publisher = {{IEEE}},
  year      = {2016},
  url       = {https://doi.org/10.1109/ASPDAC.2016.7428088},
  doi       = {10.1109/ASPDAC.2016.7428088},
  timestamp = {Wed, 16 Oct 2019 14:14:52 +0200},
  biburl    = {https://dblp.org/rec/conf/aspdac/JiangEP0B16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cans/SpainV16,
  author    = {Merrielle Spain and
               Mayank Varia},
  editor    = {Sara Foresti and
               Giuseppe Persiano},
  title     = {Diversity Within the Rijndael Design Principles for Resistance to
               Differential Power Analysis},
  booktitle = {Cryptology and Network Security - 15th International Conference, {CANS}
               2016, Milan, Italy, November 14-16, 2016, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {10052},
  pages     = {71--87},
  year      = {2016},
  url       = {https://doi.org/10.1007/978-3-319-48965-0\_5},
  doi       = {10.1007/978-3-319-48965-0\_5},
  timestamp = {Tue, 14 May 2019 10:00:50 +0200},
  biburl    = {https://dblp.org/rec/conf/cans/SpainV16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isicir/HoPLNCG16,
  author    = {Weng{-}Geng Ho and
               Ali Akbar Pammu and
               Nan Liu and
               Kyaw Zwa Lwin Ne and
               Kwen{-}Siong Chong and
               Bah{-}Hwee Gwee},
  title     = {Security analysis of asynchronous-logic {QDI} cell approach for differential
               power analysis attack},
  booktitle = {International Symposium on Integrated Circuits, {ISIC} 2016, Singapore,
               December 12-14, 2016},
  pages     = {1--4},
  publisher = {{IEEE}},
  year      = {2016},
  url       = {https://doi.org/10.1109/ISICIR.2016.7829712},
  doi       = {10.1109/ISICIR.2016.7829712},
  timestamp = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/conf/isicir/HoPLNCG16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/meco/MiskovskyKN16,
  author    = {Vojtech Miskovsk{\'{y}} and
               Hana Kub{\'{a}}tov{\'{a}} and
               Martin Novotn{\'{y}}},
  title     = {Influence of fault-tolerant design methods on differential power analysis
               resistance of {AES} cipher: Methodics and challenges},
  booktitle = {5th Mediterranean Conference on Embedded Computing, {MECO} 2016, Bar,
               Montenegro, June 12-16, 2016},
  pages     = {14--17},
  publisher = {{IEEE}},
  year      = {2016},
  url       = {https://doi.org/10.1109/MECO.2016.7525685},
  doi       = {10.1109/MECO.2016.7525685},
  timestamp = {Mon, 09 Aug 2021 14:54:01 +0200},
  biburl    = {https://dblp.org/rec/conf/meco/MiskovskyKN16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SpainV16,
  author    = {Merrielle Spain and
               Mayank Varia},
  title     = {Evolving S-Boxes with Reduced Differential Power Analysis Susceptibility},
  journal   = {{IACR} Cryptol. ePrint Arch.},
  pages     = {1145},
  year      = {2016},
  url       = {http://eprint.iacr.org/2016/1145},
  timestamp = {Mon, 11 May 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/iacr/SpainV16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/basesearch/Bilgin15,
  author    = {Beg{\"{u}}l Bilgin},
  title     = {Threshold implementations : as countermeasure against higher-order
               differential power analysis},
  school    = {University of Twente, Enschede, Netherlands},
  year      = {2015},
  url       = {http://purl.utwente.nl/publications/95796},
  timestamp = {Thu, 11 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/phd/basesearch/Bilgin15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcon/LlibreSM15,
  author    = {Jaume Llibre and
               Mario Spinetti{-}Rivera and
               Eli{\'{e}}zer Colina Morles},
  title     = {Dynamic systems behaviour analysis and design based on the qualitative
               theory of differential equations: the Boost power converter case},
  journal   = {Int. J. Control},
  volume    = {88},
  number    = {6},
  pages     = {1103--1111},
  year      = {2015},
  url       = {https://doi.org/10.1080/00207179.2014.994037},
  doi       = {10.1080/00207179.2014.994037},
  timestamp = {Wed, 17 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijcon/LlibreSM15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsci/RajaramV15,
  author    = {M. Rajaram and
               J. Vijaya},
  title     = {A Defense Mechanism for Differential Power Analysis Attack in {AES}},
  journal   = {J. Comput. Sci.},
  volume    = {11},
  number    = {2},
  pages     = {291--296},
  year      = {2015},
  url       = {https://doi.org/10.3844/jcssp.2015.291.296},
  doi       = {10.3844/jcssp.2015.291.296},
  timestamp = {Sat, 25 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jcsci/RajaramV15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/MasoumiR15,
  author    = {Massoud Masoumi and
               Mohammad Hadi Rezayati},
  title     = {Novel Approach to Protect Advanced Encryption Standard Algorithm Implementation
               Against Differential Electromagnetic and Power Analysis},
  journal   = {{IEEE} Trans. Inf. Forensics Secur.},
  volume    = {10},
  number    = {2},
  pages     = {256--265},
  year      = {2015},
  url       = {https://doi.org/10.1109/TIFS.2014.2371237},
  doi       = {10.1109/TIFS.2014.2371237},
  timestamp = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tifs/MasoumiR15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tvlsi/AvitalDKF15,
  author    = {Moshe Avital and
               Hadar Dagan and
               Osnat Keren and
               Alexander Fish},
  title     = {Randomized Multitopology Logic Against Differential Power Analysis},
  journal   = {{IEEE} Trans. Very Large Scale Integr. Syst.},
  volume    = {23},
  number    = {4},
  pages     = {702--711},
  year      = {2015},
  url       = {https://doi.org/10.1109/TVLSI.2014.2320154},
  doi       = {10.1109/TVLSI.2014.2320154},
  timestamp = {Wed, 11 Mar 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tvlsi/AvitalDKF15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/ChenEMS15,
  author    = {Cong Chen and
               Thomas Eisenbarth and
               Ingo von Maurich and
               Rainer Steinwandt},
  editor    = {Tal Malkin and
               Vladimir Kolesnikov and
               Allison Bishop Lewko and
               Michalis Polychronakis},
  title     = {Differential Power Analysis of a McEliece Cryptosystem},
  booktitle = {Applied Cryptography and Network Security - 13th International Conference,
               {ACNS} 2015, New York, NY, USA, June 2-5, 2015, Revised Selected Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {9092},
  pages     = {538--556},
  publisher = {Springer},
  year      = {2015},
  url       = {https://doi.org/10.1007/978-3-319-28166-7\_26},
  doi       = {10.1007/978-3-319-28166-7\_26},
  timestamp = {Tue, 14 May 2019 10:00:54 +0200},
  biburl    = {https://dblp.org/rec/conf/acns/ChenEMS15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cdc/DvijothamCL15,
  author    = {Krishnamurthy Dvijotham and
               Michael Chertkov and
               Steven H. Low},
  title     = {A differential analysis of the power flow equations},
  booktitle = {54th {IEEE} Conference on Decision and Control, {CDC} 2015, Osaka,
               Japan, December 15-18, 2015},
  pages     = {23--30},
  publisher = {{IEEE}},
  year      = {2015},
  url       = {https://doi.org/10.1109/CDC.2015.7402082},
  doi       = {10.1109/CDC.2015.7402082},
  timestamp = {Wed, 16 Oct 2019 14:14:56 +0200},
  biburl    = {https://dblp.org/rec/conf/cdc/DvijothamCL15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/GuoWLSZLY15,
  author    = {Limin Guo and
               Lihui Wang and
               Dan Liu and
               Weijun Shan and
               Zhimin Zhang and
               Qing Li and
               Jun Yu},
  title     = {A Chosen - Plaintext Differential Power Analysis Attack on {HMAC}
               - {SM3}},
  booktitle = {11th International Conference on Computational Intelligence and Security,
               {CIS} 2015, Shenzhen, China, December 19-20, 2015},
  pages     = {350--353},
  publisher = {{IEEE} Computer Society},
  year      = {2015},
  url       = {https://doi.org/10.1109/CIS.2015.91},
  doi       = {10.1109/CIS.2015.91},
  timestamp = {Wed, 16 Oct 2019 14:14:53 +0200},
  biburl    = {https://dblp.org/rec/conf/cis/GuoWLSZLY15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/GuoWLYL15,
  author    = {Limin Guo and
               Lihui Wang and
               Qing Li and
               Jun Yu and
               Peng Luo},
  title     = {Differential Power Analysis on Dynamic Password Token Based on {SM3}
               Algorithm, and Countermeasures},
  booktitle = {11th International Conference on Computational Intelligence and Security,
               {CIS} 2015, Shenzhen, China, December 19-20, 2015},
  pages     = {354--357},
  publisher = {{IEEE} Computer Society},
  year      = {2015},
  url       = {https://doi.org/10.1109/CIS.2015.92},
  doi       = {10.1109/CIS.2015.92},
  timestamp = {Fri, 26 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/conf/cis/GuoWLYL15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/LiuYSGGSGX15,
  author    = {Junrong Liu and
               Yu Yu and
               Fran{\c{c}}ois{-}Xavier Standaert and
               Zheng Guo and
               Dawu Gu and
               Wei Sun and
               Yijie Ge and
               Xinjun Xie},
  editor    = {G{\"{u}}nther Pernul and
               Peter Y. A. Ryan and
               Edgar R. Weippl},
  title     = {Small Tweaks Do Not Help: Differential Power Analysis of {MILENAGE}
               Implementations in 3G/4G {USIM} Cards},
  booktitle = {Computer Security - {ESORICS} 2015 - 20th European Symposium on Research
               in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings,
               Part {I}},
  series    = {Lecture Notes in Computer Science},
  volume    = {9326},
  pages     = {468--480},
  publisher = {Springer},
  year      = {2015},
  url       = {https://doi.org/10.1007/978-3-319-24174-6\_24},
  doi       = {10.1007/978-3-319-24174-6\_24},
  timestamp = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/conf/esorics/LiuYSGGSGX15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isqed/NiuJ15,
  author    = {Yanbo Niu and
               Anping Jiang},
  title     = {The low power design of {SM4} cipher with resistance to differential
               power analysis},
  booktitle = {Sixteenth International Symposium on Quality Electronic Design, {ISQED}
               2015, Santa Clara, CA, USA, March 2-4, 2015},
  pages     = {470--474},
  publisher = {{IEEE}},
  year      = {2015},
  url       = {https://doi.org/10.1109/ISQED.2015.7085471},
  doi       = {10.1109/ISQED.2015.7085471},
  timestamp = {Wed, 16 Oct 2019 14:14:55 +0200},
  biburl    = {https://dblp.org/rec/conf/isqed/NiuJ15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/milcom/LuisNA15,
  author    = {William Luis and
               G. Richard Newell and
               Kenneth Alexander},
  editor    = {Qinqing Zhang and
               Jerry Brand and
               Thomas G. MacDonald and
               Bharat T. Doshi and
               Bonnie L. Gorsic},
  title     = {Differential power analysis countermeasures for the configuration
               of {SRAM} FPGAs},
  booktitle = {34th {IEEE} Military Communications Conference, {MILCOM} 2015, Tampa,
