


Остановите войну!
for scientists:
Search dblp for Publications
export results for "Differential power analysis"
@article{DBLP:journals/access/KumarJDM21, author = {Abhishek Kumar and Bablesh Kumar Jha and Swagatam Das and Rammohan Mallipeddi}, title = {Power Flow Analysis of Islanded Microgrids: {A} Differential Evolution Approach}, journal = {{IEEE} Access}, volume = {9}, pages = {61721--61738}, year = {2021}, url = {https://doi.org/10.1109/ACCESS.2021.3073509}, doi = {10.1109/ACCESS.2021.3073509}, timestamp = {Sun, 16 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/KumarJDM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/bioinformatics/HoffmanR21, author = {Gabriel E. Hoffman and Panos Roussos}, title = {Dream: powerful differential expression analysis for repeated measures designs}, journal = {Bioinform.}, volume = {37}, number = {2}, pages = {192--201}, year = {2021}, url = {https://doi.org/10.1093/bioinformatics/btaa687}, doi = {10.1093/bioinformatics/btaa687}, timestamp = {Tue, 01 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/bioinformatics/HoffmanR21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/SimJB21, author = {Siang Meng Sim and Dirmanto Jap and Shivam Bhasin}, title = {{DAPA:} Differential Analysis aided Power Attack on (Non-) Linear Feedback Shift Registers}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2021}, number = {1}, pages = {169--191}, year = {2021}, url = {https://doi.org/10.46586/tches.v2021.i1.169-191}, doi = {10.46586/tches.v2021.i1.169-191}, timestamp = {Fri, 29 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tches/SimJB21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ChenNCLG21, author = {Juncheng Chen and Jun{-}Sheng Ng and Kwen{-}Siong Chong and Zhiping Lin and Bah{-}Hwee Gwee}, title = {A Novel Normalized Variance-Based Differential Power Analysis Against Masking Countermeasures}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {16}, pages = {3767--3779}, year = {2021}, url = {https://doi.org/10.1109/TIFS.2021.3093783}, doi = {10.1109/TIFS.2021.3093783}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/ChenNCLG21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iscas/ChenNKLHCLCG21, author = {Juncheng Chen and Jun{-}Sheng Ng and Nay Aung Kyaw and Ne Kyaw Zwa Lwin and Weng{-}Geng Ho and Kwen{-}Siong Chong and Zhiping Lin and Joseph Sylvester Chang and Bah{-}Hwee Gwee}, title = {Normalized Differential Power Analysis - for Ghost Peaks Mitigation}, booktitle = {{IEEE} International Symposium on Circuits and Systems, {ISCAS} 2021, Daegu, South Korea, May 22-28, 2021}, pages = {1--5}, year = {2021}, crossref = {DBLP:conf/iscas/2021}, url = {https://doi.org/10.1109/ISCAS51556.2021.9401487}, doi = {10.1109/ISCAS51556.2021.9401487}, timestamp = {Fri, 02 Jul 2021 12:26:54 +0200}, biburl = {https://dblp.org/rec/conf/iscas/ChenNKLHCLCG21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pqcrypto/GellersenSE21, author = {Tim Gellersen and Okan Seker and Thomas Eisenbarth}, title = {Differential Power Analysis of the Picnic Signature Scheme}, booktitle = {Post-Quantum Cryptography - 12th International Workshop, PQCrypto 2021, Daejeon, South Korea, July 20-22, 2021, Proceedings}, pages = {177--194}, year = {2021}, crossref = {DBLP:conf/pqcrypto/2021}, url = {https://doi.org/10.1007/978-3-030-81293-5\_10}, doi = {10.1007/978-3-030-81293-5\_10}, timestamp = {Wed, 21 Jul 2021 15:51:05 +0200}, biburl = {https://dblp.org/rec/conf/pqcrypto/GellersenSE21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2108-11115, author = {Behrooz Khadem and Hamid Ghanbari and Amin Masoumi Souteh}, title = {Correlation Differential Power Analysis Attack to Midori64}, journal = {CoRR}, volume = {abs/2108.11115}, year = {2021}, url = {https://arxiv.org/abs/2108.11115}, eprinttype = {arXiv}, eprint = {2108.11115}, timestamp = {Fri, 27 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2108-11115.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/CaiLKT20, author = {Xiaomin Cai and Renfa Li and Shijie Kuang and Jinhui Tan}, title = {An Energy Trace Compression Method for Differential Power Analysis Attack}, journal = {{IEEE} Access}, volume = {8}, pages = {89084--89092}, year = {2020}, url = {https://doi.org/10.1109/ACCESS.2020.2993701}, doi = {10.1109/ACCESS.2020.2993701}, timestamp = {Tue, 16 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/CaiLKT20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/bmcbi/YuFB20, author = {Lianbo Yu and Soledad Fernandez and Guy N. Brock}, title = {Power analysis for RNA-Seq differential expression studies using generalized linear mixed effects models}, journal = {{BMC} Bioinform.}, volume = {21}, number = {1}, pages = {198}, year = {2020}, url = {https://doi.org/10.1186/s12859-020-3541-7}, doi = {10.1186/s12859-020-3541-7}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/bmcbi/YuFB20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcas/Masoumi20, author = {Massoud Masoumi}, title = {Novel Hybrid CMOS/Memristor Implementation of the {AES} Algorithm Robust Against Differential Power Analysis Attack}, journal = {{IEEE} Trans. Circuits Syst. {II} Express Briefs}, volume = {67-II}, number = {7}, pages = {1314--1318}, year = {2020}, url = {https://doi.org/10.1109/TCSII.2019.2932337}, doi = {10.1109/TCSII.2019.2932337}, timestamp = {Thu, 08 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcas/Masoumi20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tvlsi/DodoBT20, author = {Samir Ben Dodo and Rajendra Bishnoi and Mehdi Baradaran Tahoori}, title = {Secure {STT-MRAM} Bit-Cell Design Resilient to Differential Power Analysis Attacks}, journal = {{IEEE} Trans. Very Large Scale Integr. Syst.}, volume = {28}, number = {1}, pages = {263--272}, year = {2020}, url = {https://doi.org/10.1109/TVLSI.2019.2940449}, doi = {10.1109/TVLSI.2019.2940449}, timestamp = {Wed, 11 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tvlsi/DodoBT20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icete/Negre20, author = {Christophe N{\`{e}}gre}, title = {Address-bit Differential Power Analysis on Boolean Split Exponent Counter-measure}, booktitle = {Proceedings of the 17th International Joint Conference on e-Business and Telecommunications, {ICETE} 2020 - Volume 2: SECRYPT, Lieusaint, Paris, France, July 8-10, 2020}, pages = {632--637}, year = {2020}, crossref = {DBLP:conf/icete/2020-2}, url = {https://doi.org/10.5220/0009891306320637}, doi = {10.5220/0009891306320637}, timestamp = {Wed, 29 Jul 2020 16:57:35 +0200}, biburl = {https://dblp.org/rec/conf/icete/Negre20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GellersenSE20, author = {Tim Gellersen and Okan Seker and Thomas Eisenbarth}, title = {Differential Power Analysis of the Picnic Signature Scheme}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {267}, year = {2020}, url = {https://eprint.iacr.org/2020/267}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GellersenSE20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Lathrop20, author = {Leah Lathrop}, title = {Differential Power Analysis Attacks on Different Implementations of {AES} with the ChipWhisperer Nano}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1008}, year = {2020}, url = {https://eprint.iacr.org/2020/1008}, timestamp = {Wed, 02 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Lathrop20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Sim20, author = {Siang Meng Sim}, title = {Differential Power Analysis on (Non-)Linear Feedback Shift Registers}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {349}, year = {2020}, url = {https://eprint.iacr.org/2020/349}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Sim20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SimJB20, author = {Siang Meng Sim and Dirmanto Jap and Shivam Bhasin}, title = {{DAPA:} Differential Analysis aided Power Attack on (Non-)Linear Feedback Shift Registers (Extended version)}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1241}, year = {2020}, url = {https://eprint.iacr.org/2020/1241}, timestamp = {Fri, 30 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/SimJB20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-cds/SainiG19, author = {Harjap Saini and Anu Gupta}, title = {Constant power consumption design of novel differential logic gate for immunity against differential power analysis}, journal = {{IET} Circuits Devices Syst.}, volume = {13}, number = {1}, pages = {103--109}, year = {2019}, url = {https://doi.org/10.1049/iet-cds.2018.5093}, doi = {10.1049/iet-cds.2018.5093}, timestamp = {Thu, 31 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iet-cds/SainiG19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcta/AskariS19, author = {Shirin Askari and Mohsen Saneei}, title = {Design and analysis of differential ring voltage controlled oscillator for wide tuning range and low power applications}, journal = {Int. J. Circuit Theory Appl.}, volume = {47}, number = {2}, pages = {204--216}, year = {2019}, url = {https://doi.org/10.1002/cta.2582}, doi = {10.1002/cta.2582}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcta/AskariS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gcce/TakemotoNY19, author = {Shu Takemoto and Yusuke Nozaki and Masaya Yoshikawa}, title = {Evaluation of the Hiding-Countermeasure {PRINCE} Using Differential Power Analysis}, booktitle = {{IEEE} 8th Global Conference on Consumer Electronics, {GCCE} 2019, Osaka, Japan, October 15-18, 2019}, pages = {164--165}, year = {2019}, crossref = {DBLP:conf/gcce/2019}, url = {https://doi.org/10.1109/GCCE46687.2019.9015513}, doi = {10.1109/GCCE46687.2019.9015513}, timestamp = {Sun, 08 Mar 2020 16:12:27 +0100}, biburl = {https://dblp.org/rec/conf/gcce/TakemotoNY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iscas/SainiG19, author = {Harjap Singh Saini and Anu Gupta}, title = {Differential Power Analysis Immune Design of FinFET Based Novel Differential Logic Gate}, booktitle = {{IEEE} International Symposium on Circuits and Systems, {ISCAS} 2019, Sapporo, Japan, May 26-29, 2019}, pages = {1--5}, year = {2019}, crossref = {DBLP:conf/iscas/2019}, url = {https://doi.org/10.1109/ISCAS.2019.8702598}, doi = {10.1109/ISCAS.2019.8702598}, timestamp = {Wed, 16 Oct 2019 14:14:49 +0200}, biburl = {https://dblp.org/rec/conf/iscas/SainiG19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itw/GrigorescuB19, author = {Andrea Grigorescu and Holger Boche}, title = {Differential Power Analysis Attacks from an Information-Theoretic Perspective}, booktitle = {2019 {IEEE} Information Theory Workshop, {ITW} 2019, Visby, Sweden, August 25-28, 2019}, pages = {1--5}, year = {2019}, crossref = {DBLP:conf/itw/2019}, url = {https://doi.org/10.1109/ITW44776.2019.8989406}, doi = {10.1109/ITW44776.2019.8989406}, timestamp = {Tue, 18 Feb 2020 15:54:58 +0100}, biburl = {https://dblp.org/rec/conf/itw/GrigorescuB19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@phdthesis{DBLP:phd/dnb/Kusters18, author = {Ferdinand K{\"{u}}sters}, title = {Switch Observability for Differential-Algebraic Systems.: Analysis, Observer Design and Application to Power Networks}, school = {Kaiserslautern University of Technology, Germany}, year = {2018}, url = {https://d-nb.info/1165166232}, isbn = {978-3-8396-1374-0}, timestamp = {Sat, 17 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/phd/dnb/Kusters18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computers/DiehlAKG18, author = {William Diehl and Abubakr Abdulgadir and Jens{-}Peter Kaps and Kris Gaj}, title = {Comparing the Cost of Protecting Selected Lightweight Block Ciphers against Differential Power Analysis in Low-Cost FPGAs}, journal = {Comput.}, volume = {7}, number = {2}, pages = {28}, year = {2018}, url = {https://doi.org/10.3390/computers7020028}, doi = {10.3390/computers7020028}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computers/DiehlAKG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/DiehlAFKG18, author = {William Diehl and Abubakr Abdulgadir and Farnoud Farahmand and Jens{-}Peter Kaps and Kris Gaj}, title = {Comparison of Cost of Protection against Differential Power Analysis of Selected Authenticated Ciphers}, journal = {Cryptogr.}, volume = {2}, number = {3}, pages = {26}, year = {2018}, url = {https://doi.org/10.3390/cryptography2030026}, doi = {10.3390/cryptography2030026}, timestamp = {Fri, 03 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptography/DiehlAFKG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-cdt/KaediDG18, author = {Saman Kaedi and Mohammad{-}Ali Doostari and Mohammad Bagher Ghaznavi Ghoushchi}, title = {Low-complexity and differential power analysis (DPA)-resistant two-folded power-aware Rivest-Shamir-Adleman {(RSA)} security schema implementation for IoT-connected devices}, journal = {{IET} Comput. Digit. Tech.}, volume = {12}, number = {6}, pages = {279--288}, year = {2018}, url = {https://doi.org/10.1049/iet-cdt.2018.5098}, doi = {10.1049/iet-cdt.2018.5098}, timestamp = {Tue, 14 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-cdt/KaediDG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcam/BurgosCVV18, author = {Clara Burgos and Juan Carlos Cort{\'{e}}s and Laura Villafuerte and Rafael J. Villanueva}, title = {Solving random mean square fractional linear differential equations by generalized power series: Analysis and computing}, journal = {J. Comput. Appl. Math.}, volume = {339}, pages = {94--110}, year = {2018}, url = {https://doi.org/10.1016/j.cam.2017.12.042}, doi = {10.1016/j.cam.2017.12.042}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcam/BurgosCVV18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jolpe/SasipriyaS18, author = {P. Sasipriya and Kanchana Bhaaskaran Vettuvanam Somasundaram}, title = {Design and Analysis of Clocked {CMOS} Differential Adiabatic Logic {(CCDAL)} for Low Power}, journal = {J. Low Power Electron.