               FL, USA, October 26-28, 2015},
  pages     = {1276--1283},
  publisher = {{IEEE}},
  year      = {2015},
  url       = {https://doi.org/10.1109/MILCOM.2015.7357621},
  doi       = {10.1109/MILCOM.2015.7357621},
  timestamp = {Thu, 07 Nov 2019 09:04:27 +0100},
  biburl    = {https://dblp.org/rec/conf/milcom/LuisNA15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/WangCWLW15,
  author    = {Xiaozhe Wang and
               Hsiao{-}Dong Chiang and
               Jianhui Wang and
               Hui Liu and
               Tao Wang},
  title     = {Long-Term Stability Analysis of Power Systems with Wind Power Based
               on Stochastic Differential Equations: Model Development and Foundations},
  journal   = {CoRR},
  volume    = {abs/1506.03658},
  year      = {2015},
  url       = {http://arxiv.org/abs/1506.03658},
  eprinttype = {arXiv},
  eprint    = {1506.03658},
  timestamp = {Fri, 21 Sep 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/corr/WangCWLW15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tvt/FangLLJ14,
  author    = {Zhaoxi Fang and
               Feng Liang and
               Liangbin Li and
               Liping Jin},
  title     = {Performance Analysis and Power Allocation for Two-Way Amplify-and-Forward
               Relaying With Generalized Differential Modulation},
  journal   = {{IEEE} Trans. Veh. Technol.},
  volume    = {63},
  number    = {2},
  pages     = {937--942},
  year      = {2014},
  url       = {https://doi.org/10.1109/TVT.2013.2279856},
  doi       = {10.1109/TVT.2013.2279856},
  timestamp = {Thu, 25 Jun 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tvt/FangLLJ14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cases/AmaralRTC14,
  author    = {Jo{\~{a}}o Amaral and
               Francesco Regazzoni and
               Pedro Tom{\'{a}}s and
               Ricardo Chaves},
  editor    = {Ting Yu and
               Shengqi Yang},
  title     = {Accelerating differential power analysis on heterogeneous systems},
  booktitle = {Proceedings of the 9th Workshop on Embedded Systems Security, {WESS}
               '14, New Delhi, India, October 17, 2014},
  pages     = {4:1--4:9},
  publisher = {{ACM}},
  year      = {2014},
  url       = {https://doi.org/10.1145/2668322.2668326},
  doi       = {10.1145/2668322.2668326},
  timestamp = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/conf/cases/AmaralRTC14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cases/Mazumdar14,
  author    = {Bodhisatwa Mazumdar},
  editor    = {Ting Yu and
               Shengqi Yang},
  title     = {Some {RSSB} constructions with improved resistance towards differential
               power analysis},
  booktitle = {Proceedings of the 9th Workshop on Embedded Systems Security, {WESS}
               '14, New Delhi, India, October 17, 2014},
  pages     = {8:1--8:3},
  publisher = {{ACM}},
  year      = {2014},
  url       = {https://doi.org/10.1145/2668322.2668330},
  doi       = {10.1145/2668322.2668330},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/conf/cases/Mazumdar14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cosade/HajraM14,
  author    = {Suvadeep Hajra and
               Debdeep Mukhopadhyay},
  editor    = {Emmanuel Prouff},
  title     = {On the Optimal Pre-processing for Non-profiling Differential Power
               Analysis},
  booktitle = {Constructive Side-Channel Analysis and Secure Design - 5th International
               Workshop, {COSADE} 2014, Paris, France, April 13-15, 2014. Revised
               Selected Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {8622},
  pages     = {161--178},
  publisher = {Springer},
  year      = {2014},
  url       = {https://doi.org/10.1007/978-3-319-10175-0\_12},
  doi       = {10.1007/978-3-319-10175-0\_12},
  timestamp = {Tue, 14 May 2019 10:00:39 +0200},
  biburl    = {https://dblp.org/rec/conf/cosade/HajraM14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icete/BelaidBDGR14,
  author    = {Sonia Bela{\"{\i}}d and
               Luk Bettale and
               Emmanuelle Dottax and
               Laurie Genelle and
               Franck Rondepierre},
  editor    = {Mohammad S. Obaidat and
               Andreas Holzinger and
               Joaquim Filipe},
  title     = {Differential Power Analysis of {HMAC} {SHA-1} and {HMAC} {SHA-2} in
               the Hamming Weight Model},
  booktitle = {E-Business and Telecommunications - 11th International Joint Conference,
               {ICETE} 2014, Vienna, Austria, August 28-30, 2014, Revised Selected
               Papers},
  series    = {Communications in Computer and Information Science},
  volume    = {554},
  pages     = {363--379},
  publisher = {Springer},
  year      = {2014},
  url       = {https://doi.org/10.1007/978-3-319-25915-4\_19},
  doi       = {10.1007/978-3-319-25915-4\_19},
  timestamp = {Tue, 16 Aug 2022 23:04:29 +0200},
  biburl    = {https://dblp.org/rec/conf/icete/BelaidBDGR14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/indocrypt/SarkarMC14,
  author    = {Sumanta Sarkar and
               Subhamoy Maitra and
               Kaushik Chakraborty},
  editor    = {Willi Meier and
               Debdeep Mukhopadhyay},
  title     = {Differential Power Analysis in Hamming Weight Model: How to Choose
               among (Extended) Affine Equivalent S-boxes},
  booktitle = {Progress in Cryptology - {INDOCRYPT} 2014 - 15th International Conference
               on Cryptology in India, New Delhi, India, December 14-17, 2014, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {8885},
  pages     = {360--373},
  publisher = {Springer},
  year      = {2014},
  url       = {https://doi.org/10.1007/978-3-319-13039-2\_21},
  doi       = {10.1007/978-3-319-13039-2\_21},
  timestamp = {Fri, 28 Jun 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/conf/indocrypt/SarkarMC14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iscas/AvitalF14,
  author    = {Moshe Avital and
               Alexander Fish},
  title     = {Secured Dual Mode Logic {(DML)} as a countermeasure against Differential
               Power Analysis},
  booktitle = {{IEEE} International Symposium on Circuits and Systemss, {ISCAS} 2014,
               Melbourne, Victoria, Australia, June 1-5, 2014},
  pages     = {810--813},
  publisher = {{IEEE}},
  year      = {2014},
  url       = {https://doi.org/10.1109/ISCAS.2014.6865259},
  doi       = {10.1109/ISCAS.2014.6865259},
  timestamp = {Wed, 16 Oct 2019 14:14:49 +0200},
  biburl    = {https://dblp.org/rec/conf/iscas/AvitalF14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isvlsi/JiangBEP14,
  author    = {Ke Jiang and
               Lejla Batina and
               Petru Eles and
               Zebo Peng},
  title     = {Robustness Analysis of Real-Time Scheduling Against Differential Power
               Analysis Attacks},
  booktitle = {{IEEE} Computer Society Annual Symposium on VLSI, {ISVLSI} 2014, Tampa,
               FL, USA, July 9-11, 2014},
  pages     = {450--455},
  publisher = {{IEEE} Computer Society},
  year      = {2014},
  url       = {https://doi.org/10.1109/ISVLSI.2014.11},
  doi       = {10.1109/ISVLSI.2014.11},
  timestamp = {Wed, 16 Oct 2019 14:14:54 +0200},
  biburl    = {https://dblp.org/rec/conf/isvlsi/JiangBEP14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/space/ShanmugamSA14,
  author    = {Dillibabu Shanmugam and
               Ravikumar Selvam and
               Suganya Annadurai},
  editor    = {Rajat Subhra Chakraborty and
               Vashek Matyas and
               Patrick Schaumont},
  title     = {Differential Power Analysis Attack on {SIMON} and {LED} Block Ciphers},
  booktitle = {Security, Privacy, and Applied Cryptography Engineering - 4th International
               Conference, {SPACE} 2014, Pune, India, October 18-22, 2014. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {8804},
  pages     = {110--125},
  publisher = {Springer},
  year      = {2014},
  url       = {https://doi.org/10.1007/978-3-319-12060-7\_8},
  doi       = {10.1007/978-3-319-12060-7\_8},
  timestamp = {Mon, 15 Jun 2020 17:10:47 +0200},
  biburl    = {https://dblp.org/rec/conf/space/ShanmugamSA14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChenEMS14,
  author    = {Cong Chen and
               Thomas Eisenbarth and
               Ingo von Maurich and
               Rainer Steinwandt},
  title     = {Differential Power Analysis of a McEliece Cryptosystem},
  journal   = {{IACR} Cryptol. ePrint Arch.},
  pages     = {534},
  year      = {2014},
  url       = {http://eprint.iacr.org/2014/534},
  timestamp = {Mon, 11 May 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/iacr/ChenEMS14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/bmcbi/QiuWH13,
  author    = {Xing Qiu and
               Hulin Wu and
               Rui Hu},
  title     = {The impact of quantile and rank normalization procedures on the testing
               power of gene differential expression analysis},
  journal   = {{BMC} Bioinform.},
  volume    = {14},
  pages     = {124},
  year      = {2013},
  url       = {https://doi.org/10.1186/1471-2105-14-124},
  doi       = {10.1186/1471-2105-14-124},
  timestamp = {Wed, 11 May 2022 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/bmcbi/QiuWH13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cma/QuGGL13,
  author    = {Bo Qu and
               Dawu Gu and
               Zheng Guo and
               Junrong Liu},
  title     = {Differential power analysis of stream ciphers with LFSRs},
  journal   = {Comput. Math. Appl.},
  volume    = {65},
  number    = {9},
  pages     = {1291--1299},
  year      = {2013},
  url       = {https://doi.org/10.1016/j.camwa.2012.02.024},
  doi       = {10.1016/j.camwa.2012.02.024},
  timestamp = {Thu, 11 Feb 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/cma/QuGGL13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dsd/tepanekBN13,
  author    = {Filip Step{\'{a}}nek and
               Jir{\'{\i}} Bucek and
               Martin Novotn{\'{y}}},
  title     = {Differential Power Analysis under Constrained Budget: Low Cost Education
               of Hackers},
  booktitle = {2013 Euromicro Conference on Digital System Design, {DSD} 2013, Los
               Alamitos, CA, USA, September 4-6, 2013},
  pages     = {645--648},
  publisher = {{IEEE} Computer Society},
  year      = {2013},
  url       = {https://doi.org/10.1109/DSD.2013.130},
  doi       = {10.1109/DSD.2013.130},
  timestamp = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/conf/dsd/tepanekBN13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isorc/0002W13,
  author    = {Dirk M{\"{u}}ller and
               Matthias Werner},
  title     = {Quantifying the advantage of {EDF} vs. {RMS} schedulability on a uniprocessor
               using a differential analysis and a power-law total utilization distribution},
  booktitle = {16th {IEEE} International Symposium on Object/Component/Service-Oriented
               Real-Time Distributed Computing, {ISORC} 2013, Paderborn, Germany,
               June 19-21, 2013},
  pages     = {1--10},
  publisher = {{IEEE} Computer Society},
  year      = {2013},
  url       = {https://doi.org/10.1109/ISORC.2013.6913215},
  doi       = {10.1109/ISORC.2013.6913215},
  timestamp = {Wed, 16 Oct 2019 14:14:53 +0200},
  biburl    = {https://dblp.org/rec/conf/isorc/0002W13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/TahaS13,
  author    = {Mostafa M. I. Taha and
               Patrick Schaumont},