}, volume = {14}, number = {4}, pages = {548--557}, year = {2018}, url = {https://doi.org/10.1166/jolpe.2018.1578}, doi = {10.1166/jolpe.2018.1578}, timestamp = {Fri, 22 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jolpe/SasipriyaS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcas/MohammadnezhadW18, author = {Hossein Mohammadnezhad and Huan Wang and Payam Heydari}, title = {Analysis and Design of a Wideband, Balun-Based, Differential Power Splitter at mm-Wave}, journal = {{IEEE} Trans. Circuits Syst. {II} Express Briefs}, volume = {65-II}, number = {11}, pages = {1629--1633}, year = {2018}, url = {https://doi.org/10.1109/TCSII.2017.2766141}, doi = {10.1109/TCSII.2017.2766141}, timestamp = {Wed, 27 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcas/MohammadnezhadW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/WangYSLGG18, author = {Weijia Wang and Yu Yu and Fran{\c{c}}ois{-}Xavier Standaert and Junrong Liu and Zheng Guo and Dawu Gu}, title = {Ridge-Based {DPA:} Improvement of Differential Power Analysis For Nanoscale Chips}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {13}, number = {5}, pages = {1301--1316}, year = {2018}, url = {https://doi.org/10.1109/TIFS.2017.2787985}, doi = {10.1109/TIFS.2017.2787985}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/WangYSLGG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cosade/KannwischerGBK018, author = {Matthias J. Kannwischer and Aymeric Gen{\^{e}}t and Denis Butin and Juliane Kr{\"{a}}mer and Johannes Buchmann}, title = {Differential Power Analysis of {XMSS} and {SPHINCS}}, booktitle = {Constructive Side-Channel Analysis and Secure Design - 9th International Workshop, {COSADE} 2018, Singapore, April 23-24, 2018, Proceedings}, pages = {168--188}, year = {2018}, crossref = {DBLP:conf/cosade/2018}, url = {https://doi.org/10.1007/978-3-319-89641-0\_10}, doi = {10.1007/978-3-319-89641-0\_10}, timestamp = {Tue, 14 May 2019 10:00:39 +0200}, biburl = {https://dblp.org/rec/conf/cosade/KannwischerGBK018.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/host/DiehlAFKG18, author = {William Diehl and Abubakr Abdulgadir and Farnoud Farahmand and Jens{-}Peter Kaps and Kris Gaj}, title = {Comparison of cost of protection against differential power analysis of selected authenticated ciphers}, booktitle = {2018 {IEEE} International Symposium on Hardware Oriented Security and Trust, {HOST} 2018, Washington, DC, USA, April 30 - May 4, 2018}, pages = {147--152}, year = {2018}, crossref = {DBLP:conf/host/2018}, url = {https://doi.org/10.1109/HST.2018.8383904}, doi = {10.1109/HST.2018.8383904}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/host/DiehlAFKG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccsp/ZhangQL18, author = {Yang Zhang and Hou{-}de Quan and Xiong{-}wei Li}, title = {Data Activated Processor Hardware Trojan Detection Using Differential Bit Power Analysis}, booktitle = {Proceedings of the 2nd International Conference on Cryptography, Security and Privacy, {ICCSP} 2018, Guiyang, China, March 16-19, 2018}, pages = {134--137}, year = {2018}, crossref = {DBLP:conf/iccsp/2018}, url = {https://doi.org/10.1145/3199478.3199480}, doi = {10.1145/3199478.3199480}, timestamp = {Sat, 01 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iccsp/ZhangQL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icecsys/LimaFCMJS18, author = {Vitor G. Lima and Plinio Finkenauer and Vinicius V. Camargo and Felipe S. Marques and Leomar R. Junior and Rafael Iankowski Soares}, title = {A Novel Sizing Method Aiming Security Against Differential Power Analysis}, booktitle = {25th {IEEE} International Conference on Electronics, Circuits and Systems, {ICECS} 2018, Bordeaux, France, December 9-12, 2018}, pages = {429--432}, year = {2018}, crossref = {DBLP:conf/icecsys/2018}, url = {https://doi.org/10.1109/ICECS.2018.8617849}, doi = {10.1109/ICECS.2018.8617849}, timestamp = {Tue, 15 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icecsys/LimaFCMJS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/meco/MiskovskyKN18, author = {Vojtech Miskovsk{\'{y}} and Hana Kub{\'{a}}tov{\'{a}} and Martin Novotn{\'{y}}}, title = {Speeding up differential power analysis using integrated power traces}, booktitle = {7th Mediterranean Conference on Embedded Computing, {MECO} 2018, Budva, Montenegro, June 10-14, 2018}, pages = {1--5}, year = {2018}, crossref = {DBLP:conf/meco/2018}, url = {https://doi.org/10.1109/MECO.2018.8406012}, doi = {10.1109/MECO.2018.8406012}, timestamp = {Mon, 09 Aug 2021 14:54:01 +0200}, biburl = {https://dblp.org/rec/conf/meco/MiskovskyKN18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/XuFLS18, author = {Jiaming Xu and Ao Fan and Minyi Lu and Weiwei Shan}, title = {Differential Power Analysis of 8-Bit Datapath {AES} for IoT Applications}, booktitle = {17th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 12th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}, pages = {1470--1473}, year = {2018}, crossref = {DBLP:conf/trustcom/2018}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00205}, doi = {10.1109/TrustCom/BigDataSE.2018.00205}, timestamp = {Wed, 16 Oct 2019 14:14:49 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/XuFLS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vlsi/GiacominG18, author = {Edouard Giacomin and Pierre{-}Emmanuel Gaillardon}, title = {Differential Power Analysis Mitigation Technique Using Three-Independent-Gate Field Effect Transistors}, booktitle = {{IFIP/IEEE} International Conference on Very Large Scale Integration, VLSI-SoC 2018, Verona, Italy, October 8-10, 2018}, pages = {107--112}, year = {2018}, crossref = {DBLP:conf/vlsi/2018soc}, url = {https://doi.org/10.1109/VLSI-SoC.2018.8644747}, doi = {10.1109/VLSI-SoC.2018.8644747}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/vlsi/GiacominG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DiehlAFKG18, author = {William Diehl and Abubakr Abdulgadir and Farnoud Farahmand and Jens{-}Peter Kaps and Kris Gaj}, title = {Comparison of Cost of Protection Against Differential Power Analysis of Selected Authenticated Ciphers}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {341}, year = {2018}, url = {https://eprint.iacr.org/2018/341}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DiehlAFKG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KannwischerGBKB18, author = {Matthias J. Kannwischer and Aymeric Gen{\^{e}}t and Denis Butin and Juliane Kr{\"{a}}mer and Johannes Buchmann}, title = {Differential Power Analysis of {XMSS} and {SPHINCS}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {673}, year = {2018}, url = {https://eprint.iacr.org/2018/673}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KannwischerGBKB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/bioinformatics/DonaPMKS17, author = {Malathi S. I. Dona and Luke A. Prendergast and Suresh Mathivanan and Shivakumar Keerthikumar and Agus Salim}, title = {Powerful differential expression analysis incorporating network topology for next-generation sequencing data}, journal = {Bioinform.}, volume = {33}, number = {10}, pages = {1505--1513}, year = {2017}, url = {https://doi.org/10.1093/bioinformatics/btw833}, doi = {10.1093/bioinformatics/btw833}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/bioinformatics/DonaPMKS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/bmcbi/YuFB17, author = {Lianbo Yu and Soledad Fernandez and Guy N. Brock}, title = {Power analysis for RNA-Seq differential expression studies}, journal = {{BMC} Bioinform.}, volume = {18}, number = {1}, pages = {234:1--234:9}, year = {2017}, url = {https://doi.org/10.1186/s12859-017-1648-2}, doi = {10.1186/s12859-017-1648-2}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/bmcbi/YuFB17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mam/MiskovskyKN17, author = {Vojtech Miskovsk{\'{y}} and Hana Kub{\'{a}}tov{\'{a}} and Martin Novotn{\'{y}}}, title = {Influence of passive hardware redundancy on differential power analysis resistance of {AES} cipher implemented in {FPGA}}, journal = {Microprocess. Microsystems}, volume = {51}, pages = {220--226}, year = {2017}, url = {https://doi.org/10.1016/j.micpro.2017.04.014}, doi = {10.1016/j.micpro.2017.04.014}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/mam/MiskovskyKN17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/WangYSGSZ17, author = {Weijia Wang and Yu Yu and Fran{\c{c}}ois{-}Xavier Standaert and Dawu Gu and Sen Xu and Chi Zhang}, title = {Ridge-Based Profiled Differential Power Analysis}, booktitle = {Topics in Cryptology - {CT-RSA} 2017 - The Cryptographers' Track at the {RSA} Conference 2017, San Francisco, CA, USA, February 14-17, 2017, Proceedings}, pages = {347--362}, year = {2017}, crossref = {DBLP:conf/ctrsa/2017}, url = {https://doi.org/10.1007/978-3-319-52153-4\_20}, doi = {10.1007/978-3-319-52153-4\_20}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/WangYSGSZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fpt/DiehlAKG17, author = {William Diehl and Abubakr Abdulgadir and Jens{-}Peter Kaps and Kris Gaj}, title = {Comparing the cost of protecting selected lightweight block ciphers against differential power analysis in low-cost FPGAs}, booktitle = {International Conference on Field Programmable Technology, {FPT} 2017, Melbourne, Australia, December 11-13, 2017}, pages = {128--135}, year = {2017}, crossref = {DBLP:conf/fpt/2017}, url = {https://doi.org/10.1109/FPT.2017.8280130}, doi = {10.1109/FPT.2017.8280130}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fpt/DiehlAKG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isgteurope/LiJBYLL17, author = {Yanbin Li and Ke Jia and Tianshu Bi and Renfu Yan and Wei Li and Bohan Liu}, title = {Analysis of line current differential protection considering inverter-interfaced renewable energy power plants}, booktitle = {2017 {IEEE} {PES} Innovative Smart Grid Technologies Conference Europe, ISGT-Europe 2017, Torino, Italy, September 26-29, 2017}, pages = {1--6}, year = {2017}, crossref = {DBLP:conf/isgteurope/2017}, url = {https://doi.org/10.1109/ISGTEurope.2017.8260157}, doi = {10.1109/ISGTEurope.2017.8260157}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isgteurope/LiJBYLL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/meco/MazurN17, author = {Lukas Mazur and Martin Novotn{\'{y}}}, title = {Differential power analysis on {FPGA} board: Boundaries of success}, booktitle = {6th Mediterranean Conference on Embedded Computing, {MECO} 2017, Bar, Montenegro, June 11-15, 2017}, pages = {1--4}, year = {2017}, crossref = {DBLP:conf/meco/2017}, url = {https://doi.org/10.1109/MECO.2017.7977168}, doi = {10.1109/MECO.2017.7977168}, timestamp = {Mon, 09 Aug 2021 14:54:01 +0200}, biburl = {https://dblp.org/rec/conf/meco/MazurN17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cmmm/AllahyariJB16, author = {Elahe Allahyari and Peyman Jafari and Zahra Bagheri}, title = {A Simulation Study to Assess the Effect of the Number of Response Categories on the Power of Ordinal Logistic Regression for Differential Item Functioning Analysis in Rating Scales}, journal = {Comput. Math. Methods Medicine}, volume = {2016}, pages = {5080826:1--5080826:8}, year = {2016}, url = {https://doi.org/10.1155/2016/5080826}, doi = {10.1155/2016/5080826}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cmmm/AllahyariJB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/TangJW16, author = {Wenyi Tang and Song Jia and Yuan Wang}, title = {A Short-Time Three-Phase Single-Rail Precharge Logic against Differential Power Analysis}, journal = {{IEICE} Trans. Electron.}, volume = {99-C}, number = {8}, pages = {956--962}, year = {2016}, url = {https://doi.org/10.1587/transele.E99.C.956}, doi = {10.1587/transele.E99.C.956}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/TangJW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcta/CenturelliMT16, author = {Francesco Centurelli and Pietro Monsurr{\`{o}} and Alessandro Trifiletti}, title = {Comparative performance analysis and complementary triode based {CMFB} circuits for fully differential class {AB} symmetrical OTAs with low power consumption}, journal = {Int. J. Circuit Theory Appl.}, volume = {44}, number = {5}, pages = {1039--1054}, year = {2016}, url = {https://doi.org/10.1002/cta.2123}, doi = {10.1002/cta.2123}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcta/CenturelliMT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEssd/AbdelmoulaMR16, author = {Mohamed Abdelmoula and Said Moughamir and Bruno Robert}, title = {Analysis and implementation of nonlinear implicit differential-algebraic equations solver: Application to a photovoltaic power system}, booktitle = {13th International Multi-Conference on Systems, Signals {\&} Devices, {SSD} 2016, Leipzig, Germany, March 21-24, 2016}, pages = {735--741}, year = {2016}, crossref = {DBLP:conf/IEEEssd/2016}, url = {https://doi.org/10.1109/SSD.2016.7473766}, doi = {10.1109/SSD.2016.7473766}, timestamp = {Mon, 09 Aug 2021 14:54:04 +0200}, biburl = {https://dblp.org/rec/conf/IEEEssd/AbdelmoulaMR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aspdac/JiangEP0B16, author = {Ke Jiang and Petru Eles and Zebo Peng and Sudipta Chattopadhyay and Lejla Batina}, title = {{SPARTA:} {A} scheduling policy for thwarting differential power analysis attacks}, booktitle = {21st Asia and South Pacific Design Automation Conference, {ASP-DAC} 2016, Macao, Macao, January 25-28, 2016}, pages = {667--672}, year = {2016}, crossref = {DBLP:conf/aspdac/2016}, url = {https://doi.org/10.1109/ASPDAC.2016.7428088}, doi = {10.1109/ASPDAC.2016.7428088}, timestamp = {Wed, 16 Oct 2019 14:14:52 +0200}, biburl = {https://dblp.org/rec/conf/aspdac/JiangEP0B16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cans/SpainV16, author = {Merrielle Spain and Mayank Varia}, title = {Diversity Within the Rijndael Design Principles for Resistance to Differential Power Analysis}, booktitle = {Cryptology and Network Security - 15th International Conference, {CANS} 2016, Milan, Italy, November 14-16, 2016, Proceedings}, pages = {71--87}, year = {2016}, crossref = {DBLP:conf/cans/2016}, url = {https://doi.org/10.1007/978-3-319-48965-0\_5}, doi = {10.1007/978-3-319-48965-0\_5}, timestamp = {Tue, 14 May 2019 10:00:50 +0200}, biburl = {https://dblp.org/rec/conf/cans/SpainV16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isicir/HoPLNCG16, author = {Weng{-}Geng Ho and Ali Akbar Pammu and Nan Liu and Kyaw Zwa Lwin Ne and Kwen{-}Siong Chong and Bah{-}Hwee Gwee}, title = {Security analysis of asynchronous-logic {QDI} cell approach for differential power analysis attack}, booktitle = {International Symposium on Integrated Circuits, {ISIC} 2016, Singapore, December 12-14, 2016}, pages = {1--4}, year = {2016}, crossref = {DBLP:conf/isicir/2016}, url = {https://doi.org/10.1109/ISICIR.2016.7829712}, doi = {10.1109/ISICIR.2016.7829712}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isicir/HoPLNCG16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/meco/MiskovskyKN16, author = {Vojtech Miskovsk{\'{y}} and Hana Kub{\'{a}}tov{\'{a}} and Martin Novotn{\'{y}}}, title = {Influence of fault-tolerant design methods on differential power analysis resistance of {AES} cipher: Methodics and challenges}, booktitle = {5th Mediterranean Conference on Embedded Computing, {MECO} 2016, Bar, Montenegro, June 12-16, 2016}, pages = {14--17}, year = {2016}, crossref = {DBLP:conf/meco/2016}, url = {https://doi.org/10.1109/MECO.2016.7525685}, doi = {10.1109/MECO.2016.7525685}, timestamp = {Mon, 09 Aug 2021 14:54:01 +0200}, biburl = {https://dblp.org/rec/conf/meco/MiskovskyKN16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SpainV16, author = {Merrielle Spain and Mayank Varia}, title = {Evolving S-Boxes with Reduced Differential Power Analysis Susceptibility}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1145}, year = {2016}, url = {http://eprint.iacr.org/2016/1145}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SpainV16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@phdthesis{DBLP:phd/basesearch/Bilgin15, author = {Beg{\"{u}}l Bilgin}, title = {Threshold implementations : as countermeasure against higher-order differential power analysis}, school = {University of Twente, Enschede, Netherlands}, year = {2015}, url = {http://purl.utwente.nl/publications/95796}, timestamp = {Thu, 11 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/phd/basesearch/Bilgin15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcon/LlibreSM15, author = {Jaume Llibre and Mario Spinetti{-}Rivera and Eli{\'{e}}zer Colina Morles}, title = {Dynamic systems behaviour analysis and design based on the qualitative theory of differential equations: the Boost power converter case}, journal = {Int. J. Control}, volume = {88}, number = {6}, pages = {1103--1111}, year = {2015}, url = {https://doi.org/10.1080/00207179.2014.994037}, doi = {10.1080/00207179.2014.994037}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcon/LlibreSM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsci/RajaramV15, author = {M. Rajaram and J. Vijaya}, title = {A Defense Mechanism for Differential Power Analysis Attack in {AES}}, journal = {J. Comput. Sci.}, volume = {11}, number = {2}, pages = {291--296}, year = {2015}, url = {https://doi.org/10.3844/jcssp.2015.291.296}, doi = {10.3844/jcssp.2015.291.296}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcsci/RajaramV15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/MasoumiR15, author = {Massoud Masoumi and Mohammad Hadi Rezayati}, title = {Novel Approach to Protect Advanced Encryption Standard Algorithm Implementation Against Differential Electromagnetic and Power Analysis}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {10}, number = {2}, pages = {256--265}, year = {2015}, url = {https://doi.org/10.1109/TIFS.2014.2371237}, doi = {10.1109/TIFS.2014.2371237}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/MasoumiR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tvlsi/AvitalDKF15, author = {Moshe Avital and Hadar Dagan and Osnat Keren and Alexander Fish}, title = {Randomized Multitopology Logic Against Differential Power Analysis}, journal = {{IEEE} Trans. Very Large Scale Integr. Syst.}, volume = {23}, number = {4}, pages = {702--711}, year = {2015}, url = {https://doi.org/10.1109/TVLSI.2014.2320154}, doi = {10.1109/TVLSI.2014.2320154}, timestamp = {Wed, 11 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tvlsi/AvitalDKF15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/ChenEMS15, author = {Cong Chen and Thomas Eisenbarth and Ingo von Maurich and Rainer Steinwandt}, title = {Differential Power Analysis of a McEliece Cryptosystem}, booktitle = {Applied Cryptography and Network Security - 13th International Conference, {ACNS} 2015, New York, NY, USA, June 2-5, 2015, Revised Selected Papers}, pages = {538--556}, year = {2015}, crossref = {DBLP:conf/acns/2015}, url = {https://doi.org/10.1007/978-3-319-28166-7\_26}, doi = {10.1007/978-3-319-28166-7\_26}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/acns/ChenEMS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cdc/DvijothamCL15, author = {Krishnamurthy Dvijotham and Michael Chertkov and Steven H. Low}, title = {A differential analysis of the power flow equations}, booktitle = {54th {IEEE} Conference on Decision and Control, {CDC} 2015, Osaka, Japan, December 15-18, 2015}, pages = {23--30}, year = {2015}, crossref = {DBLP:conf/cdc/2015}, url = {https://doi.org/10.1109/CDC.2015.7402082}, doi = {10.1109/CDC.2015.7402082}, timestamp = {Wed, 16 Oct 2019 14:14:56 +0200}, biburl = {https://dblp.org/rec/conf/cdc/DvijothamCL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/GuoWLSZLY15, author = {Limin Guo and Lihui Wang and Dan Liu and Weijun Shan and Zhimin Zhang and Qing Li and Jun Yu}, title = {A Chosen - Plaintext Differential Power Analysis Attack on {HMAC} - {SM3}}, booktitle = {11th International Conference on Computational Intelligence and Security, {CIS} 2015, Shenzhen, China, December 19-20, 2015}, pages = {350--353}, year = {2015}, crossref = {DBLP:conf/cis/2015}, url = {https://doi.org/10.1109/CIS.2015.91}, doi = {10.1109/CIS.2015.91}, timestamp = {Wed, 16 Oct 2019 14:14:53 +0200}, biburl = {https://dblp.org/rec/conf/cis/GuoWLSZLY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/GuoWLYL15, author = {Limin Guo and Lihui Wang and Qing Li and Jun Yu and Peng Luo}, title = {Differential Power Analysis on Dynamic Password Token Based on {SM3} Algorithm, and Countermeasures}, booktitle = {11th International Conference on Computational Intelligence and Security, {CIS} 2015, Shenzhen, China, December 19-20, 2015}, pages = {354--357}, year = {2015}, crossref = {DBLP:conf/cis/2015}, url = {https://doi.org/10.1109/CIS.2015.92}, doi = {10.1109/CIS.2015.92}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cis/GuoWLYL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/LiuYSGGSGX15, author = {Junrong Liu and Yu Yu and Fran{\c{c}}ois{-}Xavier Standaert and Zheng Guo and Dawu Gu and Wei Sun and Yijie Ge and Xinjun Xie}, title = {Small Tweaks Do Not Help: Differential Power Analysis of {MILENAGE} Implementations in 3G/4G {USIM} Cards}, booktitle = {Computer Security - {ESORICS} 2015 - 20th European Symposium on Research in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings, Part {I}}, pages = {468--480}, year = {2015}, crossref = {DBLP:conf/esorics/2015-1}, url = {https://doi.org/10.1007/978-3-319-24174-6\_24}, doi = {10.1007/978-3-319-24174-6\_24}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/LiuYSGGSGX15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isqed/NiuJ15, author = {Yanbo Niu and Anping Jiang}, title = {The low power design of {SM4} cipher with resistance to differential power analysis}, booktitle = {Sixteenth International Symposium on Quality Electronic Design, {ISQED} 2015, Santa Clara, CA, USA, March 2-4, 2015}, pages = {470--474}, year = {2015}, crossref = {DBLP:conf/isqed/2015}, url = {https://doi.org/10.1109/ISQED.2015.7085471}, doi = {10.1109/ISQED.2015.7085471}, timestamp = {Wed, 16 Oct 2019 14:14:55 +0200}, biburl = {https://dblp.org/rec/conf/isqed/NiuJ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/milcom/LuisNA15, author = {William Luis and G. Richard Newell and Kenneth Alexander}, title = {Differential power analysis countermeasures for the configuration of {SRAM} FPGAs}, booktitle = {34th {IEEE} Military Communications Conference, {MILCOM} 2015, Tampa, FL, USA, October 26-28, 2015}, pages = {1276--1283}, year = {2015}, crossref = {DBLP:conf/milcom/2015}, url = {https://doi.org/10.1109/MILCOM.2015.7357621}, doi = {10.1109/MILCOM.2015.7357621}, timestamp = {Thu, 07 Nov 2019 09:04:27 +0100}, biburl = {https://dblp.org/rec/conf/milcom/LuisNA15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/WangCWLW15, author = {Xiaozhe Wang and Hsiao{-}Dong Chiang and Jianhui Wang and Hui Liu and Tao Wang}, title = {Long-Term Stability Analysis of Power Systems with Wind Power Based on Stochastic Differential Equations: Model Development and Foundations}, journal = {CoRR}, volume = {abs/1506.03658}, year = {2015}, url = {http://arxiv.org/abs/1506.03658}, eprinttype = {arXiv}, eprint = {1506.03658}, timestamp = {Fri, 21 Sep 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/WangCWLW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tvt/FangLLJ14, author = {Zhaoxi Fang and Feng Liang and Liangbin Li and Liping Jin}, title = {Performance Analysis and Power Allocation for Two-Way Amplify-and-Forward Relaying With Generalized Differential Modulation}, journal = {{IEEE} Trans. Veh. Technol.}, volume = {63}, number = {2}, pages = {937--942}, year = {2014}, url = {https://doi.org/10.1109/TVT.2013.2279856}, doi = {10.1109/TVT.2013.2279856}, timestamp = {Thu, 25 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tvt/FangLLJ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cases/AmaralRTC14, author = {Jo{\~{a}}o Amaral and Francesco Regazzoni and Pedro Tom{\'{a}}s and Ricardo Chaves}, title = {Accelerating differential power analysis on heterogeneous systems}, booktitle = {Proceedings of the 9th Workshop on Embedded Systems Security, {WESS} '14, New Delhi, India, October 17, 2014}, pages = {4:1--4:9}, year = {2014}, crossref = {DBLP:conf/cases/2014wess}, url = {https://doi.org/10.1145/2668322.2668326}, doi = {10.1145/2668322.2668326}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cases/AmaralRTC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cases/Mazumdar14, author = {Bodhisatwa Mazumdar}, title = {Some {RSSB} constructions with improved resistance towards differential power analysis}, booktitle = {Proceedings of the 9th Workshop on Embedded Systems Security, {WESS} '14, New Delhi, India, October 17, 2014}, pages = {8:1--8:3}, year = {2014}, crossref = {DBLP:conf/cases/2014wess}, url = {https://doi.org/10.1145/2668322.2668330}, doi = {10.1145/2668322.2668330}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cases/Mazumdar14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cosade/HajraM14, author = {Suvadeep Hajra and Debdeep Mukhopadhyay}, title = {On the Optimal Pre-processing for Non-profiling Differential Power Analysis}, booktitle = {Constructive Side-Channel Analysis and Secure Design - 5th International Workshop, {COSADE} 2014, Paris, France, April 13-15, 2014. Revised Selected Papers}, pages = {161--178}, year = {2014}, crossref = {DBLP:conf/cosade/2014}, url = {https://doi.org/10.1007/978-3-319-10175-0\_12}, doi = {10.1007/978-3-319-10175-0\_12}, timestamp = {Tue, 14 May 2019 10:00:39 +0200}, biburl = {https://dblp.org/rec/conf/cosade/HajraM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icete/BelaidBDGR14, author = {Sonia Bela{\"{\i}}d and Luk Bettale and Emmanuelle Dottax and Laurie Genelle and Franck Rondepierre}, title = {Differential Power Analysis of {HMAC} {SHA-1} and {HMAC} {SHA-2} in the Hamming Weight Model}, booktitle = {E-Business and Telecommunications - 11th International Joint Conference, {ICETE} 2014, Vienna, Austria, August 28-30, 2014, Revised Selected Papers}, pages = {363--379}, year = {2014}, crossref = {DBLP:conf/icete/2014s}, url = {https://doi.org/10.1007/978-3-319-25915-4\_19}, doi = {10.1007/978-3-319-25915-4\_19}, timestamp = {Sat, 19 Oct 2019 20:35:36 +0200}, biburl = {https://dblp.org/rec/conf/icete/BelaidBDGR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/indocrypt/SarkarMC14, author = {Sumanta Sarkar and Subhamoy Maitra and Kaushik Chakraborty}, title = {Differential Power Analysis in Hamming Weight Model: How to Choose among (Extended) Affine Equivalent S-boxes}, booktitle = {Progress in Cryptology - {INDOCRYPT} 2014 - 15th International Conference on Cryptology in India, New Delhi, India, December 14-17, 2014, Proceedings}, pages = {360--373}, year = {2014}, crossref = {DBLP:conf/indocrypt/2014}, url = {https://doi.org/10.1007/978-3-319-13039-2\_21}, doi = {10.1007/978-3-319-13039-2\_21}, timestamp = {Fri, 28 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/indocrypt/SarkarMC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iscas/AvitalF14, author = {Moshe Avital and Alexander Fish}, title = {Secured Dual Mode Logic {(DML)} as a countermeasure against Differential Power Analysis}, booktitle = {{IEEE} International Symposium on Circuits and Systemss, {ISCAS} 2014, Melbourne, Victoria, Australia, June 1-5, 2014}, pages = {810--813}, year = {2014}, crossref = {DBLP:conf/iscas/2014}, url = {https://doi.org/10.1109/ISCAS.2014.6865259}, doi = {10.1109/ISCAS.2014.6865259}, timestamp = {Wed, 16 Oct 2019 14:14:49 +0200}, biburl = {https://dblp.org/rec/conf/iscas/AvitalF14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isvlsi/JiangBEP14, author = {Ke Jiang and Lejla Batina and Petru Eles and Zebo Peng}, title = {Robustness Analysis of Real-Time Scheduling Against Differential Power Analysis Attacks}, booktitle = {{IEEE} Computer Society Annual Symposium on VLSI, {ISVLSI} 2014, Tampa, FL, USA, July 9-11, 2014}, pages = {450--455}, year = {2014}, crossref = {DBLP:conf/isvlsi/2014}, url = {https://doi.org/10.1109/ISVLSI.2014.11}, doi = {10.1109/ISVLSI.2014.11}, timestamp = {Wed, 16 Oct 2019 14:14:54 +0200}, biburl = {https://dblp.org/rec/conf/isvlsi/JiangBEP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/space/ShanmugamSA14, author = {Dillibabu Shanmugam and Ravikumar Selvam and Suganya Annadurai}, title = {Differential Power Analysis Attack on {SIMON} and {LED} Block Ciphers}, booktitle = {Security, Privacy, and Applied Cryptography Engineering - 4th International Conference, {SPACE} 2014, Pune, India, October 18-22, 2014. Proceedings}, pages = {110--125}, year = {2014}, crossref = {DBLP:conf/space/2014}, url = {https://doi.org/10.1007/978-3-319-12060-7\_8}, doi = {10.1007/978-3-319-12060-7\_8}, timestamp = {Mon, 15 Jun 2020 17:10:47 +0200}, biburl = {https://dblp.org/rec/conf/space/ShanmugamSA14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChenEMS14, author = {Cong Chen and Thomas Eisenbarth and Ingo von Maurich and Rainer Steinwandt}, title = {Differential Power Analysis of a McEliece Cryptosystem}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {534}, year = {2014}, url = {http://eprint.iacr.org/2014/534}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChenEMS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/bmcbi/QiuWH13, author = {Xing Qiu and Hulin Wu and Rui Hu}, title = {The impact of quantile and rank normalization procedures on the testing power of gene differential expression analysis}, journal = {{BMC} Bioinform.}, volume = {14}, pages = {124}, year = {2013}, url = {https://doi.org/10.1186/1471-2105-14-124}, doi = {10.1186/1471-2105-14-124}, timestamp = {Wed, 11 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/bmcbi/QiuWH13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cma/QuGGL13, author = {Bo Qu and Dawu Gu and Zheng Guo and Junrong Liu}, title = {Differential power analysis of stream ciphers with LFSRs}, journal = {Comput. Math. Appl.