  editor    = {Kazuo Sakiyama and
               Masayuki Terada},
  title     = {Differential Power Analysis of MAC-Keccak at Any Key-Length},
  booktitle = {Advances in Information and Computer Security - 8th International
               Workshop on Security, {IWSEC} 2013, Okinawa, Japan, November 18-20,
               2013, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {8231},
  pages     = {68--82},
  publisher = {Springer},
  year      = {2013},
  url       = {https://doi.org/10.1007/978-3-642-41383-4\_5},
  doi       = {10.1007/978-3-642-41383-4\_5},
  timestamp = {Tue, 14 May 2019 10:00:52 +0200},
  biburl    = {https://dblp.org/rec/conf/iwsec/TahaS13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/BelaidBDGR13,
  author    = {Sonia Bela{\"{\i}}d and
               Luk Bettale and
               Emmanuelle Dottax and
               Laurie Genelle and
               Franck Rondepierre},
  editor    = {Pierangela Samarati},
  title     = {Differential Power Analysis of {HMAC} {SHA-2} in the Hamming Weight
               Model},
  booktitle = {{SECRYPT} 2013 - Proceedings of the 10th International Conference
               on Security and Cryptography, Reykjav{\'{\i}}k, Iceland, 29-31
               July, 2013},
  pages     = {230--241},
  publisher = {SciTePress},
  year      = {2013},
  url       = {https://ieeexplore.ieee.org/document/7223170/},
  timestamp = {Wed, 11 Aug 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/conf/secrypt/BelaidBDGR13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tsp/MartinasekCT13,
  author    = {Zdenek Martinasek and
               Vlastimil Clupek and
               Krisztina Trasy},
  title     = {General scheme of differential power analysis},
  booktitle = {36th International Conference on Telecommunications and Signal Processing,
               {TSP} 2013, Rome, Italy, 2-4 July, 2013},
  pages     = {358--362},
  publisher = {{IEEE}},
  year      = {2013},
  url       = {https://doi.org/10.1109/TSP.2013.6613952},
  doi       = {10.1109/TSP.2013.6613952},
  timestamp = {Wed, 16 Oct 2019 14:14:56 +0200},
  biburl    = {https://dblp.org/rec/conf/tsp/MartinasekCT13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/ethos/Baddam12,
  author    = {Karthik Baddam},
  title     = {Hardware level countermeasures against differential power analysis},
  school    = {University of Southampton, {UK}},
  year      = {2012},
  url       = {http://eprints.soton.ac.uk/300786/},
  timestamp = {Tue, 05 Apr 2022 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/phd/ethos/Baddam12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/advai/Tripathy12,
  author    = {Manoj Tripathy},
  title     = {Power Transformer Differential Protection Based on Neural Network
               Principal Component Analysis, Harmonic Restraint and Park's Plots},
  journal   = {Adv. Artif. Intell.},
  volume    = {2012},
  pages     = {930740:1--930740:9},
  year      = {2012},
  url       = {https://doi.org/10.1155/2012/930740},
  doi       = {10.1155/2012/930740},
  timestamp = {Fri, 03 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/advai/Tripathy12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/chinaf/TangQYCGLM12,
  author    = {Ming Tang and
               Zhenlong Qiu and
               Min Yang and
               Pingpan Cheng and
               Si Gao and
               Shubo Liu and
               Qingshu Meng},
  title     = {Evolutionary ciphers against differential power analysis and differential
               fault analysis},
  journal   = {Sci. China Inf. Sci.},
  volume    = {55},
  number    = {11},
  pages     = {2555--2569},
  year      = {2012},
  url       = {https://doi.org/10.1007/s11432-012-4615-6},
  doi       = {10.1007/s11432-012-4615-6},
  timestamp = {Mon, 02 Mar 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/chinaf/TangQYCGLM12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/kes/BiswalBDM12,
  author    = {Birendra Biswal and
               M. K. Biswal and
               Pradipta K. Dash and
               S. Mishra},
  title     = {Time frequency analysis and power signal disturbance classification
               using support vector machine and differential evolution algorithm},
  journal   = {Int. J. Knowl. Based Intell. Eng. Syst.},
  volume    = {16},
  number    = {3},
  pages     = {199--214},
  year      = {2012},
  url       = {https://doi.org/10.3233/KES-2012-0243},
  doi       = {10.3233/KES-2012-0243},
  timestamp = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/kes/BiswalBDM12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mcm/VasyltsovS12,
  author    = {Ihor Vasyltsov and
               G{\"{o}}kay Saldamli},
  title     = {Fault detection and a differential fault analysis countermeasure for
               the Montgomery power ladder in elliptic curve cryptography},
  journal   = {Math. Comput. Model.},
  volume    = {55},
  number    = {1-2},
  pages     = {256--267},
  year      = {2012},
  url       = {https://doi.org/10.1016/j.mcm.2011.06.017},
  doi       = {10.1016/j.mcm.2011.06.017},
  timestamp = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/mcm/VasyltsovS12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcas/LiuCL12,
  author    = {Po{-}Chun Liu and
               Hsie{-}Chia Chang and
               Chen{-}Yi Lee},
  title     = {A True Random-Based Differential Power Analysis Countermeasure Circuit
               for an {AES} Engine},
  journal   = {{IEEE} Trans. Circuits Syst. {II} Express Briefs},
  volume    = {59-II},
  number    = {2},
  pages     = {103--107},
  year      = {2012},
  url       = {https://doi.org/10.1109/TCSII.2011.2180094},
  doi       = {10.1109/TCSII.2011.2180094},
  timestamp = {Wed, 27 May 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tcas/LiuCL12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tim/MasiPT12,
  author    = {Maria Gabriella Masi and
               Lorenzo Peretto and
               Roberto Tinarelli},
  title     = {Design and Performance Analysis of a Differential Current Sensor for
               Power System Applications},
  journal   = {{IEEE} Trans. Instrum. Meas.},
  volume    = {61},
  number    = {12},
  pages     = {3207--3215},
  year      = {2012},
  url       = {https://doi.org/10.1109/TIM.2012.2205513},
  doi       = {10.1109/TIM.2012.2205513},
  timestamp = {Mon, 08 Jun 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tim/MasiPT12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isvlsi/KhedkarK12,
  author    = {Ganesh Khedkar and
               Dhireesha Kudithipudi},
  title     = {{RRAM} Motifs for Mitigating Differential Power Analysis Attacks {(DPA)}},
  booktitle = {{IEEE} Computer Society Annual Symposium on VLSI, {ISVLSI} 2012, Amherst,
               MA, USA, August 19-21, 2012},
  pages     = {88--93},
  publisher = {{IEEE} Computer Society},
  year      = {2012},
  url       = {https://doi.org/10.1109/ISVLSI.2012.68},
  doi       = {10.1109/ISVLSI.2012.68},
  timestamp = {Wed, 16 Oct 2019 14:14:54 +0200},
  biburl    = {https://dblp.org/rec/conf/isvlsi/KhedkarK12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/milcom/PatelB12,
  author    = {Hiren J. Patel and
               Rusty Baldwin},
  title     = {{GPU} accelerated Differential Power Analysis},
  booktitle = {31st {IEEE} Military Communications Conference, {MILCOM} 2012, Orlando,
               FL, USA, October 29 - November 1, 2012},
  pages     = {1--5},
  publisher = {{IEEE}},
  year      = {2012},
  url       = {https://doi.org/10.1109/MILCOM.2012.6415611},
  doi       = {10.1109/MILCOM.2012.6415611},
  timestamp = {Fri, 01 Oct 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/conf/milcom/PatelB12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/milcom/PatelB12a,
  author    = {Hiren J. Patel and
               Rusty Baldwin},
  title     = {Differential Power Analysis using wavelet decomposition},
  booktitle = {31st {IEEE} Military Communications Conference, {MILCOM} 2012, Orlando,
               FL, USA, October 29 - November 1, 2012},
  pages     = {1--5},
  publisher = {{IEEE}},
  year      = {2012},
  url       = {https://doi.org/10.1109/MILCOM.2012.6415612},
  doi       = {10.1109/MILCOM.2012.6415612},
  timestamp = {Fri, 01 Oct 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/conf/milcom/PatelB12a.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/TangCQ12,
  author    = {Ming Tang and
               Pingpan Cheng and
               Zhenlong Qiu},
  title     = {Differential Power Analysis on {ZUC} Algorithm},
  journal   = {{IACR} Cryptol. ePrint Arch.},
  pages     = {299},
  year      = {2012},
  url       = {http://eprint.iacr.org/2012/299},
  timestamp = {Mon, 11 May 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/iacr/TangCQ12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csda/LinL11,
  author    = {Wan{-}Yu Lin and
               Wen{-}Chung Lee},
  title     = {Floating prioritized subset analysis: {A} powerful method to detect
               differentially expressed genes},
  journal   = {Comput. Stat. Data Anal.},
  volume    = {55},
  number    = {1},
  pages     = {903--913},
  year      = {2011},
  url       = {https://doi.org/10.1016/j.csda.2010.07.023},
  doi       = {10.1016/j.csda.2010.07.023},
  timestamp = {Tue, 18 Feb 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/csda/LinL11.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-ifs/MangardOS11,
  author    = {Stefan Mangard and
               Elisabeth Oswald and
               Fran{\c{c}}ois{-}Xavier Standaert},
  title     = {One for all - all for one: unifying standard differential power analysis
               attacks},
  journal   = {{IET} Inf. Secur.},
  volume    = {5},
  number    = {2},
  pages     = {100--110},
  year      = {2011},
  url       = {https://doi.org/10.1049/iet-ifs.2010.0096},
  doi       = {10.1049/iet-ifs.2010.0096},
  timestamp = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/iet-ifs/MangardOS11.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/KocherJJR11,
  author    = {Paul C. Kocher and
               Joshua Jaffe and
               Benjamin Jun and
               Pankaj Rohatgi},
  title     = {Introduction to differential power analysis},
  journal   = {J. Cryptogr. Eng.},
  volume    = {1},
  number    = {1},
  pages     = {5--27},
  year      = {2011},
  url       = {https://doi.org/10.1007/s13389-011-0006-y},
  doi       = {10.1007/s13389-011-0006-y},
  timestamp = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jce/KocherJJR11.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cardis/BartkewitzL11,
  author    = {Timo Bartkewitz and
               Kerstin Lemke{-}Rust},
  editor    = {Emmanuel Prouff},
  title     = {A High-Performance Implementation of Differential Power Analysis on
               Graphics Cards},
  booktitle = {Smart Card Research and Advanced Applications - 10th {IFIP} {WG} 8.8/11.2
               International Conference, {CARDIS} 2011, Leuven, Belgium, September
               14-16, 2011, Revised Selected Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {7079},
  pages     = {252--265},
  publisher = {Springer},
  year      = {2011},
  url       = {https://doi.org/10.1007/978-3-642-27257-8\_16},
  doi       = {10.1007/978-3-642-27257-8\_16},
  timestamp = {Tue, 14 May 2019 10:00:52 +0200},
  biburl    = {https://dblp.org/rec/conf/cardis/BartkewitzL11.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csiirw/LiZQZS11,
  author    = {Jiayin Li and
               Daigu Zhang and
               Meikang Qiu and
               Yongxin Zhu and
               Ju Shen},
  editor    = {Frederick T. Sheldon and
               Robert K. Abercrombie and
               Axel W. Krings},
  title     = {Security protection on {FPGA} against differential power analysis
               attacks},
  booktitle = {Proceedings of the 7th Cyber Security and Information Intelligence
               Research Workshop, {CSIIRW} 2011, Oak Ridge, TN, USA, October 12-14,
               2011},
  pages     = {67},
  publisher = {{ACM}},
  year      = {2011},
  url       = {https://doi.org/10.1145/2179298.2179375},
  doi       = {10.1145/2179298.2179375},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/conf/csiirw/LiZQZS11.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/WoudenbergWB11,
  author    = {Jasper G. J. van Woudenberg and
               Marc F. Witteman and
               Bram Bakker},
  editor    = {Aggelos Kiayias},
  title     = {Improving Differential Power Analysis by Elastic Alignment},
  booktitle = {Topics in Cryptology - {CT-RSA} 2011 - The Cryptographers' Track at
               the {RSA} Conference 2011, San Francisco, CA, USA, February 14-18,
               2011. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {6558},
  pages     = {104--119},
  publisher = {Springer},
  year      = {2011},
  url       = {https://doi.org/10.1007/978-3-642-19074-2\_8},
  doi       = {10.1007/978-3-642-19074-2\_8},
  timestamp = {Tue, 14 May 2019 10:00:52 +0200},
  biburl    = {https://dblp.org/rec/conf/ctrsa/WoudenbergWB11.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ddecs/NataleFRVR11,
  author    = {Giorgio Di Natale and
               Marie{-}Lise Flottes and
               Bruno Rouzeyre and
               Miroslav Valka and
               Denis R{\'{e}}al},
  editor    = {Rolf Kraemer and
               Adam Pawlak and
               Andreas Steininger and
               Mario Sch{\"{o}}lzel and
               Jaan Raik and
               Heinrich Theodor Vierhaus},
  title     = {Power consumption traces realignment to improve differential power
               analysis},
  booktitle = {14th {IEEE} International Symposium on Design and Diagnostics of Electronic
               Circuits {\&} Systems, {DDECS} 2011, Cottbus, Germany, April 13-15,
               2011},
  pages     = {201--206},
  publisher = {{IEEE} Computer Society},
  year      = {2011},
  url       = {https://doi.org/10.1109/DDECS.2011.5783080},
  doi       = {10.1109/DDECS.2011.5783080},
  timestamp = {Wed, 16 Oct 2019 14:14:50 +0200},
  biburl    = {https://dblp.org/rec/conf/ddecs/NataleFRVR11.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/host/KriegBGSWH11,
  author    = {Armin Krieg and
               Christian Bachmann and
               Johannes Grinschgl and
               Christian Steger and
               Reinhold Weiss and
               Josef Haid},
  title     = {Accelerating early design phase differential power analysis using
               power emulation techniques},
  booktitle = {{HOST} 2011, Proceedings of the 2011 {IEEE} International Symposium
               on Hardware-Oriented Security and Trust (HOST), 5-6 June 2011, San
               Diego, California, {USA}},
  pages     = {81--86},
  publisher = {{IEEE} Computer Society},
  year      = {2011},
  url       = {https://doi.org/10.1109/HST.2011.5955001},
  doi       = {10.1109/HST.2011.5955001},
  timestamp = {Wed, 16 Oct 2019 14:14:56 +0200},
  biburl    = {https://dblp.org/rec/conf/host/KriegBGSWH11.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ichit/ChoudhuryPBLLL11,
  author    = {Amlan Jyoti Choudhury and
               Beum{-}Su Park and
               Bruce Ndibanje and
               Young{-}Sil Lee and
               Hyotaek Lim and
               Hoon{-}Jae Lee},
  editor    = {Geuk Lee and
               Daniel Howard and
               Dominik Slezak},
  title     = {An Efficient Hardware Countermeasure against Differential Power Analysis
               Attack},
  booktitle = {Convergence and Hybrid Information Technology - 5th International
               Conference, {ICHIT} 2011, Daejeon, Korea, September 22-24, 2011. Proceedings},
  series    = {Communications in Computer and Information Science},
  volume    = {206},
  pages     = {153--159},
  publisher = {Springer},
  year      = {2011},
  url       = {https://doi.org/10.1007/978-3-642-24106-2\_20},
  doi       = {10.1007/978-3-642-24106-2\_20},
  timestamp = {Thu, 28 Dec 2017 16:02:42 +0100},
  biburl    = {https://dblp.org/rec/conf/ichit/ChoudhuryPBLLL11.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispacs/MonteiroTS11,
  author    = {C{\^{a}}ncio Monteiro and
               Yasuhiro Takahashi and
               Toshikazu Sekine},
  title     = {Resistance against power analysis attacks on adiabatic dynamic and
               adiabatic differential logics for smart card},
  booktitle = {International Symposium on Intelligent Signal Processing and Communications
               Systems, {ISPACS} 2011, Chiang Mai, Thailand, December 7-9, 2011},
  pages     = {1--5},
  publisher = {{IEEE}},
  year      = {2011},
  url       = {https://doi.org/10.1109/ISPACS.2011.6146067},
  doi       = {10.1109/ISPACS.2011.6146067},
  timestamp = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/conf/ispacs/MonteiroTS11.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/itng/ZhangS11,
  author    = {Fan Zhang and
               Zhijie Jerry Shi},
  editor    = {Shahram Latifi},
  title     = {Differential and Correlation Power Analysis Attacks on HMAC-Whirlpool},
  booktitle = {Eighth International Conference on Information Technology: New Generations,
               {ITNG} 2011, Las Vegas, Nevada, USA, 11-13 April 2011},
  pages     = {359--365},
  publisher = {{IEEE} Computer Society},
  year      = {2011},
  url       = {https://doi.org/10.1109/ITNG.2011.70},
  doi       = {10.1109/ITNG.2011.70},
  timestamp = {Wed, 16 Oct 2019 14:14:53 +0200},
  biburl    = {https://dblp.org/rec/conf/itng/ZhangS11.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/worldcis/MasoumiM11,
  author    = {Massoud Masoumi and
               Soheil Mohammadi},
  title     = {A new and efficient approach to protect {AES} against differential
               power analysis},
  booktitle = {2011 World Congress on Internet Security, WorldCIS 2011, London, UK,
               February 21-23, 2011},
  pages     = {59--66},
  publisher = {{IEEE}},
  year      = {2011},
  url       = {https://ieeexplore.ieee.org/document/5749883/},
  timestamp = {Thu, 12 Aug 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/conf/worldcis/MasoumiM11.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/Caddy11a,
  author    = {Tom Caddy},
  editor    = {Henk C. A. van Tilborg and
               Sushil Jajodia},
  title     = {Differential Power Analysis},
  booktitle = {Encyclopedia of Cryptography and Security, 2nd Ed},
  pages     = {336--338},
  publisher = {Springer},
  year      = {2011},
  url       = {https://doi.org/10.1007/978-1-4419-5906-5\_196},
  doi       = {10.1007/978-1-4419-5906-5\_196},
  timestamp = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/reference/crypt/Caddy11a.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/LeeSHHL10,
  author    = {Sung Jae Lee and
               Seog Chung Seo and
               Dong{-}Guk Han and
               Seokhie Hong and
               Sangjin Lee},
  title     = {Acceleration of Differential Power Analysis through the Parallel Use
               of {GPU} and {CPU}},
  journal   = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume    = {93-A},
  number    = {9},
  pages     = {1688--1692},
  year      = {2010},
  url       = {https://doi.org/10.1587/transfun.E93.A.1688},
  doi       = {10.1587/transfun.E93.A.1688},
  timestamp = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ieicet/LeeSHHL10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mj/AliotoBL10,
  author    = {Massimo Alioto and
               St{\'{e}}phane Badel and
               Yusuf Leblebici},
  title     = {Optimization of the wire grid size for differential routing: Analysis
               and impact on the power-delay-area tradeoff},
  journal   = {Microelectron. J.},
  volume    = {41},
  number    = {10},
  pages     = {669--679},
  year      = {2010},
  url       = {https://doi.org/10.1016/j.mejo.2010.06.005},
  doi       = {10.1016/j.mejo.2010.06.005},
  timestamp = {Sat, 22 Feb 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/mj/AliotoBL10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/simpra/Tripathy10,
  author    = {Manoj Tripathy},
  title     = {Power transformer differential protection using neural network Principal
               Component Analysis and Radial Basis Function Neural Network},
  journal   = {Simul. Model. Pract. Theory},
  volume    = {18},
  number    = {5},
  pages     = {600--611},
  year      = {2010},
  url       = {https://doi.org/10.1016/j.simpat.2010.01.003},
  doi       = {10.1016/j.simpat.2010.01.003},
  timestamp = {Mon, 24 Feb 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/simpra/Tripathy10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/AliotoPR10,
  author    = {Massimo Alioto and
               Massimo Poli and
               Santina Rocchi},
  title     = {Differential Power Analysis Attacks to Precharged Buses: {A} General
               Analysis for Symmetric-Key Cryptographic Algorithms},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {7},
  number    = {3},
  pages     = {226--239},
  year      = {2010},
  url       = {https://doi.org/10.1109/TDSC.2009.1},
  doi       = {10.1109/TDSC.2009.1},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/AliotoPR10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tvlsi/AliotoPR10,
  author    = {Massimo Alioto and
               Massimo Poli and
               Santina Rocchi},
  title     = {A General Power Model of Differential Power Analysis Attacks to Static
               Logic Circuits},
  journal   = {{IEEE} Trans. Very Large Scale Integr. Syst.},
  volume    = {18},
  number    = {5},
  pages     = {711--724},
  year      = {2010},
  url       = {https://doi.org/10.1109/TVLSI.2009.2015327},
  doi       = {10.1109/TVLSI.2009.2015327},
  timestamp = {Wed, 11 Mar 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tvlsi/AliotoPR10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/MahmoudA10,
  author    = {Hanan A. Mahmoud and
               Khaled Alghathbar},
  title     = {Novel algorithmic countermeasures for Differential Power Analysis
               attacks on smart cards},
  booktitle = {Sixth International Conference on Information Assurance and Security,
               {IAS} 2010, Atlanta, GA, USA, August 23-25, 2010},
  pages     = {52--55},
  publisher = {{IEEE}},
  year      = {2010},
  url       = {https://doi.org/10.1109/ISIAS.2010.5604079},
  doi       = {10.1109/ISIAS.2010.5604079},
  timestamp = {Wed, 16 Oct 2019 14:14:55 +0200},
  biburl    = {https://dblp.org/rec/conf/IEEEias/MahmoudA10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/LuPH10,
  author    = {Jiqiang Lu and
               Jing Pan and
               Jerry den Hartog},
  editor    = {Jianying Zhou and
               Moti Yung},
  title     = {Principles on the Security of {AES} against First and Second-Order
               Differential Power Analysis},