}, volume = {65}, number = {9}, pages = {1291--1299}, year = {2013}, url = {https://doi.org/10.1016/j.camwa.2012.02.024}, doi = {10.1016/j.camwa.2012.02.024}, timestamp = {Thu, 11 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cma/QuGGL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dsd/tepanekBN13, author = {Filip Step{\'{a}}nek and Jir{\'{\i}} Bucek and Martin Novotn{\'{y}}}, title = {Differential Power Analysis under Constrained Budget: Low Cost Education of Hackers}, booktitle = {2013 Euromicro Conference on Digital System Design, {DSD} 2013, Los Alamitos, CA, USA, September 4-6, 2013}, pages = {645--648}, year = {2013}, crossref = {DBLP:conf/dsd/2013}, url = {https://doi.org/10.1109/DSD.2013.130}, doi = {10.1109/DSD.2013.130}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dsd/tepanekBN13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isorc/0002W13, author = {Dirk M{\"{u}}ller and Matthias Werner}, title = {Quantifying the advantage of {EDF} vs. {RMS} schedulability on a uniprocessor using a differential analysis and a power-law total utilization distribution}, booktitle = {16th {IEEE} International Symposium on Object/Component/Service-Oriented Real-Time Distributed Computing, {ISORC} 2013, Paderborn, Germany, June 19-21, 2013}, pages = {1--10}, year = {2013}, crossref = {DBLP:conf/isorc/2013}, url = {https://doi.org/10.1109/ISORC.2013.6913215}, doi = {10.1109/ISORC.2013.6913215}, timestamp = {Wed, 16 Oct 2019 14:14:53 +0200}, biburl = {https://dblp.org/rec/conf/isorc/0002W13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/TahaS13, author = {Mostafa M. I. Taha and Patrick Schaumont}, title = {Differential Power Analysis of MAC-Keccak at Any Key-Length}, booktitle = {Advances in Information and Computer Security - 8th International Workshop on Security, {IWSEC} 2013, Okinawa, Japan, November 18-20, 2013, Proceedings}, pages = {68--82}, year = {2013}, crossref = {DBLP:conf/iwsec/2013}, url = {https://doi.org/10.1007/978-3-642-41383-4\_5}, doi = {10.1007/978-3-642-41383-4\_5}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/TahaS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/BelaidBDGR13, author = {Sonia Bela{\"{\i}}d and Luk Bettale and Emmanuelle Dottax and Laurie Genelle and Franck Rondepierre}, title = {Differential Power Analysis of {HMAC} {SHA-2} in the Hamming Weight Model}, booktitle = {{SECRYPT} 2013 - Proceedings of the 10th International Conference on Security and Cryptography, Reykjav{\'{\i}}k, Iceland, 29-31 July, 2013}, pages = {230--241}, year = {2013}, crossref = {DBLP:conf/secrypt/2013}, url = {https://ieeexplore.ieee.org/document/7223170/}, timestamp = {Wed, 11 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/BelaidBDGR13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tsp/MartinasekCT13, author = {Zdenek Martinasek and Vlastimil Clupek and Krisztina Trasy}, title = {General scheme of differential power analysis}, booktitle = {36th International Conference on Telecommunications and Signal Processing, {TSP} 2013, Rome, Italy, 2-4 July, 2013}, pages = {358--362}, year = {2013}, crossref = {DBLP:conf/tsp/2013}, url = {https://doi.org/10.1109/TSP.2013.6613952}, doi = {10.1109/TSP.2013.6613952}, timestamp = {Wed, 16 Oct 2019 14:14:56 +0200}, biburl = {https://dblp.org/rec/conf/tsp/MartinasekCT13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@phdthesis{DBLP:phd/ethos/Baddam12, author = {Karthik Baddam}, title = {Hardware level countermeasures against differential power analysis}, school = {University of Southampton, {UK}}, year = {2012}, url = {http://eprints.soton.ac.uk/300786/}, timestamp = {Tue, 05 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/phd/ethos/Baddam12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/advai/Tripathy12, author = {Manoj Tripathy}, title = {Power Transformer Differential Protection Based on Neural Network Principal Component Analysis, Harmonic Restraint and Park's Plots}, journal = {Adv. Artif. Intell.}, volume = {2012}, pages = {930740:1--930740:9}, year = {2012}, url = {https://doi.org/10.1155/2012/930740}, doi = {10.1155/2012/930740}, timestamp = {Fri, 03 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/advai/Tripathy12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/chinaf/TangQYCGLM12, author = {Ming Tang and Zhenlong Qiu and Min Yang and Pingpan Cheng and Si Gao and Shubo Liu and Qingshu Meng}, title = {Evolutionary ciphers against differential power analysis and differential fault analysis}, journal = {Sci. China Inf. Sci.}, volume = {55}, number = {11}, pages = {2555--2569}, year = {2012}, url = {https://doi.org/10.1007/s11432-012-4615-6}, doi = {10.1007/s11432-012-4615-6}, timestamp = {Mon, 02 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/chinaf/TangQYCGLM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/kes/BiswalBDM12, author = {Birendra Biswal and M. K. Biswal and Pradipta K. Dash and S. Mishra}, title = {Time frequency analysis and power signal disturbance classification using support vector machine and differential evolution algorithm}, journal = {Int. J. Knowl. Based Intell. Eng. Syst.}, volume = {16}, number = {3}, pages = {199--214}, year = {2012}, url = {https://doi.org/10.3233/KES-2012-0243}, doi = {10.3233/KES-2012-0243}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/kes/BiswalBDM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mcm/VasyltsovS12, author = {Ihor Vasyltsov and G{\"{o}}kay Saldamli}, title = {Fault detection and a differential fault analysis countermeasure for the Montgomery power ladder in elliptic curve cryptography}, journal = {Math. Comput. Model.}, volume = {55}, number = {1-2}, pages = {256--267}, year = {2012}, url = {https://doi.org/10.1016/j.mcm.2011.06.017}, doi = {10.1016/j.mcm.2011.06.017}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/mcm/VasyltsovS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcas/LiuCL12, author = {Po{-}Chun Liu and Hsie{-}Chia Chang and Chen{-}Yi Lee}, title = {A True Random-Based Differential Power Analysis Countermeasure Circuit for an {AES} Engine}, journal = {{IEEE} Trans. Circuits Syst. {II} Express Briefs}, volume = {59-II}, number = {2}, pages = {103--107}, year = {2012}, url = {https://doi.org/10.1109/TCSII.2011.2180094}, doi = {10.1109/TCSII.2011.2180094}, timestamp = {Wed, 27 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcas/LiuCL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tim/MasiPT12, author = {Maria Gabriella Masi and Lorenzo Peretto and Roberto Tinarelli}, title = {Design and Performance Analysis of a Differential Current Sensor for Power System Applications}, journal = {{IEEE} Trans. Instrum. Meas.}, volume = {61}, number = {12}, pages = {3207--3215}, year = {2012}, url = {https://doi.org/10.1109/TIM.2012.2205513}, doi = {10.1109/TIM.2012.2205513}, timestamp = {Mon, 08 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tim/MasiPT12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isvlsi/KhedkarK12, author = {Ganesh Khedkar and Dhireesha Kudithipudi}, title = {{RRAM} Motifs for Mitigating Differential Power Analysis Attacks {(DPA)}}, booktitle = {{IEEE} Computer Society Annual Symposium on VLSI, {ISVLSI} 2012, Amherst, MA, USA, August 19-21, 2012}, pages = {88--93}, year = {2012}, crossref = {DBLP:conf/isvlsi/2012}, url = {https://doi.org/10.1109/ISVLSI.2012.68}, doi = {10.1109/ISVLSI.2012.68}, timestamp = {Wed, 16 Oct 2019 14:14:54 +0200}, biburl = {https://dblp.org/rec/conf/isvlsi/KhedkarK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/milcom/PatelB12, author = {Hiren J. Patel and Rusty Baldwin}, title = {{GPU} accelerated Differential Power Analysis}, booktitle = {31st {IEEE} Military Communications Conference, {MILCOM} 2012, Orlando, FL, USA, October 29 - November 1, 2012}, pages = {1--5}, year = {2012}, crossref = {DBLP:conf/milcom/2012}, url = {https://doi.org/10.1109/MILCOM.2012.6415611}, doi = {10.1109/MILCOM.2012.6415611}, timestamp = {Fri, 01 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/milcom/PatelB12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/milcom/PatelB12a, author = {Hiren J. Patel and Rusty Baldwin}, title = {Differential Power Analysis using wavelet decomposition}, booktitle = {31st {IEEE} Military Communications Conference, {MILCOM} 2012, Orlando, FL, USA, October 29 - November 1, 2012}, pages = {1--5}, year = {2012}, crossref = {DBLP:conf/milcom/2012}, url = {https://doi.org/10.1109/MILCOM.2012.6415612}, doi = {10.1109/MILCOM.2012.6415612}, timestamp = {Fri, 01 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/milcom/PatelB12a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/TangCQ12, author = {Ming Tang and Pingpan Cheng and Zhenlong Qiu}, title = {Differential Power Analysis on {ZUC} Algorithm}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {299}, year = {2012}, url = {http://eprint.iacr.org/2012/299}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/TangCQ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csda/LinL11, author = {Wan{-}Yu Lin and Wen{-}Chung Lee}, title = {Floating prioritized subset analysis: {A} powerful method to detect differentially expressed genes}, journal = {Comput. Stat. Data Anal.}, volume = {55}, number = {1}, pages = {903--913}, year = {2011}, url = {https://doi.org/10.1016/j.csda.2010.07.023}, doi = {10.1016/j.csda.2010.07.023}, timestamp = {Tue, 18 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/csda/LinL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-ifs/MangardOS11, author = {Stefan Mangard and Elisabeth Oswald and Fran{\c{c}}ois{-}Xavier Standaert}, title = {One for all - all for one: unifying standard differential power analysis attacks}, journal = {{IET} Inf. Secur.}, volume = {5}, number = {2}, pages = {100--110}, year = {2011}, url = {https://doi.org/10.1049/iet-ifs.2010.0096}, doi = {10.1049/iet-ifs.2010.0096}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-ifs/MangardOS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/KocherJJR11, author = {Paul C. Kocher and Joshua Jaffe and Benjamin Jun and Pankaj Rohatgi}, title = {Introduction to differential power analysis}, journal = {J. Cryptogr. Eng.}, volume = {1}, number = {1}, pages = {5--27}, year = {2011}, url = {https://doi.org/10.1007/s13389-011-0006-y}, doi = {10.1007/s13389-011-0006-y}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/KocherJJR11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cardis/BartkewitzL11, author = {Timo Bartkewitz and Kerstin Lemke{-}Rust}, title = {A High-Performance Implementation of Differential Power Analysis on Graphics Cards}, booktitle = {Smart Card Research and Advanced Applications - 10th {IFIP} {WG} 8.8/11.2 International Conference, {CARDIS} 2011, Leuven, Belgium, September 14-16, 2011, Revised Selected Papers}, pages = {252--265}, year = {2011}, crossref = {DBLP:conf/cardis/2011}, url = {https://doi.org/10.1007/978-3-642-27257-8\_16}, doi = {10.1007/978-3-642-27257-8\_16}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/cardis/BartkewitzL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csiirw/LiZQZS11, author = {Jiayin Li and Daigu Zhang and Meikang Qiu and Yongxin Zhu and Ju Shen}, title = {Security protection on {FPGA} against differential power analysis attacks}, booktitle = {Proceedings of the 7th Cyber Security and Information Intelligence Research Workshop, {CSIIRW} 2011, Oak Ridge, TN, USA, October 12-14, 2011}, pages = {67}, year = {2011}, crossref = {DBLP:conf/csiirw/2011}, url = {https://doi.org/10.1145/2179298.2179375}, doi = {10.1145/2179298.2179375}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csiirw/LiZQZS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/WoudenbergWB11, author = {Jasper G. J. van Woudenberg and Marc F. Witteman and Bram Bakker}, title = {Improving Differential Power Analysis by Elastic Alignment}, booktitle = {Topics in Cryptology - {CT-RSA} 2011 - The Cryptographers' Track at the {RSA} Conference 2011, San Francisco, CA, USA, February 14-18, 2011. Proceedings}, pages = {104--119}, year = {2011}, crossref = {DBLP:conf/ctrsa/2011}, url = {https://doi.org/10.1007/978-3-642-19074-2\_8}, doi = {10.1007/978-3-642-19074-2\_8}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/WoudenbergWB11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ddecs/NataleFRVR11, author = {Giorgio Di Natale and Marie{-}Lise Flottes and Bruno Rouzeyre and Miroslav Valka and Denis R{\'{e}}al}, title = {Power consumption traces realignment to improve differential power analysis}, booktitle = {14th {IEEE} International Symposium on Design and Diagnostics of Electronic Circuits {\&} Systems, {DDECS} 2011, Cottbus, Germany, April 13-15, 2011}, pages = {201--206}, year = {2011}, crossref = {DBLP:conf/ddecs/2011}, url = {https://doi.org/10.1109/DDECS.2011.5783080}, doi = {10.1109/DDECS.2011.5783080}, timestamp = {Wed, 16 Oct 2019 14:14:50 +0200}, biburl = {https://dblp.org/rec/conf/ddecs/NataleFRVR11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/host/KriegBGSWH11, author = {Armin Krieg and Christian Bachmann and Johannes Grinschgl and Christian Steger and Reinhold Weiss and Josef Haid}, title = {Accelerating early design phase differential power analysis using power emulation techniques}, booktitle = {{HOST} 2011, Proceedings of the 2011 {IEEE} International Symposium on Hardware-Oriented Security and Trust (HOST), 5-6 June 2011, San Diego, California, {USA}}, pages = {81--86}, year = {2011}, crossref = {DBLP:conf/host/2011}, url = {https://doi.org/10.1109/HST.2011.5955001}, doi = {10.1109/HST.2011.5955001}, timestamp = {Wed, 16 Oct 2019 14:14:56 +0200}, biburl = {https://dblp.org/rec/conf/host/KriegBGSWH11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ichit/ChoudhuryPBLLL11, author = {Amlan Jyoti Choudhury and Beum{-}Su Park and Bruce Ndibanje and Young{-}Sil Lee and Hyotaek Lim and Hoon{-}Jae Lee}, title = {An Efficient Hardware Countermeasure against Differential Power Analysis Attack}, booktitle = {Convergence and Hybrid Information Technology - 5th International Conference, {ICHIT} 2011, Daejeon, Korea, September 22-24, 2011. Proceedings}, pages = {153--159}, year = {2011}, crossref = {DBLP:conf/ichit/2011-2}, url = {https://doi.org/10.1007/978-3-642-24106-2\_20}, doi = {10.1007/978-3-642-24106-2\_20}, timestamp = {Thu, 28 Dec 2017 16:02:42 +0100}, biburl = {https://dblp.org/rec/conf/ichit/ChoudhuryPBLLL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispacs/MonteiroTS11, author = {C{\^{a}}ncio Monteiro and Yasuhiro Takahashi and Toshikazu Sekine}, title = {Resistance against power analysis attacks on adiabatic dynamic and adiabatic differential logics for smart card}, booktitle = {International Symposium on Intelligent Signal Processing and Communications Systems, {ISPACS} 2011, Chiang Mai, Thailand, December 7-9, 2011}, pages = {1--5}, year = {2011}, crossref = {DBLP:conf/ispacs/2011}, url = {https://doi.org/10.1109/ISPACS.2011.6146067}, doi = {10.1109/ISPACS.2011.6146067}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ispacs/MonteiroTS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itng/ZhangS11, author = {Fan Zhang and Zhijie Jerry Shi}, title = {Differential and Correlation Power Analysis Attacks on HMAC-Whirlpool}, booktitle = {Eighth International Conference on Information Technology: New Generations, {ITNG} 2011, Las Vegas, Nevada, USA, 11-13 April 2011}, pages = {359--365}, year = {2011}, crossref = {DBLP:conf/itng/2011}, url = {https://doi.org/10.1109/ITNG.2011.70}, doi = {10.1109/ITNG.2011.70}, timestamp = {Wed, 16 Oct 2019 14:14:53 +0200}, biburl = {https://dblp.org/rec/conf/itng/ZhangS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/worldcis/MasoumiM11, author = {Massoud Masoumi and Soheil Mohammadi}, title = {A new and efficient approach to protect {AES} against differential power analysis}, booktitle = {2011 World Congress on Internet Security, WorldCIS 2011, London, UK, February 21-23, 2011}, pages = {59--66}, year = {2011}, crossref = {DBLP:conf/worldcis/2011}, url = {https://ieeexplore.ieee.org/document/5749883/}, timestamp = {Thu, 12 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/worldcis/MasoumiM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/Caddy11a, author = {Tom Caddy}, title = {Differential Power Analysis}, booktitle = {Encyclopedia of Cryptography and Security, 2nd Ed}, pages = {336--338}, year = {2011}, crossref = {DBLP:reference/crypt/2011}, url = {https://doi.org/10.1007/978-1-4419-5906-5\_196}, doi = {10.1007/978-1-4419-5906-5\_196}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crypt/Caddy11a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/LeeSHHL10, author = {Sung Jae Lee and Seog Chung Seo and Dong{-}Guk Han and Seokhie Hong and Sangjin Lee}, title = {Acceleration of Differential Power Analysis through the Parallel Use of {GPU} and {CPU}}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {93-A}, number = {9}, pages = {1688--1692}, year = {2010}, url = {https://doi.org/10.1587/transfun.E93.A.1688}, doi = {10.1587/transfun.E93.A.1688}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/LeeSHHL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mj/AliotoBL10, author = {Massimo Alioto and St{\'{e}}phane Badel and Yusuf Leblebici}, title = {Optimization of the wire grid size for differential routing: Analysis and impact on the power-delay-area tradeoff}, journal = {Microelectron. J.}, volume = {41}, number = {10}, pages = {669--679}, year = {2010}, url = {https://doi.org/10.1016/j.mejo.2010.06.005}, doi = {10.1016/j.mejo.2010.06.005}, timestamp = {Sat, 22 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/mj/AliotoBL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/simpra/Tripathy10, author = {Manoj Tripathy}, title = {Power transformer differential protection using neural network Principal Component Analysis and Radial Basis Function Neural Network}, journal = {Simul. Model. Pract. Theory}, volume = {18}, number = {5}, pages = {600--611}, year = {2010}, url = {https://doi.org/10.1016/j.simpat.2010.01.003}, doi = {10.1016/j.simpat.2010.01.003}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/simpra/Tripathy10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/AliotoPR10, author = {Massimo Alioto and Massimo Poli and Santina Rocchi}, title = {Differential Power Analysis Attacks to Precharged Buses: {A} General Analysis for Symmetric-Key Cryptographic Algorithms}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {7}, number = {3}, pages = {226--239}, year = {2010}, url = {https://doi.org/10.1109/TDSC.2009.1}, doi = {10.1109/TDSC.2009.1}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/AliotoPR10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tvlsi/AliotoPR10, author = {Massimo Alioto and Massimo Poli and Santina Rocchi}, title = {A General Power Model of Differential Power Analysis Attacks to Static Logic Circuits}, journal = {{IEEE} Trans. Very Large Scale Integr. Syst.}, volume = {18}, number = {5}, pages = {711--724}, year = {2010}, url = {https://doi.org/10.1109/TVLSI.2009.2015327}, doi = {10.1109/TVLSI.2009.2015327}, timestamp = {Wed, 11 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tvlsi/AliotoPR10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEias/MahmoudA10, author = {Hanan A. Mahmoud and Khaled Alghathbar}, title = {Novel algorithmic countermeasures for Differential Power Analysis attacks on smart cards}, booktitle = {Sixth International Conference on Information Assurance and Security, {IAS} 2010, Atlanta, GA, USA, August 23-25, 2010}, pages = {52--55}, year = {2010}, crossref = {DBLP:conf/IEEEias/2010}, url = {https://doi.org/10.1109/ISIAS.2010.5604079}, doi = {10.1109/ISIAS.2010.5604079}, timestamp = {Wed, 16 Oct 2019 14:14:55 +0200}, biburl = {https://dblp.org/rec/conf/IEEEias/MahmoudA10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/LuPH10, author = {Jiqiang Lu and Jing Pan and Jerry den Hartog}, title = {Principles on the Security of {AES} against First and Second-Order Differential Power Analysis}, booktitle = {Applied Cryptography and Network Security, 8th International Conference, {ACNS} 2010, Beijing, China, June 22-25, 2010. Proceedings}, pages = {168--185}, year = {2010}, crossref = {DBLP:conf/acns/2010}, url = {https://doi.org/10.1007/978-3-642-13708-2\_11}, doi = {10.1007/978-3-642-13708-2\_11}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/LuPH10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/apccas/BoeyLOW10, author = {Keanhong Boey and Yingxi Lu and M{\'{a}}ire O'Neill and Roger F. Woods}, title = {Random clock against differential power analysis}, booktitle = {{IEEE} Asia Pacific Conference on Circuits and Systems, {APCCAS} 2010, Kuala Lumpur, Malaysia, December 6-9, 2010}, pages = {756--759}, year = {2010}, crossref = {DBLP:conf/apccas/2010}, url = {https://doi.org/10.1109/APCCAS.2010.5774887}, doi = {10.1109/APCCAS.2010.5774887}, timestamp = {Wed, 16 Oct 2019 14:14:50 +0200}, biburl = {https://dblp.org/rec/conf/apccas/BoeyLOW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/date/LomneDMTR10, author = {Victor Lomn{\'{e}} and Amine Dehbaoui and Philippe Maurine and Lionel Torres and Michel Robert}, title = {Differential Power Analysis enhancement with statistical preprocessing}, booktitle = {Design, Automation and Test in Europe, {DATE} 2010, Dresden, Germany, March 8-12, 2010}, pages = {1301--1304}, year = {2010}, crossref = {DBLP:conf/date/2010}, url = {https://doi.org/10.1109/DATE.2010.5457007}, doi = {10.1109/DATE.2010.5457007}, timestamp = {Wed, 16 Oct 2019 14:14:53 +0200}, biburl = {https://dblp.org/rec/conf/date/LomneDMTR10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/delta/NataleFR10, author = {Giorgio Di Natale and Marie{-}Lise Flottes and Bruno Rouzeyre}, title = {Evaluation of Resistance to Differential Power Analysis: Execution Time Optimizations for Designers}, booktitle = {Fifth {IEEE} International Symposium on Electronic Design, Test {\&} Applications, {DELTA} 2010, Ho Chi Minh City, Vietnam, January 13-15, 2010}, pages = {256--261}, year = {2010}, crossref = {DBLP:conf/delta/2010}, url = {https://doi.org/10.1109/DELTA.2010.50}, doi = {10.1109/DELTA.2010.50}, timestamp = {Wed, 16 Oct 2019 14:14:54 +0200}, biburl = {https://dblp.org/rec/conf/delta/NataleFR10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isvlsi/BoeyLOW10, author = {Keanhong Boey and Yingxi Lu and M{\'{a}}ire O'Neill and Roger F. Woods}, title = {Differential Power Analysis of {CAST-128}}, booktitle = {{IEEE} Computer Society Annual Symposium on VLSI, {ISVLSI} 2010, 5-7 July 2010, Lixouri Kefalonia, Greece}, pages = {143--148}, year = {2010}, crossref = {DBLP:conf/isvlsi/2010}, url = {https://doi.org/10.1109/ISVLSI.2010.14}, doi = {10.1109/ISVLSI.2010.14}, timestamp = {Wed, 16 Oct 2019 14:14:54 +0200}, biburl = {https://dblp.org/rec/conf/isvlsi/BoeyLOW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/platzner2010/StottingerMH10, author = {Marc St{\"{o}}ttinger and Felix Madlener and Sorin A. Huss}, title = {Procedures for Securing {ECC} Implementations Against Differential Power Analysis Using Reconfigurable Architectures}, booktitle = {Dynamically Reconfigurable Systems - Architectures, Design Methods and Applications}, pages = {395--415}, year = {2010}, crossref = {DBLP:books/sp/platzner10}, url = {https://doi.org/10.1007/978-90-481-3485-4\_19}, doi = {10.1007/978-90-481-3485-4\_19}, timestamp = {Sun, 25 Jul 2021 11:34:40 +0200}, biburl = {https://dblp.org/rec/books/sp/platzner2010/StottingerMH10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1010-0169, author = {Massoud Masoumi}, title = {A Novel and Highly Efficient {AES} Implementation Robust against Differential Power Analysis}, journal = {CoRR}, volume = {abs/1010.0169}, year = {2010}, url = {http://arxiv.org/abs/1010.0169}, eprinttype = {arXiv}, eprint = {1010.0169}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1010-0169.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ProuffRB10, author = {Emmanuel Prouff and Matthieu Rivain and R{\'{e}}gis Bevan}, title = {Statistical Analysis of Second Order Differential Power Analysis}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {646}, year = {2010}, url = {http://eprint.iacr.org/2010/646}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ProuffRB10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@phdthesis{DBLP:phd/ethos/Goodwin09, author = {John Goodwin}, title = {Novel countermeasures and techniques for differential power analysis}, school = {University of Southampton, {UK}}, year = {2009}, url = {http://eprints.soton.ac.uk/72692/}, timestamp = {Tue, 05 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/phd/ethos/Goodwin09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/icae/SunYZ09, author = {Song Sun and Zijun Yan and Joseph Zambreno}, title = {Demonstrable differential power analysis attacks on real-world FPGA-based embedded systems}, journal = {Integr. Comput. Aided Eng.}, volume = {16}, number = {2}, pages = {119--130}, year = {2009}, url = {https://doi.org/10.3233/ICA-2009-0309}, doi = {10.3233/ICA-2009-0309}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/icae/SunYZ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tc/ProuffRB09, author = {Emmanuel Prouff and Matthieu Rivain and R{\'{e}}gis Bevan}, title = {Statistical Analysis of Second Order Differential Power Analysis}, journal = {{IEEE} Trans. Computers}, volume = {58}, number = {6}, pages = {799--811}, year = {2009}, url = {https://doi.org/10.1109/TC.2009.15}, doi = {10.1109/TC.2009.15}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tc/ProuffRB09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/trets/McEvoyMMT09, author = {Robert P. McEvoy and Colin C. Murphy and William P. Marnane and Michael Tunstall}, title = {Isolated {WDDL:} {A} Hiding Countermeasure for Differential Power Analysis on FPGAs}, journal = {{ACM} Trans. Reconfigurable Technol. Syst.}, volume = {2}, number = {1}, pages = {3:1--3:23}, year = {2009}, url = {https://doi.org/10.1145/1502781.1502784}, doi = {10.1145/1502781.1502784}, timestamp = {Fri, 24 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/trets/McEvoyMMT09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecctd/DanisO09, author = {Abid Uveys Danis and Berna {\"{O}}rs}, title = {Differential power analysis attack considering decoupling capacitance effect}, booktitle = {19th European Conference on Circuit Theory and Design, {ECCTD} 2009, Antalya, Turkey, August 23-27, 2009}, pages = {359--362}, year = {2009}, crossref = {DBLP:conf/ecctd/2009}, url = {https://doi.org/10.1109/ECCTD.2009.5274996}, doi = {10.1109/ECCTD.2009.5274996}, timestamp = {Tue, 16 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ecctd/DanisO09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecctd/SugawaraHAS09, author = {Takeshi Sugawara and Naofumi Homma and Takafumi Aoki and Akashi Satoh}, title = {Differential power analysis of {AES} {ASIC} implementations with various S-box circuits}, booktitle = {19th European Conference on Circuit Theory and Design, {ECCTD} 2009, Antalya, Turkey, August 23-27, 2009}, pages = {395--398}, year = {2009}, crossref = {DBLP:conf/ecctd/2009}, url = {https://doi.org/10.1109/ECCTD.2009.5275004}, doi = {10.1109/ECCTD.2009.5275004}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ecctd/SugawaraHAS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iscid/YangXYL09, author = {Weiming Yang and Jinhui Xu and Yingjian Yan and Kai Liu}, title = {Research on Time Randomization of {AES} against Differential Power Analysis}, booktitle = {2009 Second International Symposium on Computational Intelligence and Design, {ISCID} 2009, Changsha, Hunan, China, 12-14 December 2009, 2 Volumes}, pages = {536--539}, year = {2009}, crossref = {DBLP:conf/iscid/2009}, url = {https://doi.org/10.1109/ISCID.2009.280}, doi = {10.1109/ISCID.2009.280}, timestamp = {Wed, 16 Oct 2019 14:14:50 +0200}, biburl = {https://dblp.org/rec/conf/iscid/YangXYL09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/spl/RyooHKL08, author = {Jeong Choon Ryoo and Dong{-}Guk Han and Sung{-}Kyoung Kim and Sangjin Lee}, title = {Performance Enhancement of Differential Power Analysis Attacks With Signal Companding Methods}, journal = {{IEEE} Signal Process. Lett.