  booktitle = {Applied Cryptography and Network Security, 8th International Conference,
               {ACNS} 2010, Beijing, China, June 22-25, 2010. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {6123},
  pages     = {168--185},
  year      = {2010},
  url       = {https://doi.org/10.1007/978-3-642-13708-2\_11},
  doi       = {10.1007/978-3-642-13708-2\_11},
  timestamp = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/conf/acns/LuPH10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/apccas/BoeyLOW10,
  author    = {Keanhong Boey and
               Yingxi Lu and
               M{\'{a}}ire O'Neill and
               Roger F. Woods},
  title     = {Random clock against differential power analysis},
  booktitle = {{IEEE} Asia Pacific Conference on Circuits and Systems, {APCCAS} 2010,
               Kuala Lumpur, Malaysia, December 6-9, 2010},
  pages     = {756--759},
  publisher = {{IEEE}},
  year      = {2010},
  url       = {https://doi.org/10.1109/APCCAS.2010.5774887},
  doi       = {10.1109/APCCAS.2010.5774887},
  timestamp = {Wed, 16 Oct 2019 14:14:50 +0200},
  biburl    = {https://dblp.org/rec/conf/apccas/BoeyLOW10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/date/LomneDMTR10,
  author    = {Victor Lomn{\'{e}} and
               Amine Dehbaoui and
               Philippe Maurine and
               Lionel Torres and
               Michel Robert},
  editor    = {Giovanni De Micheli and
               Bashir M. Al{-}Hashimi and
               Wolfgang M{\"{u}}ller and
               Enrico Macii},
  title     = {Differential Power Analysis enhancement with statistical preprocessing},
  booktitle = {Design, Automation and Test in Europe, {DATE} 2010, Dresden, Germany,
               March 8-12, 2010},
  pages     = {1301--1304},
  publisher = {{IEEE} Computer Society},
  year      = {2010},
  url       = {https://doi.org/10.1109/DATE.2010.5457007},
  doi       = {10.1109/DATE.2010.5457007},
  timestamp = {Wed, 16 Oct 2019 14:14:53 +0200},
  biburl    = {https://dblp.org/rec/conf/date/LomneDMTR10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/delta/NataleFR10,
  author    = {Giorgio Di Natale and
               Marie{-}Lise Flottes and
               Bruno Rouzeyre},
  title     = {Evaluation of Resistance to Differential Power Analysis: Execution
               Time Optimizations for Designers},
  booktitle = {Fifth {IEEE} International Symposium on Electronic Design, Test {\&}
               Applications, {DELTA} 2010, Ho Chi Minh City, Vietnam, January 13-15,
               2010},
  pages     = {256--261},
  publisher = {{IEEE} Computer Society},
  year      = {2010},
  url       = {https://doi.org/10.1109/DELTA.2010.50},
  doi       = {10.1109/DELTA.2010.50},
  timestamp = {Wed, 16 Oct 2019 14:14:54 +0200},
  biburl    = {https://dblp.org/rec/conf/delta/NataleFR10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isvlsi/BoeyLOW10,
  author    = {Keanhong Boey and
               Yingxi Lu and
               M{\'{a}}ire O'Neill and
               Roger F. Woods},
  title     = {Differential Power Analysis of {CAST-128}},
  booktitle = {{IEEE} Computer Society Annual Symposium on VLSI, {ISVLSI} 2010, 5-7
               July 2010, Lixouri Kefalonia, Greece},
  pages     = {143--148},
  publisher = {{IEEE} Computer Society},
  year      = {2010},
  url       = {https://doi.org/10.1109/ISVLSI.2010.14},
  doi       = {10.1109/ISVLSI.2010.14},
  timestamp = {Wed, 16 Oct 2019 14:14:54 +0200},
  biburl    = {https://dblp.org/rec/conf/isvlsi/BoeyLOW10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/sp/platzner2010/StottingerMH10,
  author    = {Marc St{\"{o}}ttinger and
               Felix Madlener and
               Sorin A. Huss},
  editor    = {Marco Platzner and
               J{\"{u}}rgen Teich and
               Norbert Wehn},
  title     = {Procedures for Securing {ECC} Implementations Against Differential
               Power Analysis Using Reconfigurable Architectures},
  booktitle = {Dynamically Reconfigurable Systems - Architectures, Design Methods
               and Applications},
  pages     = {395--415},
  publisher = {Springer},
  year      = {2010},
  url       = {https://doi.org/10.1007/978-90-481-3485-4\_19},
  doi       = {10.1007/978-90-481-3485-4\_19},
  timestamp = {Sun, 25 Jul 2021 11:34:40 +0200},
  biburl    = {https://dblp.org/rec/books/sp/platzner2010/StottingerMH10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1010-0169,
  author    = {Massoud Masoumi},
  title     = {A Novel and Highly Efficient {AES} Implementation Robust against Differential
               Power Analysis},
  journal   = {CoRR},
  volume    = {abs/1010.0169},
  year      = {2010},
  url       = {http://arxiv.org/abs/1010.0169},
  eprinttype = {arXiv},
  eprint    = {1010.0169},
  timestamp = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/corr/abs-1010-0169.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ProuffRB10,
  author    = {Emmanuel Prouff and
               Matthieu Rivain and
               R{\'{e}}gis Bevan},
  title     = {Statistical Analysis of Second Order Differential Power Analysis},
  journal   = {{IACR} Cryptol. ePrint Arch.},
  pages     = {646},
  year      = {2010},
  url       = {http://eprint.iacr.org/2010/646},
  timestamp = {Mon, 11 May 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/iacr/ProuffRB10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/ethos/Goodwin09,
  author    = {John Goodwin},
  title     = {Novel countermeasures and techniques for differential power analysis},
  school    = {University of Southampton, {UK}},
  year      = {2009},
  url       = {http://eprints.soton.ac.uk/72692/},
  timestamp = {Tue, 05 Apr 2022 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/phd/ethos/Goodwin09.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/icae/SunYZ09,
  author    = {Song Sun and
               Zijun Yan and
               Joseph Zambreno},
  title     = {Demonstrable differential power analysis attacks on real-world FPGA-based
               embedded systems},
  journal   = {Integr. Comput. Aided Eng.},
  volume    = {16},
  number    = {2},
  pages     = {119--130},
  year      = {2009},
  url       = {https://doi.org/10.3233/ICA-2009-0309},
  doi       = {10.3233/ICA-2009-0309},
  timestamp = {Fri, 13 Mar 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/icae/SunYZ09.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tc/ProuffRB09,
  author    = {Emmanuel Prouff and
               Matthieu Rivain and
               R{\'{e}}gis Bevan},
  title     = {Statistical Analysis of Second Order Differential Power Analysis},
  journal   = {{IEEE} Trans. Computers},
  volume    = {58},
  number    = {6},
  pages     = {799--811},
  year      = {2009},
  url       = {https://doi.org/10.1109/TC.2009.15},
  doi       = {10.1109/TC.2009.15},
  timestamp = {Sat, 20 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tc/ProuffRB09.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/trets/McEvoyMMT09,
  author    = {Robert P. McEvoy and
               Colin C. Murphy and
               William P. Marnane and
               Michael Tunstall},
  title     = {Isolated {WDDL:} {A} Hiding Countermeasure for Differential Power
               Analysis on FPGAs},
  journal   = {{ACM} Trans. Reconfigurable Technol. Syst.},
  volume    = {2},
  number    = {1},
  pages     = {3:1--3:23},
  year      = {2009},
  url       = {https://doi.org/10.1145/1502781.1502784},
  doi       = {10.1145/1502781.1502784},
  timestamp = {Fri, 24 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/trets/McEvoyMMT09.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecctd/DanisO09,
  author    = {Abid Uveys Danis and
               Berna {\"{O}}rs},
  title     = {Differential power analysis attack considering decoupling capacitance
               effect},
  booktitle = {19th European Conference on Circuit Theory and Design, {ECCTD} 2009,
               Antalya, Turkey, August 23-27, 2009},
  pages     = {359--362},
  publisher = {{IEEE}},
  year      = {2009},
  url       = {https://doi.org/10.1109/ECCTD.2009.5274996},
  doi       = {10.1109/ECCTD.2009.5274996},
  timestamp = {Tue, 16 Nov 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/conf/ecctd/DanisO09.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecctd/SugawaraHAS09,
  author    = {Takeshi Sugawara and
               Naofumi Homma and
               Takafumi Aoki and
               Akashi Satoh},
  title     = {Differential power analysis of {AES} {ASIC} implementations with various
               S-box circuits},
  booktitle = {19th European Conference on Circuit Theory and Design, {ECCTD} 2009,
               Antalya, Turkey, August 23-27, 2009},
  pages     = {395--398},
  publisher = {{IEEE}},
  year      = {2009},
  url       = {https://doi.org/10.1109/ECCTD.2009.5275004},
  doi       = {10.1109/ECCTD.2009.5275004},
  timestamp = {Fri, 26 Aug 2022 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/conf/ecctd/SugawaraHAS09.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iscid/YangXYL09,
  author    = {Weiming Yang and
               Jinhui Xu and
               Yingjian Yan and
               Kai Liu},
  editor    = {Yongchuan Tang and
               Jonathan Lawry},
  title     = {Research on Time Randomization of {AES} against Differential Power
               Analysis},
  booktitle = {2009 Second International Symposium on Computational Intelligence
               and Design, {ISCID} 2009, Changsha, Hunan, China, 12-14 December 2009,
               2 Volumes},
  pages     = {536--539},
  publisher = {{IEEE} Computer Society},
  year      = {2009},
  url       = {https://doi.org/10.1109/ISCID.2009.280},
  doi       = {10.1109/ISCID.2009.280},
  timestamp = {Wed, 16 Oct 2019 14:14:50 +0200},
  biburl    = {https://dblp.org/rec/conf/iscid/YangXYL09.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/spl/RyooHKL08,
  author    = {Jeong Choon Ryoo and
               Dong{-}Guk Han and
               Sung{-}Kyoung Kim and
               Sangjin Lee},
  title     = {Performance Enhancement of Differential Power Analysis Attacks With
               Signal Companding Methods},
  journal   = {{IEEE} Signal Process. Lett.},
  volume    = {15},
  pages     = {625--628},
  year      = {2008},
  url       = {https://doi.org/10.1109/LSP.2008.2002930},
  doi       = {10.1109/LSP.2008.2002930},
  timestamp = {Sun, 28 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/spl/RyooHKL08.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tc/MuresanG08,
  author    = {Radu Muresan and
               Stefano Gregori},
  title     = {Protection Circuit against Differential Power Analysis Attacks for
               Smart Cards},
  journal   = {{IEEE} Trans. Computers},
  volume    = {57},
  number    = {11},
  pages     = {1540--1549},
  year      = {2008},
  url       = {https://doi.org/10.1109/TC.2008.107},
  doi       = {10.1109/TC.2008.107},
  timestamp = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tc/MuresanG08.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/delta/NataleFR08,
  author    = {Giorgio Di Natale and
               Marie{-}Lise Flottes and
               Bruno Rouzeyre},
  title     = {An Integrated Validation Environment for Differential Power Analysis},
  booktitle = {4th {IEEE} International Symposium on Electronic Design, Test and
               Applications, {DELTA} 2008, Hong Kong, January 23-25, 2008},
  pages     = {527--532},
  publisher = {{IEEE} Computer Society},