}, volume = {15}, pages = {625--628}, year = {2008}, url = {https://doi.org/10.1109/LSP.2008.2002930}, doi = {10.1109/LSP.2008.2002930}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/spl/RyooHKL08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tc/MuresanG08, author = {Radu Muresan and Stefano Gregori}, title = {Protection Circuit against Differential Power Analysis Attacks for Smart Cards}, journal = {{IEEE} Trans. Computers}, volume = {57}, number = {11}, pages = {1540--1549}, year = {2008}, url = {https://doi.org/10.1109/TC.2008.107}, doi = {10.1109/TC.2008.107}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tc/MuresanG08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/delta/NataleFR08, author = {Giorgio Di Natale and Marie{-}Lise Flottes and Bruno Rouzeyre}, title = {An Integrated Validation Environment for Differential Power Analysis}, booktitle = {4th {IEEE} International Symposium on Electronic Design, Test and Applications, {DELTA} 2008, Hong Kong, January 23-25, 2008}, pages = {527--532}, year = {2008}, crossref = {DBLP:conf/delta/2008}, url = {https://doi.org/10.1109/DELTA.2008.61}, doi = {10.1109/DELTA.2008.61}, timestamp = {Wed, 16 Oct 2019 14:14:54 +0200}, biburl = {https://dblp.org/rec/conf/delta/NataleFR08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eit/SunYZ08, author = {Song Sun and Zijun Yan and Joseph Zambreno}, title = {Experiments in attacking FPGA-based embedded systems using differential power analysis}, booktitle = {2008 {IEEE} International Conference on Electro/Information Technology, {EIT} 2008, held at Iowa State University, Ames, Iowa, USA, May 18-20, 2008}, pages = {7--12}, year = {2008}, crossref = {DBLP:conf/eit/2008}, url = {https://doi.org/10.1109/EIT.2008.4554259}, doi = {10.1109/EIT.2008.4554259}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eit/SunYZ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icecsys/GiancaneMOST08, author = {Luca Giancane and Piero Marietti and Mauro Olivieri and Giuseppe Scotti and Alessandro Trifiletti}, title = {A new dynamic differential logic style as a countermeasure to power analysis attacks}, booktitle = {15th {IEEE} International Conference on Electronics, Circuits and Systems, {ICECS} 2008, St. Julien's, Malta, August 31 2008-September 3, 2008}, pages = {364--367}, year = {2008}, crossref = {DBLP:conf/icecsys/2008}, url = {https://doi.org/10.1109/ICECS.2008.4674866}, doi = {10.1109/ICECS.2008.4674866}, timestamp = {Wed, 16 Oct 2019 14:14:55 +0200}, biburl = {https://dblp.org/rec/conf/icecsys/GiancaneMOST08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icecsys/StrachackiS08, author = {Marek Strachacki and Stanislaw Szczepanski}, title = {Implementation of {AES} algorithm resistant to differential power analysis}, booktitle = {15th {IEEE} International Conference on Electronics, Circuits and Systems, {ICECS} 2008, St. Julien's, Malta, August 31 2008-September 3, 2008}, pages = {214--217}, year = {2008}, crossref = {DBLP:conf/icecsys/2008}, url = {https://doi.org/10.1109/ICECS.2008.4674829}, doi = {10.1109/ICECS.2008.4674829}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icecsys/StrachackiS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iscas/AliotoPR08, author = {Massimo Alioto and Massimo Poli and Santina Rocchi}, title = {A general model for differential power analysis attacks to static logic circuits}, booktitle = {International Symposium on Circuits and Systems {(ISCAS} 2008), 18-21 May 2008, Sheraton Seattle Hotel, Seattle, Washington, {USA}}, pages = {3346--3349}, year = {2008}, crossref = {DBLP:conf/iscas/2008}, url = {https://doi.org/10.1109/ISCAS.2008.4542175}, doi = {10.1109/ISCAS.2008.4542175}, timestamp = {Wed, 16 Oct 2019 14:14:49 +0200}, biburl = {https://dblp.org/rec/conf/iscas/AliotoPR08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iscas/BayamO08, author = {Keklik Alptekin Bayam and Siddika Berna {\"{O}}rs}, title = {Differential Power Analysis resistant hardware implementation of the {RSA} cryptosystem}, booktitle = {International Symposium on Circuits and Systems {(ISCAS} 2008), 18-21 May 2008, Sheraton Seattle Hotel, Seattle, Washington, {USA}}, pages = {3314--3317}, year = {2008}, crossref = {DBLP:conf/iscas/2008}, url = {https://doi.org/10.1109/ISCAS.2008.4542167}, doi = {10.1109/ISCAS.2008.4542167}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iscas/BayamO08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iscas/LinB08, author = {Lang Lin and Wayne P. Burleson}, title = {Leakage-based differential power analysis {(LDPA)} on sub-90nm {CMOS} cryptosystems}, booktitle = {International Symposium on Circuits and Systems {(ISCAS} 2008), 18-21 May 2008, Sheraton Seattle Hotel, Seattle, Washington, {USA}}, pages = {252--255}, year = {2008}, crossref = {DBLP:conf/iscas/2008}, url = {https://doi.org/10.1109/ISCAS.2008.4541402}, doi = {10.1109/ISCAS.2008.4541402}, timestamp = {Mon, 06 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iscas/LinB08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iscas/LuOM08, author = {Yingxi Lu and M{\'{a}}ire O'Neill and John V. McCanny}, title = {Differential Power Analysis of a {SHACAL-2} hardware implementation}, booktitle = {International Symposium on Circuits and Systems {(ISCAS} 2008), 18-21 May 2008, Sheraton Seattle Hotel, Seattle, Washington, {USA}}, pages = {2933--2936}, year = {2008}, crossref = {DBLP:conf/iscas/2008}, url = {https://doi.org/10.1109/ISCAS.2008.4542072}, doi = {10.1109/ISCAS.2008.4542072}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iscas/LuOM08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sbcci/GhellarL08, author = {Felipe Ghellar and Marcelo Lubaszewski}, title = {A novel {AES} cryptographic core highly resistant to differential power analysis attacks}, booktitle = {Proceedings of the 21st Annual Symposium on Integrated Circuits and Systems Design, {SBCCI} 2008, Gramado, Brazil, September 1-4, 2008}, pages = {140--145}, year = {2008}, crossref = {DBLP:conf/sbcci/2008}, url = {https://doi.org/10.1145/1404371.1404413}, doi = {10.1145/1404371.1404413}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sbcci/GhellarL08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/synasc/AmbroseAIP08, author = {Jude Angelo Ambrose and Naeill Aldon and Aleksandar Ignjatovic and Sri Parameswaran}, title = {Anatomy of Differential Power Analysis for {AES}}, booktitle = {{SYNASC} 2008, 10th International Symposium on Symbolic and Numeric Algorithms for Scientific Computing, Timisoara, Romania, 26-29 September 2008}, pages = {459--466}, year = {2008}, crossref = {DBLP:conf/synasc/2008}, url = {https://doi.org/10.1109/SYNASC.2008.8}, doi = {10.1109/SYNASC.2008.8}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/synasc/AmbroseAIP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/LeeLK07, author = {Jong Suk Lee and Jae Woon Lee and Young Hwan Kim}, title = {Symmetric Discharge Logic against Differential Power Analysis}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {90-A}, number = {1}, pages = {234--240}, year = {2007}, url = {https://doi.org/10.1093/ietfec/e90-a.1.234}, doi = {10.1093/ietfec/e90-a.1.234}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/LeeLK07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/FischerGKV07, author = {Wieland Fischer and Berndt M. Gammel and O. Kniffler and Joachim Velten}, title = {Differential Power Analysis of Stream Ciphers}, booktitle = {Topics in Cryptology - {CT-RSA} 2007, The Cryptographers' Track at the {RSA} Conference 2007, San Francisco, CA, USA, February 5-9, 2007, Proceedings}, pages = {257--270}, year = {2007}, crossref = {DBLP:conf/ctrsa/2007}, url = {https://doi.org/10.1007/11967668\_17}, doi = {10.1007/11967668\_17}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/FischerGKV07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/indocrypt/FumaroliMD07, author = {Guillaume Fumaroli and Emmanuel Mayer and Renaud Dubois}, title = {First-Order Differential Power Analysis on the Duplication Method}, booktitle = {Progress in Cryptology - {INDOCRYPT} 2007, 8th International Conference on Cryptology in India, Chennai, India, December 9-13, 2007, Proceedings}, pages = {210--223}, year = {2007}, crossref = {DBLP:conf/indocrypt/2007}, url = {https://doi.org/10.1007/978-3-540-77026-8\_16}, doi = {10.1007/978-3-540-77026-8\_16}, timestamp = {Tue, 14 May 2019 10:00:51 +0200}, biburl = {https://dblp.org/rec/conf/indocrypt/FumaroliMD07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/indocrypt/KumarMC07, author = {Kundan Kumar and Debdeep Mukhopadhyay and Dipanwita Roy Chowdhury}, title = {Design of a Differential Power Analysis Resistant Masked {AES} S-Box}, booktitle = {Progress in Cryptology - {INDOCRYPT} 2007, 8th International Conference on Cryptology in India, Chennai, India, December 9-13, 2007, Proceedings}, pages = {373--383}, year = {2007}, crossref = {DBLP:conf/indocrypt/2007}, url = {https://doi.org/10.1007/978-3-540-77026-8\_29}, doi = {10.1007/978-3-540-77026-8\_29}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/indocrypt/KumarMC07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iscas/AliotoPRV07, author = {Massimo Alioto and Massimo Poli and Santina Rocchi and Valerio Vignoli}, title = {Mixed Techniques to Protect Precharged Busses against Differential Power Analysis Attacks}, booktitle = {International Symposium on Circuits and Systems {(ISCAS} 2007), 27-20 May 2007, New Orleans, Louisiana, {USA}}, pages = {861--864}, year = {2007}, crossref = {DBLP:conf/iscas/2007}, url = {https://doi.org/10.1109/ISCAS.2007.378042}, doi = {10.1109/ISCAS.2007.378042}, timestamp = {Wed, 16 Oct 2019 14:14:49 +0200}, biburl = {https://dblp.org/rec/conf/iscas/AliotoPRV07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vlsid/BaddamZ07, author = {Karthik Baddam and Mark Zwolinski}, title = {Evaluation of Dynamic Voltage and Frequency Scaling as a Differential Power Analysis Countermeasure}, booktitle = {20th International Conference on {VLSI} Design {(VLSI} Design 2007), Sixth International Conference on Embedded Systems {(ICES} 2007), 6-10 January 2007, Bangalore, India}, pages = {854--862}, year = {2007}, crossref = {DBLP:conf/vlsid/2007}, url = {https://doi.org/10.1109/VLSID.2007.79}, doi = {10.1109/VLSID.2007.79}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/vlsid/BaddamZ07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/McEvoyTMM07, author = {Robert P. McEvoy and Michael Tunstall and Colin C. Murphy and William P. Marnane}, title = {Differential Power Analysis of {HMAC} Based on SHA-2, and Countermeasures}, booktitle = {Information Security Applications, 8th International Workshop, {WISA} 2007, Jeju Island, Korea, August 27-29, 2007, Revised Selected Papers}, pages = {317--332}, year = {2007}, crossref = {DBLP:conf/wisa/2007}, url = {https://doi.org/10.1007/978-3-540-77535-5\_23}, doi = {10.1007/978-3-540-77535-5\_23}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisa/McEvoyTMM07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/entcs/GurkaynakOKFF06, author = {Frank K. G{\"{u}}rkaynak and Stephan Oetiker and Hubert Kaeslin and Norbert Felber and Wolfgang Fichtner}, title = {Design Challenges for a Differential-Power-Analysis Aware GALS-based {AES} Crypto {ASIC}}, journal = {Electron. Notes Theor. Comput. Sci.}, volume = {146}, number = {2}, pages = {133--149}, year = {2006}, url = {https://doi.org/10.1016/j.entcs.2005.05.039}, doi = {10.1016/j.entcs.2005.05.039}, timestamp = {Fri, 12 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/entcs/GurkaynakOKFF06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iandc/Lv06, author = {Jiqiang Lv}, title = {On two {DES} implementations secure against differential power analysis in smart-cards}, journal = {Inf. Comput.}, volume = {204}, number = {7}, pages = {1179--1193}, year = {2006}, url = {https://doi.org/10.1016/j.ic.2006.04.002}, doi = {10.1016/j.ic.2006.04.002}, timestamp = {Fri, 12 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iandc/Lv06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jssc/HwangTHLYSV06, author = {David D. Hwang and Kris Tiri and Alireza Hodjat and Bo{-}Cheng Lai and Shenglin Yang and Patrick Schaumont and Ingrid Verbauwhede}, title = {AES-Based Security Coprocessor {IC} in 0.18-{\textdollar}muhbox m{\textdollar}CMOS With Resistance to Differential Power Analysis Side-Channel Attacks}, journal = {{IEEE} J. Solid State Circuits}, volume = {41}, number = {4}, pages = {781--792}, year = {2006}, url = {https://doi.org/10.1109/JSSC.2006.870913}, doi = {10.1109/JSSC.2006.870913}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jssc/HwangTHLYSV06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cardis/AkishitaT06, author = {Toru Akishita and Tsuyoshi Takagi}, title = {Power Analysis to {ECC} Using Differential Power Between Multiplication and Squaring}, booktitle = {Smart Card Research and Advanced Applications, 7th {IFIP} {WG} 8.8/11.2 International Conference, {CARDIS} 2006, Tarragona, Spain, April 19-21, 2006, Proceedings}, pages = {151--164}, year = {2006}, crossref = {DBLP:conf/cardis/2006}, url = {https://doi.org/10.1007/11733447\_11}, doi = {10.1007/11733447\_11}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/cardis/AkishitaT06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/ParkLHCKM06, author = {JeaHoon Park and Hoon{-}Jae Lee and JaeCheol Ha and YongJe Choi and Howon Kim and Sang{-}Jae Moon}, title = {A Differential Power Analysis Attack of Block Cipher Based on the Hamming Weight of Internal Operation Unit}, booktitle = {Computational Intelligence and Security, International Conference, {CIS} 2006, Guangzhou, China, November 3-6, 2006, Revised Selected Papers}, pages = {417--426}, year = {2006}, crossref = {DBLP:conf/cis/2006}, url = {https://doi.org/10.1007/978-3-540-74377-4\_44}, doi = {10.1007/978-3-540-74377-4\_44}, timestamp = {Tue, 19 Nov 2019 12:34:54 +0100}, biburl = {https://dblp.org/rec/conf/cis/ParkLHCKM06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iscas/CorsonelloPM06, author = {Pasquale Corsonello and Stefania Perri and Martin Margala}, title = {An integrated countermeasure against differential power analysis for secure smart-cards}, booktitle = {International Symposium on Circuits and Systems {(ISCAS} 2006), 21-24 May 2006, Island of Kos, Greece}, year = {2006}, crossref = {DBLP:conf/iscas/2006}, url = {https://doi.org/10.1109/ISCAS.2006.1693907}, doi = {10.1109/ISCAS.2006.1693907}, timestamp = {Wed, 16 Oct 2019 14:14:49 +0200}, biburl = {https://dblp.org/rec/conf/iscas/CorsonelloPM06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/patmos/AliotoPRV06a, author = {Massimo Alioto and Massimo Poli and Santina Rocchi and Valerio Vignoli}, title = {Techniques to Enhance the Resistance of Precharged Busses to Differential Power Analysis}, booktitle = {Integrated Circuit and System Design. Power and Timing Modeling, Optimization and Simulation, 16th International Workshop, {PATMOS} 2006, Montpellier, France, September 13-15, 2006, Proceedings}, pages = {624--633}, year = {2006}, crossref = {DBLP:conf/patmos/2006}, url = {https://doi.org/10.1007/11847083\_61}, doi = {10.1007/11847083\_61}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/patmos/AliotoPRV06a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/LvH05, author = {Jiqiang Lv and Yongfei Han}, title = {Enhanced {DES} Implementation Secure Against High-Order Differential Power Analysis in Smartcards}, booktitle = {Information Security and Privacy, 10th Australasian Conference, {ACISP} 2005, Brisbane, Australia, July 4-6, 2005, Proceedings}, pages = {195--206}, year = {2005}, crossref = {DBLP:conf/acisp/2005}, url = {https://doi.org/10.1007/11506157\_17}, doi = {10.1007/11506157\_17}, timestamp = {Tue, 14 May 2019 10:00:46 +0200}, biburl = {https://dblp.org/rec/conf/acisp/LvH05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/JoyePS05, author = {Marc Joye and Pascal Paillier and Berry Schoenmakers}, title = {On Second-Order Differential Power Analysis}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2005, 7th International Workshop, Edinburgh, UK, August 29 - September 1, 2005, Proceedings}, pages = {293--308}, year = {2005}, crossref = {DBLP:conf/ches/2005}, url = {https://doi.org/10.1007/11545262\_22}, doi = {10.1007/11545262\_22}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/ches/JoyePS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hpcc/HaKMPY05, author = {JaeCheol Ha and ChangKyun Kim and Sang{-}Jae Moon and IlHwan Park and HyungSo Yoo}, title = {Differential Power Analysis on Block Cipher {ARIA}}, booktitle = {High Performance Computing and Communications, First International Conference, {HPCC} 2005, Sorrento, Italy, September 21-23, 2005, Proceedings}, pages = {541--548}, year = {2005}, crossref = {DBLP:conf/hpcc/2005}, url = {https://doi.org/10.1007/11557654\_63}, doi = {10.1007/11557654\_63}, timestamp = {Tue, 14 May 2019 10:00:45 +0200}, biburl = {https://dblp.org/rec/conf/hpcc/HaKMPY05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iscas/BucciLGT05, author = {Marco Bucci and Raimondo Luzzi and Michele Guglielmo and Alessandro Trifiletti}, title = {A countermeasure against differential power analysis based on random delay insertion}, booktitle = {International Symposium on Circuits and Systems {(ISCAS} 2005), 23-26 May 2005, Kobe, Japan}, pages = {3547--3550}, year = {2005}, crossref = {DBLP:conf/iscas/2005}, url = {https://doi.org/10.1109/ISCAS.2005.1465395}, doi = {10.1109/ISCAS.2005.1465395}, timestamp = {Wed, 16 Oct 2019 14:14:49 +0200}, biburl = {https://dblp.org/rec/conf/iscas/BucciLGT05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/Caddy05a, author = {Tom Caddy}, title = {Differential Power Analysis}, booktitle = {Encyclopedia of Cryptography and Security}, year = {2005}, crossref = {DBLP:reference/crypt/2005}, url = {https://doi.org/10.1007/0-387-23483-7\_110}, doi = {10.1007/0-387-23483-7\_110}, timestamp = {Thu, 27 Jun 2019 15:50:13 +0200}, biburl = {https://dblp.org/rec/reference/crypt/Caddy05a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cardis/GuilleyHP04, author = {Sylvain Guilley and Philippe Hoogvorst and Renaud Pacalet}, title = {Differential Power Analysis Model and Some Results}, booktitle = {Smart Card Research and Advanced Applications VI, {IFIP} 18th World Computer Congress, {TC8/WG8.8} {\&} {TC11/WG11.2} Sixth International Conference on Smart Card Research and Advanced Applications (CARDIS), 22-27 August 2004, Toulouse, France}, pages = {127--142}, year = {2004}, crossref = {DBLP:conf/cardis/2004}, url = {https://doi.org/10.1007/1-4020-8147-2\_9}, doi = {10.1007/1-4020-8147-2\_9}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cardis/GuilleyHP04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/TiriV04a, author = {Kris Tiri and Ingrid Verbauwhede}, title = {Charge Recycling Sense Amplifier Based Logic: Securing Low Power Security IC's against Differential Power Analysis}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {67}, year = {2004}, url = {http://eprint.iacr.org/2004/067}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/TiriV04a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/Avanzi03, author = {Roberto Maria Avanzi}, title = {Countermeasures against Differential Power Analysis for Hyperelliptic Curve Cryptosystems}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2003, 5th International Workshop, Cologne, Germany, September 8-10, 2003, Proceedings}, pages = {366--381}, year = {2003}, crossref = {DBLP:conf/ches/2003}, url = {https://doi.org/10.1007/978-3-540-45238-6\_29}, doi = {10.1007/978-3-540-45238-6\_29}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/ches/Avanzi03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/ItohIT03, author = {Kouichi Itoh and Tetsuya Izu and Masahiko Takenaka}, title = {A Practical Countermeasure against Address-Bit Differential Power Analysis}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2003, 5th International Workshop, Cologne, Germany, September 8-10, 2003, Proceedings}, pages = {382--396}, year = {2003}, crossref = {DBLP:conf/ches/2003}, url = {https://doi.org/10.1007/978-3-540-45238-6\_30}, doi = {10.1007/978-3-540-45238-6\_30}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/ItohIT03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csreaSAM/ChoiLKCW03, author = {Hee Bong Choi and Hyoon Jae Lee and Choon Su Kim and Byung Hwa Chang and Dongho Won}, title = {On Differential Power Analysis Attack on the Addition Modular 2\({}^{\mbox{N}}\) Operation of Smart Cards}, booktitle = {Proceedings of the International Conference on Security and Management, {SAM} '03, June 23 - 26, 2003, Las Vegas, Nevada, USA, Volume 1}, pages = {260--266}, year = {2003}, crossref = {DBLP:conf/csreaSAM/2003-1}, timestamp = {Wed, 06 Dec 2006 10:55:26 +0100}, biburl = {https://dblp.org/rec/conf/csreaSAM/ChoiLKCW03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dac/BeniniMMOPP03, author = {Luca Benini and Alberto Macii and Enrico Macii and Elvira Omerbegovic and Fabrizio Pro and Massimo Poncino}, title = {Energy-aware design techniques for differential power analysis protection}, booktitle = {Proceedings of the 40th Design Automation Conference, {DAC} 2003, Anaheim, CA, USA, June 2-6, 2003}, pages = {36--41}, year = {2003}, crossref = {DBLP:conf/dac/2003}, url = {https://doi.org/10.1145/775832.775845}, doi = {10.1145/775832.775845}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dac/BeniniMMOPP03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/AkkarG03, author = {Mehdi{-}Laurent Akkar and Louis Goubin}, title = {A Generic Protection against High-Order Differential Power Analysis}, booktitle = {Fast Software Encryption, 10th International Workshop, {FSE} 2003, Lund, Sweden, February 24-26, 2003, Revised Papers}, pages = {192--205}, year = {2003}, crossref = {DBLP:conf/fse/2003}, url = {https://doi.org/10.1007/978-3-540-39887-5\_15}, doi = {10.1007/978-3-540-39887-5\_15}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/fse/AkkarG03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/Novak03, author = {Roman Novak}, title = {Sign-Based Differential Power Analysis}, booktitle = {Information Security Applications, 4th International Workshop, {WISA} 2003, Jeju Island, Korea, August 25-27, 2003, Revised Papers}, pages = {203--216}, year = {2003}, crossref = {DBLP:conf/wisa/2003}, url = {https://doi.org/10.1007/978-3-540-24591-9\_16}, doi = {10.1007/978-3-540-24591-9\_16}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/Novak03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/ItohIT02, author = {Kouichi Itoh and Tetsuya Izu and Masahiko Takenaka}, title = {Address-Bit Differential Power Analysis of Cryptographic Schemes {OK-ECDH} and {OK-ECDSA}}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2002, 4th International Workshop, Redwood Shores, CA, USA, August 13-15, 2002, Revised Papers}, pages = {129--143}, year = {2002}, crossref = {DBLP:conf/ches/2002}, url = {https://doi.org/10.1007/3-540-36400-5\_11}, doi = {10.1007/3-540-36400-5\_11}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/ches/ItohIT02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/BevanK02, author = {R{\'{e}}gis Bevan and Erik Knudsen}, title = {Ways to Enhance Differential Power Analysis}, booktitle = {Information Security and Cryptology - {ICISC} 2002, 5th International Conference Seoul, Korea, November 28-29, 2002, Revised Papers}, pages = {327--342}, year = {2002}, crossref = {DBLP:conf/icisc/2002}, url = {https://doi.org/10.1007/3-540-36552-4\_23}, doi = {10.1007/3-540-36552-4\_23}, timestamp = {Tue, 14 May 2019 10:00:36 +0200}, biburl = {https://dblp.org/rec/conf/icisc/BevanK02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iscas/ChaniotisPH01, author = {Dimitrios Chaniotis and M. A. Pai and Ian A. Hiskens}, title = {Sensitivity analysis of differential-algebraic systems using the {GMRES} method-application to power systems}, booktitle = {Proceedings of the 2001 International Symposium on Circuits and Systems, {ISCAS} 2001, Sydney, Australia, May 6-9, 2001}, pages = {117--120}, year = {2001}, crossref = {DBLP:conf/iscas/2001}, url = {https://doi.org/10.1109/ISCAS.2001.921260}, doi = {10.1109/ISCAS.2001.921260}, timestamp = {Thu, 29 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iscas/ChaniotisPH01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/ClavierCD00, author = {Christophe Clavier and Jean{-}S{\'{e}}bastien Coron and Nora Dabbous}, title = {Differential Power Analysis in the Presence of Hardware Countermeasures}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2000, Second International Workshop, Worcester, MA, USA, August 17-18, 2000, Proceedings}, pages = {252--263}, year = {2000}, crossref = {DBLP:conf/ches/2000}, url = {https://doi.org/10.1007/3-540-44499-8\_20}, doi = {10.1007/3-540-44499-8\_20}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/ches/ClavierCD00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/CoronG00, author = {Jean{-}S{\'{e}}bastien Coron and Louis Goubin}, title = {On Boolean and Arithmetic Masking against Differential Power Analysis}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2000, Second International Workshop, Worcester, MA, USA, August 17-18, 2000, Proceedings}, pages = {231--237}, year = {2000}, crossref = {DBLP:conf/ches/2000}, url = {https://doi.org/10.1007/3-540-44499-8\_18}, doi = {10.1007/3-540-44499-8\_18}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/CoronG00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/Coron99, author = {Jean{-}S{\'{e}}bastien Coron}, title = {Resistance against Differential Power Analysis for Elliptic Curve Cryptosystems}, booktitle = {Cryptographic Hardware and Embedded Systems, First International Workshop, CHES'99, Worcester, MA, USA, August 12-13, 1999, Proceedings}, pages = {292--302}, year = {1999}, crossref = {DBLP:conf/ches/1999}, url = {https://doi.org/10.1007/3-540-48059-5\_25}, doi = {10.1007/3-540-48059-5\_25}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/ches/Coron99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/GoubinP99, author = {Louis Goubin and Jacques Patarin}, title = {{DES} and Differential Power Analysis (The "Duplication" Method)}, booktitle = {Cryptographic Hardware and Embedded Systems, First International Workshop, CHES'99, Worcester, MA, USA, August 12-13, 1999, Proceedings}, pages = {158--172}, year = {1999}, crossref = {DBLP:conf/ches/1999}, url = {https://doi.org/10.1007/3-540-48059-5\_15}, doi = {10.1007/3-540-48059-5\_15}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/GoubinP99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/KocherJJ99, author = {Paul C. Kocher and Joshua Jaffe and Benjamin Jun}, title = {Differential Power Analysis}, booktitle = {Advances in Cryptology - {CRYPTO} '99, 19th Annual International Cryptology Conference, Santa Barbara, California, USA, August 15-19, 1999, Proceedings}, pages = {388--397}, year = {1999}, crossref = {DBLP:conf/crypto/1999}, url = {https://doi.org/10.1007/3-540-48405-1\_25}, doi = {10.1007/3-540-48405-1\_25}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/KocherJJ99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/iscas/2021, title = {{IEEE} International Symposium on Circuits and Systems, {ISCAS} 2021, Daegu, South Korea, May 22-28, 2021}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/ISCAS51556.2021}, doi = {10.1109/ISCAS51556.2021}, isbn = {978-1-7281-9201-7}, timestamp = {Wed, 17 Aug 2022 12:15:27 +0200}, biburl = {https://dblp.org/rec/conf/iscas/2021.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/pqcrypto/2021, editor = {Jung Hee Cheon and Jean{-}Pierre Tillich}, title = {Post-Quantum Cryptography - 12th International Workshop, PQCrypto 2021, Daejeon, South Korea, July 20-22, 2021, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12841}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-81293-5}, doi = {10.1007/978-3-030-81293-5}, isbn = {978-3-030-81292-8}, timestamp = {Wed, 17 Aug 2022 12:15:27 +0200}, biburl = {https://dblp.org/rec/conf/pqcrypto/2021.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/icete/2020-2, editor = {Pierangela Samarati and Sabrina De Capitani di Vimercati and Mohammad S. Obaidat and Jalel Ben{-}Othman}, title = {Proceedings of the 17th International Joint Conference on e-Business and Telecommunications, {ICETE} 2020 - Volume 2: SECRYPT, Lieusaint, Paris, France, July 8-10, 2020}, publisher = {ScitePress}, year = {2020}, isbn = {978-989-758-446-6}, timestamp = {Wed, 17 Aug 2022 12:15:27 +0200}, biburl = {https://dblp.org/rec/conf/icete/2020-2.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/gcce/2019, title = {{IEEE} 8th Global Conference on Consumer Electronics, {GCCE} 2019, Osaka, Japan, October 15-18, 2019}, publisher = {{IEEE}}, year = {2019}, url = {https://ieeexplore.ieee.org/xpl/conhome/8977397/proceeding}, isbn = {978-1-7281-3575-5}, timestamp = {Wed, 17 Aug 2022 12:15:27 +0200}, biburl = {https://dblp.org/rec/conf/gcce/2019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/iscas/2019, title = {{IEEE} International Symposium on Circuits and Systems, {ISCAS} 2019, Sapporo, Japan, May 26-29, 2019}, publisher = {{IEEE}}, year = {2019}, url = {https://ieeexplore.ieee.org/xpl/conhome/8682239/proceeding}, isbn = {978-1-7281-0397-6}, timestamp = {Wed, 17 Aug 2022 12:15:27 +0200}, biburl = {https://dblp.org/rec/conf/iscas/2019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/itw/2019, title = {2019 {IEEE} Information Theory Workshop, {ITW} 2019, Visby, Sweden, August 25-28, 2019}, publisher = {{IEEE}}, year = {2019}, url = {https://ieeexplore.ieee.org/xpl/conhome/8968650/proceeding}, isbn = {978-1-5386-6900-6}, timestamp = {Wed, 17 Aug 2022 12:15:27 +0200}, biburl = {https://dblp.org/rec/conf/itw/2019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/cosade/2018, editor = {Junfeng Fan and Benedikt Gierlichs}, title = {Constructive Side-Channel Analysis and Secure Design - 9th International Workshop, {COSADE} 2018, Singapore, April 23-24, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10815}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-89641-0}, doi = {10.1007/978-3-319-89641-0}, isbn = {978-3-319-89640-3}, timestamp = {Wed, 17 Aug 2022 12:15:27 +0200}, biburl = {https://dblp.org/rec/conf/cosade/2018.