  year      = {2008},
  url       = {https://doi.org/10.1109/DELTA.2008.61},
  doi       = {10.1109/DELTA.2008.61},
  timestamp = {Wed, 16 Oct 2019 14:14:54 +0200},
  biburl    = {https://dblp.org/rec/conf/delta/NataleFR08.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eit/SunYZ08,
  author    = {Song Sun and
               Zijun Yan and
               Joseph Zambreno},
  title     = {Experiments in attacking FPGA-based embedded systems using differential
               power analysis},
  booktitle = {2008 {IEEE} International Conference on Electro/Information Technology,
               {EIT} 2008, held at Iowa State University, Ames, Iowa, USA, May 18-20,
               2008},
  pages     = {7--12},
  publisher = {{IEEE}},
  year      = {2008},
  url       = {https://doi.org/10.1109/EIT.2008.4554259},
  doi       = {10.1109/EIT.2008.4554259},
  timestamp = {Wed, 24 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/conf/eit/SunYZ08.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icecsys/GiancaneMOST08,
  author    = {Luca Giancane and
               Piero Marietti and
               Mauro Olivieri and
               Giuseppe Scotti and
               Alessandro Trifiletti},
  title     = {A new dynamic differential logic style as a countermeasure to power
               analysis attacks},
  booktitle = {15th {IEEE} International Conference on Electronics, Circuits and
               Systems, {ICECS} 2008, St. Julien's, Malta, August 31 2008-September
               3, 2008},
  pages     = {364--367},
  publisher = {{IEEE}},
  year      = {2008},
  url       = {https://doi.org/10.1109/ICECS.2008.4674866},
  doi       = {10.1109/ICECS.2008.4674866},
  timestamp = {Wed, 16 Oct 2019 14:14:55 +0200},
  biburl    = {https://dblp.org/rec/conf/icecsys/GiancaneMOST08.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icecsys/StrachackiS08,
  author    = {Marek Strachacki and
               Stanislaw Szczepanski},
  title     = {Implementation of {AES} algorithm resistant to differential power
               analysis},
  booktitle = {15th {IEEE} International Conference on Electronics, Circuits and
               Systems, {ICECS} 2008, St. Julien's, Malta, August 31 2008-September
               3, 2008},
  pages     = {214--217},
  publisher = {{IEEE}},
  year      = {2008},
  url       = {https://doi.org/10.1109/ICECS.2008.4674829},
  doi       = {10.1109/ICECS.2008.4674829},
  timestamp = {Tue, 23 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/conf/icecsys/StrachackiS08.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iscas/AliotoPR08,
  author    = {Massimo Alioto and
               Massimo Poli and
               Santina Rocchi},
  title     = {A general model for differential power analysis attacks to static
               logic circuits},
  booktitle = {International Symposium on Circuits and Systems {(ISCAS} 2008), 18-21
               May 2008, Sheraton Seattle Hotel, Seattle, Washington, {USA}},
  pages     = {3346--3349},
  publisher = {{IEEE}},
  year      = {2008},
  url       = {https://doi.org/10.1109/ISCAS.2008.4542175},
  doi       = {10.1109/ISCAS.2008.4542175},
  timestamp = {Wed, 16 Oct 2019 14:14:49 +0200},
  biburl    = {https://dblp.org/rec/conf/iscas/AliotoPR08.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iscas/BayamO08,
  author    = {Keklik Alptekin Bayam and
               Siddika Berna {\"{O}}rs},
  title     = {Differential Power Analysis resistant hardware implementation of the
               {RSA} cryptosystem},
  booktitle = {International Symposium on Circuits and Systems {(ISCAS} 2008), 18-21
               May 2008, Sheraton Seattle Hotel, Seattle, Washington, {USA}},
  pages     = {3314--3317},
  publisher = {{IEEE}},
  year      = {2008},
  url       = {https://doi.org/10.1109/ISCAS.2008.4542167},
  doi       = {10.1109/ISCAS.2008.4542167},
  timestamp = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/conf/iscas/BayamO08.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iscas/LinB08,
  author    = {Lang Lin and
               Wayne P. Burleson},
  title     = {Leakage-based differential power analysis {(LDPA)} on sub-90nm {CMOS}
               cryptosystems},
  booktitle = {International Symposium on Circuits and Systems {(ISCAS} 2008), 18-21
               May 2008, Sheraton Seattle Hotel, Seattle, Washington, {USA}},
  pages     = {252--255},
  publisher = {{IEEE}},
  year      = {2008},
  url       = {https://doi.org/10.1109/ISCAS.2008.4541402},
  doi       = {10.1109/ISCAS.2008.4541402},
  timestamp = {Mon, 06 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/conf/iscas/LinB08.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iscas/LuOM08,
  author    = {Yingxi Lu and
               M{\'{a}}ire O'Neill and
               John V. McCanny},
  title     = {Differential Power Analysis of a {SHACAL-2} hardware implementation},
  booktitle = {International Symposium on Circuits and Systems {(ISCAS} 2008), 18-21
               May 2008, Sheraton Seattle Hotel, Seattle, Washington, {USA}},
  pages     = {2933--2936},
  publisher = {{IEEE}},
  year      = {2008},
  url       = {https://doi.org/10.1109/ISCAS.2008.4542072},
  doi       = {10.1109/ISCAS.2008.4542072},
  timestamp = {Fri, 26 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/conf/iscas/LuOM08.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sbcci/GhellarL08,
  author    = {Felipe Ghellar and
               Marcelo Lubaszewski},
  editor    = {Marcelo Lubaszewski and
               Michel Renovell and
               Rajesh K. Gupta},
  title     = {A novel {AES} cryptographic core highly resistant to differential
               power analysis attacks},
  booktitle = {Proceedings of the 21st Annual Symposium on Integrated Circuits and
               Systems Design, {SBCCI} 2008, Gramado, Brazil, September 1-4, 2008},
  pages     = {140--145},
  publisher = {{ACM}},
  year      = {2008},
  url       = {https://doi.org/10.1145/1404371.1404413},
  doi       = {10.1145/1404371.1404413},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/conf/sbcci/GhellarL08.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/synasc/AmbroseAIP08,
  author    = {Jude Angelo Ambrose and
               Naeill Aldon and
               Aleksandar Ignjatovic and
               Sri Parameswaran},
  editor    = {Viorel Negru and
               Tudor Jebelean and
               Dana Petcu and
               Daniela Zaharie},
  title     = {Anatomy of Differential Power Analysis for {AES}},
  booktitle = {{SYNASC} 2008, 10th International Symposium on Symbolic and Numeric
               Algorithms for Scientific Computing, Timisoara, Romania, 26-29 September
               2008},
  pages     = {459--466},
  publisher = {{IEEE} Computer Society},
  year      = {2008},
  url       = {https://doi.org/10.1109/SYNASC.2008.8},
  doi       = {10.1109/SYNASC.2008.8},
  timestamp = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/conf/synasc/AmbroseAIP08.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/LeeLK07,
  author    = {Jong Suk Lee and
               Jae Woon Lee and
               Young Hwan Kim},
  title     = {Symmetric Discharge Logic against Differential Power Analysis},
  journal   = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume    = {90-A},
  number    = {1},
  pages     = {234--240},
  year      = {2007},
  url       = {https://doi.org/10.1093/ietfec/e90-a.1.234},
  doi       = {10.1093/ietfec/e90-a.1.234},
  timestamp = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ieicet/LeeLK07.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/FischerGKV07,
  author    = {Wieland Fischer and
               Berndt M. Gammel and
               O. Kniffler and
               Joachim Velten},
  editor    = {Masayuki Abe},
  title     = {Differential Power Analysis of Stream Ciphers},
  booktitle = {Topics in Cryptology - {CT-RSA} 2007, The Cryptographers' Track at
               the {RSA} Conference 2007, San Francisco, CA, USA, February 5-9, 2007,
               Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {4377},
  pages     = {257--270},
  publisher = {Springer},
  year      = {2007},
  url       = {https://doi.org/10.1007/11967668\_17},
  doi       = {10.1007/11967668\_17},
  timestamp = {Tue, 14 May 2019 10:00:52 +0200},
  biburl    = {https://dblp.org/rec/conf/ctrsa/FischerGKV07.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/indocrypt/FumaroliMD07,
  author    = {Guillaume Fumaroli and
               Emmanuel Mayer and
               Renaud Dubois},
  editor    = {K. Srinathan and
               C. Pandu Rangan and
               Moti Yung},
  title     = {First-Order Differential Power Analysis on the Duplication Method},
  booktitle = {Progress in Cryptology - {INDOCRYPT} 2007, 8th International Conference
               on Cryptology in India, Chennai, India, December 9-13, 2007, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {4859},
  pages     = {210--223},
  publisher = {Springer},
  year      = {2007},
  url       = {https://doi.org/10.1007/978-3-540-77026-8\_16},
  doi       = {10.1007/978-3-540-77026-8\_16},
  timestamp = {Tue, 14 May 2019 10:00:51 +0200},
  biburl    = {https://dblp.org/rec/conf/indocrypt/FumaroliMD07.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/indocrypt/KumarMC07,
  author    = {Kundan Kumar and
               Debdeep Mukhopadhyay and
               Dipanwita Roy Chowdhury},
  editor    = {K. Srinathan and
               C. Pandu Rangan and
               Moti Yung},
  title     = {Design of a Differential Power Analysis Resistant Masked {AES} S-Box},
  booktitle = {Progress in Cryptology - {INDOCRYPT} 2007, 8th International Conference
               on Cryptology in India, Chennai, India, December 9-13, 2007, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {4859},
  pages     = {373--383},
  publisher = {Springer},
  year      = {2007},
  url       = {https://doi.org/10.1007/978-3-540-77026-8\_29},
  doi       = {10.1007/978-3-540-77026-8\_29},
  timestamp = {Fri, 19 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/conf/indocrypt/KumarMC07.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iscas/AliotoPRV07,
  author    = {Massimo Alioto and
               Massimo Poli and
               Santina Rocchi and
               Valerio Vignoli},
  title     = {Mixed Techniques to Protect Precharged Busses against Differential
               Power Analysis Attacks},
  booktitle = {International Symposium on Circuits and Systems {(ISCAS} 2007), 27-20
               May 2007, New Orleans, Louisiana, {USA}},
  pages     = {861--864},
  publisher = {{IEEE}},
  year      = {2007},
  url       = {https://doi.org/10.1109/ISCAS.2007.378042},
  doi       = {10.1109/ISCAS.2007.378042},
  timestamp = {Wed, 16 Oct 2019 14:14:49 +0200},
  biburl    = {https://dblp.org/rec/conf/iscas/AliotoPRV07.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vlsid/BaddamZ07,
  author    = {Karthik Baddam and
               Mark Zwolinski},
  title     = {Evaluation of Dynamic Voltage and Frequency Scaling as a Differential
               Power Analysis Countermeasure},
  booktitle = {20th International Conference on {VLSI} Design {(VLSI} Design 2007),
               Sixth International Conference on Embedded Systems {(ICES} 2007),
               6-10 January 2007, Bangalore, India},
  pages     = {854--862},
  publisher = {{IEEE} Computer Society},
  year      = {2007},
  url       = {https://doi.org/10.1109/VLSID.2007.79},