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/host/2018, title = {2018 {IEEE} International Symposium on Hardware Oriented Security and Trust, {HOST} 2018, Washington, DC, USA, April 30 - May 4, 2018}, publisher = {{IEEE} Computer Society}, year = {2018}, url = {https://ieeexplore.ieee.org/xpl/conhome/8369415/proceeding}, isbn = {978-1-5386-4731-8}, timestamp = {Wed, 17 Aug 2022 12:15:27 +0200}, biburl = {https://dblp.org/rec/conf/host/2018.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/iccsp/2018, title = {Proceedings of the 2nd International Conference on Cryptography, Security and Privacy, {ICCSP} 2018, Guiyang, China, March 16-19, 2018}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3199478}, doi = {10.1145/3199478}, timestamp = {Wed, 17 Aug 2022 12:15:27 +0200}, biburl = {https://dblp.org/rec/conf/iccsp/2018.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/icecsys/2018, title = {25th {IEEE} International Conference on Electronics, Circuits and Systems, {ICECS} 2018, Bordeaux, France, December 9-12, 2018}, publisher = {{IEEE}}, year = {2018}, url = {https://ieeexplore.ieee.org/xpl/conhome/8599658/proceeding}, isbn = {978-1-5386-9562-3}, timestamp = {Wed, 17 Aug 2022 12:15:27 +0200}, biburl = {https://dblp.org/rec/conf/icecsys/2018.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/meco/2018, title = {7th Mediterranean Conference on Embedded Computing, {MECO} 2018, Budva, Montenegro, June 10-14, 2018}, publisher = {{IEEE}}, year = {2018}, url = {https://ieeexplore.ieee.org/xpl/conhome/8399137/proceeding}, isbn = {978-1-5386-5683-9}, timestamp = {Wed, 17 Aug 2022 12:15:27 +0200}, biburl = {https://dblp.org/rec/conf/meco/2018.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/trustcom/2018, title = {17th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 12th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}, publisher = {{IEEE}}, year = {2018}, url = {https://ieeexplore.ieee.org/xpl/conhome/8454845/proceeding}, isbn = {978-1-5386-4388-4}, timestamp = {Wed, 17 Aug 2022 12:15:27 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/2018.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/vlsi/2018soc, title = {{IFIP/IEEE} International Conference on Very Large Scale Integration, VLSI-SoC 2018, Verona, Italy, October 8-10, 2018}, publisher = {{IEEE}}, year = {2018}, url = {https://ieeexplore.ieee.org/xpl/conhome/8642560/proceeding}, isbn = {978-1-5386-4756-1}, timestamp = {Wed, 17 Aug 2022 12:15:27 +0200}, biburl = {https://dblp.org/rec/conf/vlsi/2018soc.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ctrsa/2017, editor = {Helena Handschuh}, title = {Topics in Cryptology - {CT-RSA} 2017 - The Cryptographers' Track at the {RSA} Conference 2017, San Francisco, CA, USA, February 14-17, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10159}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-52153-4}, doi = {10.1007/978-3-319-52153-4}, isbn = {978-3-319-52152-7}, timestamp = {Wed, 17 Aug 2022 12:15:27 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/2017.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/fpt/2017, title = {International Conference on Field Programmable Technology, {FPT} 2017, Melbourne, Australia, December 11-13, 2017}, publisher = {{IEEE}}, year = {2017}, url = {https://ieeexplore.ieee.org/xpl/conhome/8269417/proceeding}, isbn = {978-1-5386-2656-6}, timestamp = {Wed, 17 Aug 2022 12:15:27 +0200}, biburl = {https://dblp.org/rec/conf/fpt/2017.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/isgteurope/2017, title = {2017 {IEEE} {PES} Innovative Smart Grid Technologies Conference Europe, ISGT-Europe 2017, Torino, Italy, September 26-29, 2017}, publisher = {{IEEE}}, year = {2017}, url = {https://ieeexplore.ieee.org/xpl/conhome/8246021/proceeding}, isbn = {978-1-5386-1953-7}, timestamp = {Wed, 17 Aug 2022 12:15:27 +0200}, biburl = {https://dblp.org/rec/conf/isgteurope/2017.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/meco/2017, title = {6th Mediterranean Conference on Embedded Computing, {MECO} 2017, Bar, Montenegro, June 11-15, 2017}, publisher = {{IEEE}}, year = {2017}, url = {https://ieeexplore.ieee.org/xpl/conhome/7970251/proceeding}, isbn = {978-1-5090-6742-8}, timestamp = {Wed, 17 Aug 2022 12:15:27 +0200}, biburl = {https://dblp.org/rec/conf/meco/2017.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/IEEEssd/2016, title = {13th International Multi-Conference on Systems, Signals {\&} Devices, {SSD} 2016, Leipzig, Germany, March 21-24, 2016}, publisher = {{IEEE}}, year = {2016}, url = {https://ieeexplore.ieee.org/xpl/conhome/7465653/proceeding}, isbn = {978-1-5090-1291-6}, timestamp = {Wed, 17 Aug 2022 12:15:27 +0200}, biburl = {https://dblp.org/rec/conf/IEEEssd/2016.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/aspdac/2016, title = {21st Asia and South Pacific Design Automation Conference, {ASP-DAC} 2016, Macao, Macao, January 25-28, 2016}, publisher = {{IEEE}}, year = {2016}, url = {https://ieeexplore.ieee.org/xpl/conhome/7422345/proceeding}, isbn = {978-1-4673-9569-4}, timestamp = {Wed, 17 Aug 2022 12:15:27 +0200}, biburl = {https://dblp.org/rec/conf/aspdac/2016.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/cans/2016, editor = {Sara Foresti and Giuseppe Persiano}, title = {Cryptology and Network Security - 15th International Conference, {CANS} 2016, Milan, Italy, November 14-16, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10052}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-48965-0}, doi = {10.1007/978-3-319-48965-0}, isbn = {978-3-319-48964-3}, timestamp = {Wed, 17 Aug 2022 12:15:27 +0200}, biburl = {https://dblp.org/rec/conf/cans/2016.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/isicir/2016, title = {International Symposium on Integrated Circuits, {ISIC} 2016, Singapore, December 12-14, 2016}, publisher = {{IEEE}}, year = {2016}, url = {https://ieeexplore.ieee.org/xpl/conhome/7822827/proceeding}, isbn = {978-1-4673-9019-4}, timestamp = {Wed, 17 Aug 2022 12:15:27 +0200}, biburl = {https://dblp.org/rec/conf/isicir/2016.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/meco/2016, title = {5th Mediterranean Conference on Embedded Computing, {MECO} 2016, Bar, Montenegro, June 12-16, 2016}, publisher = {{IEEE}}, year = {2016}, url = {https://ieeexplore.ieee.org/xpl/conhome/7513174/proceeding}, isbn = {978-1-5090-2222-9}, timestamp = {Wed, 17 Aug 2022 12:15:27 +0200}, biburl = {https://dblp.org/rec/conf/meco/2016.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/acns/2015, editor = {Tal Malkin and Vladimir Kolesnikov and Allison Bishop Lewko and Michalis Polychronakis}, title = {Applied Cryptography and Network Security - 13th International Conference, {ACNS} 2015, New York, NY, USA, June 2-5, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9092}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-28166-7}, doi = {10.1007/978-3-319-28166-7}, isbn = {978-3-319-28165-0}, timestamp = {Wed, 17 Aug 2022 12:15:27 +0200}, biburl = {https://dblp.org/rec/conf/acns/2015.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/cdc/2015, title = {54th {IEEE} Conference on Decision and Control, {CDC} 2015, Osaka, Japan, December 15-18, 2015}, publisher = {{IEEE}}, year = {2015}, url = {https://ieeexplore.ieee.org/xpl/conhome/7396016/proceeding}, isbn = {978-1-4799-7886-1}, timestamp = {Wed, 17 Aug 2022 12:15:27 +0200}, biburl = {https://dblp.org/rec/conf/cdc/2015.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/cis/2015, title = {11th International Conference on Computational Intelligence and Security, {CIS} 2015, Shenzhen, China, December 19-20, 2015}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://ieeexplore.ieee.org/xpl/conhome/7395504/proceeding}, isbn = {978-1-4673-8660-9}, timestamp = {Wed, 17 Aug 2022 12:15:27 +0200}, biburl = {https://dblp.org/rec/conf/cis/2015.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/esorics/2015-1, editor = {G{\"{u}}nther Pernul and Peter Y. A. Ryan and Edgar R. Weippl}, title = {Computer Security - {ESORICS} 2015 - 20th European Symposium on Research in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9326}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-24174-6}, doi = {10.1007/978-3-319-24174-6}, isbn = {978-3-319-24173-9}, timestamp = {Wed, 17 Aug 2022 12:15:27 +0200}, biburl = {https://dblp.org/rec/conf/esorics/2015-1.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/isqed/2015, title = {Sixteenth International Symposium on Quality Electronic Design, {ISQED} 2015, Santa Clara, CA, USA, March 2-4, 2015}, publisher = {{IEEE}}, year = {2015}, url = {https://ieeexplore.ieee.org/xpl/conhome/7080985/proceeding}, isbn = {978-1-4799-7581-5}, timestamp = {Wed, 17 Aug 2022 12:15:27 +0200}, biburl = {https://dblp.org/rec/conf/isqed/2015.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/milcom/2015, editor = {Qinqing Zhang and Jerry Brand and Thomas G. MacDonald and Bharat T. Doshi and Bonnie L. Gorsic}, title = {34th {IEEE} Military Communications Conference, {MILCOM} 2015, Tampa, FL, USA, October 26-28, 2015}, publisher = {{IEEE}}, year = {2015}, url = {https://ieeexplore.ieee.org/xpl/conhome/7347040/proceeding}, isbn = {978-1-5090-0073-9}, timestamp = {Wed, 17 Aug 2022 12:15:27 +0200}, biburl = {https://dblp.org/rec/conf/milcom/2015.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/cases/2014wess, editor = {Ting Yu and Shengqi Yang}, title = {Proceedings of the 9th Workshop on Embedded Systems Security, {WESS} '14, New Delhi, India, October 17, 2014}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2668322}, doi = {10.1145/2668322}, isbn = {978-1-4503-2932-3}, timestamp = {Wed, 17 Aug 2022 12:15:27 +0200}, biburl = {https://dblp.org/rec/conf/cases/2014wess.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/cosade/2014, editor = {Emmanuel Prouff}, title = {Constructive Side-Channel Analysis and Secure Design - 5th International Workshop, {COSADE} 2014, Paris, France, April 13-15, 2014. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8622}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-10175-0}, doi = {10.1007/978-3-319-10175-0}, isbn = {978-3-319-10174-3}, timestamp = {Wed, 17 Aug 2022 12:15:27 +0200}, biburl = {https://dblp.org/rec/conf/cosade/2014.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/icete/2014s, editor = {Mohammad S. Obaidat and Andreas Holzinger and Joaquim Filipe}, title = {E-Business and Telecommunications - 11th International Joint Conference, {ICETE} 2014, Vienna, Austria, August 28-30, 2014, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {554}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-25915-4}, doi = {10.1007/978-3-319-25915-4}, isbn = {978-3-319-25914-7}, timestamp = {Wed, 17 Aug 2022 12:15:27 +0200}, biburl = {https://dblp.org/rec/conf/icete/2014s.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/indocrypt/2014, editor = {Willi Meier and Debdeep Mukhopadhyay}, title = {Progress in Cryptology - {INDOCRYPT} 2014 - 15th International Conference on Cryptology in India, New Delhi, India, December 14-17, 2014, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8885}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-13039-2}, doi = {10.1007/978-3-319-13039-2}, isbn = {978-3-319-13038-5}, timestamp = {Wed, 17 Aug 2022 12:15:27 +0200}, biburl = {https://dblp.org/rec/conf/indocrypt/2014.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/iscas/2014, title = {{IEEE} International Symposium on Circuits and Systemss, {ISCAS} 2014, Melbourne, Victoria, Australia, June 1-5, 2014}, publisher = {{IEEE}}, year = {2014}, url = {https://ieeexplore.ieee.org/xpl/conhome/6852006/proceeding}, isbn = {978-1-4799-3431-7}, timestamp = {Wed, 17 Aug 2022 12:15:27 +0200}, biburl = {https://dblp.org/rec/conf/iscas/2014.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/isvlsi/2014, title = {{IEEE} Computer Society Annual Symposium on VLSI, {ISVLSI} 2014, Tampa, FL, USA, July 9-11, 2014}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://ieeexplore.ieee.org/xpl/conhome/6901614/proceeding}, isbn = {978-1-4799-3763-9}, timestamp = {Wed, 17 Aug 2022 12:15:27 +0200}, biburl = {https://dblp.org/rec/conf/isvlsi/2014.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/space/2014, editor = {Rajat Subhra Chakraborty and Vashek Matyas and Patrick Schaumont}, title = {Security, Privacy, and Applied Cryptography Engineering - 4th International Conference, {SPACE} 2014, Pune, India, October 18-22, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8804}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-12060-7}, doi = {10.1007/978-3-319-12060-7}, isbn = {978-3-319-12059-1}, timestamp = {Wed, 17 Aug 2022 12:15:27 +0200}, biburl = {https://dblp.org/rec/conf/space/2014.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/dsd/2013, title = {2013 Euromicro Conference on Digital System Design, {DSD} 2013, Los Alamitos, CA, USA, September 4-6, 2013}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://ieeexplore.ieee.org/xpl/conhome/6627885/proceeding}, isbn = {978-1-4799-2978-8}, timestamp = {Wed, 17 Aug 2022 12:15:27 +0200}, biburl = {https://dblp.org/rec/conf/dsd/2013.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/isorc/2013, title = {16th {IEEE} International Symposium on Object/Component/Service-Oriented Real-Time Distributed Computing, {ISORC} 2013, Paderborn, Germany, June 19-21, 2013}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://ieeexplore.ieee.org/xpl/conhome/6906723/proceeding}, isbn = {978-1-4799-2111-9}, timestamp = {Wed, 17 Aug 2022 12:15:27 +0200}, biburl = {https://dblp.org/rec/conf/isorc/2013.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/iwsec/2013, editor = {Kazuo Sakiyama and Masayuki Terada}, title = {Advances in Information and Computer Security - 8th International Workshop on Security, {IWSEC} 2013, Okinawa, Japan, November 18-20, 2013, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8231}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-41383-4}, doi = {10.1007/978-3-642-41383-4}, isbn = {978-3-642-41382-7}, timestamp = {Wed, 17 Aug 2022 12:15:27 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/2013.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/secrypt/2013, editor = {Pierangela Samarati}, title = {{SECRYPT} 2013 - Proceedings of the 10th International Conference on Security and Cryptography, Reykjav{\'{\i}}k, Iceland, 29-31 