  doi       = {10.1109/VLSID.2007.79},
  timestamp = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/conf/vlsid/BaddamZ07.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/McEvoyTMM07,
  author    = {Robert P. McEvoy and
               Michael Tunstall and
               Colin C. Murphy and
               William P. Marnane},
  editor    = {Sehun Kim and
               Moti Yung and
               Hyung{-}Woo Lee},
  title     = {Differential Power Analysis of {HMAC} Based on SHA-2, and Countermeasures},
  booktitle = {Information Security Applications, 8th International Workshop, {WISA}
               2007, Jeju Island, Korea, August 27-29, 2007, Revised Selected Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {4867},
  pages     = {317--332},
  publisher = {Springer},
  year      = {2007},
  url       = {https://doi.org/10.1007/978-3-540-77535-5\_23},
  doi       = {10.1007/978-3-540-77535-5\_23},
  timestamp = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/conf/wisa/McEvoyTMM07.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/entcs/GurkaynakOKFF06,
  author    = {Frank K. G{\"{u}}rkaynak and
               Stephan Oetiker and
               Hubert Kaeslin and
               Norbert Felber and
               Wolfgang Fichtner},
  title     = {Design Challenges for a Differential-Power-Analysis Aware GALS-based
               {AES} Crypto {ASIC}},
  journal   = {Electron. Notes Theor. Comput. Sci.},
  volume    = {146},
  number    = {2},
  pages     = {133--149},
  year      = {2006},
  url       = {https://doi.org/10.1016/j.entcs.2005.05.039},
  doi       = {10.1016/j.entcs.2005.05.039},
  timestamp = {Fri, 12 Feb 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/entcs/GurkaynakOKFF06.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iandc/Lv06,
  author    = {Jiqiang Lv},
  title     = {On two {DES} implementations secure against differential power analysis
               in smart-cards},
  journal   = {Inf. Comput.},
  volume    = {204},
  number    = {7},
  pages     = {1179--1193},
  year      = {2006},
  url       = {https://doi.org/10.1016/j.ic.2006.04.002},
  doi       = {10.1016/j.ic.2006.04.002},
  timestamp = {Fri, 12 Feb 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/iandc/Lv06.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jssc/HwangTHLYSV06,
  author    = {David D. Hwang and
               Kris Tiri and
               Alireza Hodjat and
               Bo{-}Cheng Lai and
               Shenglin Yang and
               Patrick Schaumont and
               Ingrid Verbauwhede},
  title     = {AES-Based Security Coprocessor {IC} in 0.18-{\textdollar}muhbox m{\textdollar}CMOS
               With Resistance to Differential Power Analysis Side-Channel Attacks},
  journal   = {{IEEE} J. Solid State Circuits},
  volume    = {41},
  number    = {4},
  pages     = {781--792},
  year      = {2006},
  url       = {https://doi.org/10.1109/JSSC.2006.870913},
  doi       = {10.1109/JSSC.2006.870913},
  timestamp = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/jssc/HwangTHLYSV06.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cardis/AkishitaT06,
  author    = {Toru Akishita and
               Tsuyoshi Takagi},
  editor    = {Josep Domingo{-}Ferrer and
               Joachim Posegga and
               Daniel Schreckling},
  title     = {Power Analysis to {ECC} Using Differential Power Between Multiplication
               and Squaring},
  booktitle = {Smart Card Research and Advanced Applications, 7th {IFIP} {WG} 8.8/11.2
               International Conference, {CARDIS} 2006, Tarragona, Spain, April 19-21,
               2006, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {3928},
  pages     = {151--164},
  publisher = {Springer},
  year      = {2006},
  url       = {https://doi.org/10.1007/11733447\_11},
  doi       = {10.1007/11733447\_11},
  timestamp = {Tue, 14 May 2019 10:00:52 +0200},
  biburl    = {https://dblp.org/rec/conf/cardis/AkishitaT06.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/ParkLHCKM06,
  author    = {JeaHoon Park and
               Hoon{-}Jae Lee and
               JaeCheol Ha and
               YongJe Choi and
               Howon Kim and
               Sang{-}Jae Moon},
  editor    = {Yuping Wang and
               Yiu{-}ming Cheung and
               Hai{-}Lin Liu},
  title     = {A Differential Power Analysis Attack of Block Cipher Based on the
               Hamming Weight of Internal Operation Unit},
  booktitle = {Computational Intelligence and Security, International Conference,
               {CIS} 2006, Guangzhou, China, November 3-6, 2006, Revised Selected
               Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {4456},
  pages     = {417--426},
  publisher = {Springer},
  year      = {2006},
  url       = {https://doi.org/10.1007/978-3-540-74377-4\_44},
  doi       = {10.1007/978-3-540-74377-4\_44},
  timestamp = {Tue, 19 Nov 2019 12:34:54 +0100},
  biburl    = {https://dblp.org/rec/conf/cis/ParkLHCKM06.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iscas/CorsonelloPM06,
  author    = {Pasquale Corsonello and
               Stefania Perri and
               Martin Margala},
  title     = {An integrated countermeasure against differential power analysis for
               secure smart-cards},
  booktitle = {International Symposium on Circuits and Systems {(ISCAS} 2006), 21-24
               May 2006, Island of Kos, Greece},
  publisher = {{IEEE}},
  year      = {2006},
  url       = {https://doi.org/10.1109/ISCAS.2006.1693907},
  doi       = {10.1109/ISCAS.2006.1693907},
  timestamp = {Wed, 16 Oct 2019 14:14:49 +0200},
  biburl    = {https://dblp.org/rec/conf/iscas/CorsonelloPM06.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/patmos/AliotoPRV06a,
  author    = {Massimo Alioto and
               Massimo Poli and
               Santina Rocchi and
               Valerio Vignoli},
  editor    = {Johan Vounckx and
               Nadine Az{\'{e}}mard and
               Philippe Maurine},
  title     = {Techniques to Enhance the Resistance of Precharged Busses to Differential
               Power Analysis},
  booktitle = {Integrated Circuit and System Design. Power and Timing Modeling, Optimization
               and Simulation, 16th International Workshop, {PATMOS} 2006, Montpellier,
               France, September 13-15, 2006, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {4148},
  pages     = {624--633},
  publisher = {Springer},
  year      = {2006},
  url       = {https://doi.org/10.1007/11847083\_61},
  doi       = {10.1007/11847083\_61},
  timestamp = {Tue, 14 May 2019 10:00:54 +0200},
  biburl    = {https://dblp.org/rec/conf/patmos/AliotoPRV06a.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/LvH05,
  author    = {Jiqiang Lv and
               Yongfei Han},
  editor    = {Colin Boyd and
               Juan Manuel Gonz{\'{a}}lez Nieto},
  title     = {Enhanced {DES} Implementation Secure Against High-Order Differential
               Power Analysis in Smartcards},
  booktitle = {Information Security and Privacy, 10th Australasian Conference, {ACISP}
               2005, Brisbane, Australia, July 4-6, 2005, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {3574},
  pages     = {195--206},
  publisher = {Springer},
  year      = {2005},
  url       = {https://doi.org/10.1007/11506157\_17},
  doi       = {10.1007/11506157\_17},
  timestamp = {Tue, 14 May 2019 10:00:46 +0200},
  biburl    = {https://dblp.org/rec/conf/acisp/LvH05.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/JoyePS05,
  author    = {Marc Joye and
               Pascal Paillier and
               Berry Schoenmakers},
  editor    = {Josyula R. Rao and
               Berk Sunar},
  title     = {On Second-Order Differential Power Analysis},
  booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2005, 7th International
               Workshop, Edinburgh, UK, August 29 - September 1, 2005, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {3659},
  pages     = {293--308},
  publisher = {Springer},
  year      = {2005},
  url       = {https://doi.org/10.1007/11545262\_22},
  doi       = {10.1007/11545262\_22},
  timestamp = {Tue, 14 May 2019 10:00:47 +0200},
  biburl    = {https://dblp.org/rec/conf/ches/JoyePS05.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hpcc/HaKMPY05,
  author    = {JaeCheol Ha and
               ChangKyun Kim and
               Sang{-}Jae Moon and
               IlHwan Park and
               HyungSo Yoo},
  editor    = {Laurence Tianruo Yang and
               Omer F. Rana and
               Beniamino Di Martino and
               Jack J. Dongarra},
  title     = {Differential Power Analysis on Block Cipher {ARIA}},
  booktitle = {High Performance Computing and Communications, First International
               Conference, {HPCC} 2005, Sorrento, Italy, September 21-23, 2005, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {3726},
  pages     = {541--548},
  publisher = {Springer},
  year      = {2005},
  url       = {https://doi.org/10.1007/11557654\_63},
  doi       = {10.1007/11557654\_63},
  timestamp = {Tue, 14 May 2019 10:00:45 +0200},
  biburl    = {https://dblp.org/rec/conf/hpcc/HaKMPY05.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iscas/BucciLGT05,
  author    = {Marco Bucci and
               Raimondo Luzzi and
               Michele Guglielmo and
               Alessandro Trifiletti},
  title     = {A countermeasure against differential power analysis based on random
               delay insertion},
  booktitle = {International Symposium on Circuits and Systems {(ISCAS} 2005), 23-26
               May 2005, Kobe, Japan},
  pages     = {3547--3550},
  publisher = {{IEEE}},
  year      = {2005},
  url       = {https://doi.org/10.1109/ISCAS.2005.1465395},
  doi       = {10.1109/ISCAS.2005.1465395},
  timestamp = {Wed, 16 Oct 2019 14:14:49 +0200},
  biburl    = {https://dblp.org/rec/conf/iscas/BucciLGT05.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/Caddy05a,
  author    = {Tom Caddy},
  editor    = {Henk C. A. van Tilborg},
  title     = {Differential Power Analysis},
  booktitle = {Encyclopedia of Cryptography and Security},
  publisher = {Springer},
  year      = {2005},
  url       = {https://doi.org/10.1007/0-387-23483-7\_110},
  doi       = {10.1007/0-387-23483-7\_110},
  timestamp = {Thu, 27 Jun 2019 15:50:13 +0200},
  biburl    = {https://dblp.org/rec/reference/crypt/Caddy05a.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cardis/GuilleyHP04,
  author    = {Sylvain Guilley and
               Philippe Hoogvorst and
               Renaud Pacalet},
  editor    = {Jean{-}Jacques Quisquater and
               Pierre Paradinas and
               Yves Deswarte and
               Anas Abou El Kalam},
  title     = {Differential Power Analysis Model and Some Results},
  booktitle = {Smart Card Research and Advanced Applications VI, {IFIP} 18th World
               Computer Congress, {TC8/WG8.8} {\&} {TC11/WG11.2} Sixth International
               Conference on Smart Card Research and Advanced Applications (CARDIS),
               22-27 August 2004, Toulouse, France},
  series    = {{IFIP}},
  volume    = {153},
  pages     = {127--142},
  publisher = {Kluwer/Springer},
  year      = {2004},
  url       = {https://doi.org/10.1007/1-4020-8147-2\_9},
  doi       = {10.1007/1-4020-8147-2\_9},
  timestamp = {Tue, 23 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/conf/cardis/GuilleyHP04.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/TiriV04a,
  author    = {Kris Tiri and
               Ingrid Verbauwhede},
  title     = {Charge Recycling Sense Amplifier Based Logic: Securing Low Power Security
               IC's against Differential Power Analysis},
  journal   = {{IACR} Cryptol. ePrint Arch.},
  pages     = {67},
  year      = {2004},
  url       = {http://eprint.iacr.org/2004/067},
  timestamp = {Mon, 11 May 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/iacr/TiriV04a.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/Avanzi03,
  author    = {Roberto Maria Avanzi},
  editor    = {Colin D. Walter and
               {\c{C}}etin Kaya Ko{\c{c}} and
               Christof Paar},
  title     = {Countermeasures against Differential Power Analysis for Hyperelliptic
               Curve Cryptosystems},
  booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2003, 5th International
               Workshop, Cologne, Germany, September 8-10, 2003, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {2779},
  pages     = {366--381},
  publisher = {Springer},
  year      = {2003},
  url       = {https://doi.org/10.1007/978-3-540-45238-6\_29},
  doi       = {10.1007/978-3-540-45238-6\_29},
  timestamp = {Tue, 14 May 2019 10:00:47 +0200},
  biburl    = {https://dblp.org/rec/conf/ches/Avanzi03.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/ItohIT03,
  author    = {Kouichi Itoh and
               Tetsuya Izu and
               Masahiko Takenaka},
  editor    = {Colin D. Walter and
               {\c{C}}etin Kaya Ko{\c{c}} and
               Christof Paar},
  title     = {A Practical Countermeasure against Address-Bit Differential Power
               Analysis},
  booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2003, 5th International
               Workshop, Cologne, Germany, September 8-10, 2003, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {2779},
  pages     = {382--396},
  publisher = {Springer},
  year      = {2003},
  url       = {https://doi.org/10.1007/978-3-540-45238-6\_30},
  doi       = {10.1007/978-3-540-45238-6\_30},
  timestamp = {Sun, 21 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/conf/ches/ItohIT03.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csreaSAM/ChoiLKCW03,
  author    = {Hee Bong Choi and
               Hyoon Jae Lee and
               Choon Su Kim and
               Byung Hwa Chang and
               Dongho Won},
  editor    = {Hamid R. Arabnia and
               Youngsong Mun},
  title     = {On Differential Power Analysis Attack on the Addition Modular 2\({}^{\mbox{N}}\)
               Operation of Smart Cards},
  booktitle = {Proceedings of the International Conference on Security and Management,
               {SAM} '03, June 23 - 26, 2003, Las Vegas, Nevada, USA, Volume 1},
  pages     = {260--266},
  publisher = {{CSREA} Press},
  year      = {2003},
  timestamp = {Wed, 06 Dec 2006 10:55:26 +0100},
  biburl    = {https://dblp.org/rec/conf/csreaSAM/ChoiLKCW03.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dac/BeniniMMOPP03,
  author    = {Luca Benini and
               Alberto Macii and
               Enrico Macii and
               Elvira Omerbegovic and
               Fabrizio Pro and
               Massimo Poncino},
  title     = {Energy-aware design techniques for differential power analysis protection},
  booktitle = {Proceedings of the 40th Design Automation Conference, {DAC} 2003,
               Anaheim, CA, USA, June 2-6, 2003},
  pages     = {36--41},
  publisher = {{ACM}},
  year      = {2003},
  url       = {https://doi.org/10.1145/775832.775845},
  doi       = {10.1145/775832.775845},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/conf/dac/BeniniMMOPP03.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/AkkarG03,
  author    = {Mehdi{-}Laurent Akkar and
               Louis Goubin},
  editor    = {Thomas Johansson},
  title     = {A Generic Protection against High-Order Differential Power Analysis},
  booktitle = {Fast Software Encryption, 10th International Workshop, {FSE} 2003,
               Lund, Sweden, February 24-26, 2003, Revised Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {2887},
  pages     = {192--205},
  publisher = {Springer},
  year      = {2003},
  url       = {https://doi.org/10.1007/978-3-540-39887-5\_15},
  doi       = {10.1007/978-3-540-39887-5\_15},
  timestamp = {Tue, 14 May 2019 10:00:54 +0200},
  biburl    = {https://dblp.org/rec/conf/fse/AkkarG03.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/Novak03,
  author    = {Roman Novak},
  editor    = {Kijoon Chae and
               Moti Yung},
  title     = {Sign-Based Differential Power Analysis},
  booktitle = {Information Security Applications, 4th International Workshop, {WISA}
               2003, Jeju Island, Korea, August 25-27, 2003, Revised Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {2908},
  pages     = {203--216},
  publisher = {Springer},
  year      = {2003},
  url       = {https://doi.org/10.1007/978-3-540-24591-9\_16},
  doi       = {10.1007/978-3-540-24591-9\_16},
  timestamp = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/conf/wisa/Novak03.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/ItohIT02,
  author    = {Kouichi Itoh and
               Tetsuya Izu and
               Masahiko Takenaka},
  editor    = {Burton S. Kaliski Jr. and
               {\c{C}}etin Kaya Ko{\c{c}} and
               Christof Paar},
  title     = {Address-Bit Differential Power Analysis of Cryptographic Schemes {OK-ECDH}
               and {OK-ECDSA}},
  booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2002, 4th International
               Workshop, Redwood Shores, CA, USA, August 13-15, 2002, Revised Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {2523},
  pages     = {129--143},
  publisher = {Springer},
  year      = {2002},
  url       = {https://doi.org/10.1007/3-540-36400-5\_11},
  doi       = {10.1007/3-540-36400-5\_11},
  timestamp = {Tue, 14 May 2019 10:00:47 +0200},
  biburl    = {https://dblp.org/rec/conf/ches/ItohIT02.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/BevanK02,
  author    = {R{\'{e}}gis Bevan and
               Erik Knudsen},
  editor    = {Pil Joong Lee and
               Chae Hoon Lim},
  title     = {Ways to Enhance Differential Power Analysis},
  booktitle = {Information Security and Cryptology - {ICISC} 2002, 5th International
               Conference Seoul, Korea, November 28-29, 2002, Revised Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {2587},
  pages     = {327--342},
  publisher = {Springer},
  year      = {2002},
  url       = {https://doi.org/10.1007/3-540-36552-4\_23},
  doi       = {10.1007/3-540-36552-4\_23},
  timestamp = {Tue, 14 May 2019 10:00:36 +0200},
  biburl    = {https://dblp.org/rec/conf/icisc/BevanK02.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iscas/ChaniotisPH01,
  author    = {Dimitrios Chaniotis and
               M. A. Pai and
               Ian A. Hiskens},
  title     = {Sensitivity analysis of differential-algebraic systems using the {GMRES}
               method-application to power systems},
  booktitle = {Proceedings of the 2001 International Symposium on Circuits and Systems,
               {ISCAS} 2001, Sydney, Australia, May 6-9, 2001},
  pages     = {117--120},
  publisher = {{IEEE}},
  year      = {2001},
  url       = {https://doi.org/10.1109/ISCAS.2001.921260},
  doi       = {10.1109/ISCAS.2001.921260},
  timestamp = {Thu, 29 Jul 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/conf/iscas/ChaniotisPH01.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/ClavierCD00,
  author    = {Christophe Clavier and
               Jean{-}S{\'{e}}bastien Coron and
               Nora Dabbous},
  editor    = {{\c{C}}etin Kaya Ko{\c{c}} and
               Christof Paar},
  title     = {Differential Power Analysis in the Presence of Hardware Countermeasures},
  booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2000, Second
               International Workshop, Worcester, MA, USA, August 17-18, 2000, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {1965},
  pages     = {252--263},
  publisher = {Springer},
  year      = {2000},
  url       = {https://doi.org/10.1007/3-540-44499-8\_20},
  doi       = {10.1007/3-540-44499-8\_20},
  timestamp = {Tue, 14 May 2019 10:00:47 +0200},
  biburl    = {https://dblp.org/rec/conf/ches/ClavierCD00.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/CoronG00,
  author    = {Jean{-}S{\'{e}}bastien Coron and
               Louis Goubin},
  editor    = {{\c{C}}etin Kaya Ko{\c{c}} and
               Christof Paar},
  title     = {On Boolean and Arithmetic Masking against Differential Power Analysis},
  booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2000, Second
               International Workshop, Worcester, MA, USA, August 17-18, 2000, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {1965},
  pages     = {231--237},
  publisher = {Springer},
  year      = {2000},
  url       = {https://doi.org/10.1007/3-540-44499-8\_18},
  doi       = {10.1007/3-540-44499-8\_18},
  timestamp = {Sun, 21 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/conf/ches/CoronG00.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/Coron99,
  author    = {Jean{-}S{\'{e}}bastien Coron},
  editor    = {{\c{C}}etin Kaya Ko{\c{c}} and
               Christof Paar},
  title     = {Resistance against Differential Power Analysis for Elliptic Curve
               Cryptosystems},
  booktitle = {Cryptographic Hardware and Embedded Systems, First International Workshop,
               CHES'99, Worcester, MA, USA, August 12-13, 1999, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {1717},
  pages     = {292--302},
  publisher = {Springer},
  year      = {1999},
  url       = {https://doi.org/10.1007/3-540-48059-5\_25},
  doi       = {10.1007/3-540-48059-5\_25},
  timestamp = {Tue, 14 May 2019 10:00:47 +0200},
  biburl    = {https://dblp.org/rec/conf/ches/Coron99.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/GoubinP99,
  author    = {Louis Goubin and
               Jacques Patarin},
  editor    = {{\c{C}}etin Kaya Ko{\c{c}} and
               Christof Paar},
  title     = {{DES} and Differential Power Analysis (The "Duplication" Method)},
  booktitle = {Cryptographic Hardware and Embedded Systems, First International Workshop,
               CHES'99, Worcester, MA, USA, August 12-13, 1999, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {1717},
  pages     = {158--172},
  publisher = {Springer},
  year      = {1999},
  url       = {https://doi.org/10.1007/3-540-48059-5\_15},
  doi       = {10.1007/3-540-48059-5\_15},
  timestamp = {Sun, 21 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/conf/ches/GoubinP99.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/KocherJJ99,
  author    = {Paul C. Kocher and
               Joshua Jaffe and
               Benjamin Jun},
  editor    = {Michael J. Wiener},
  title     = {Differential Power Analysis},
  booktitle = {Advances in Cryptology - {CRYPTO} '99, 19th Annual International Cryptology
               Conference, Santa Barbara, California, USA, August 15-19, 1999, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {1666},
  pages     = {388--397},
  publisher = {Springer},
  year      = {1999},
  url       = {https://doi.org/10.1007/3-540-48405-1\_25},
  doi       = {10.1007/3-540-48405-1\_25},
  timestamp = {Tue, 14 May 2019 10:00:48 +0200},
  biburl    = {https://dblp.org/rec/conf/crypto/KocherJJ99.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics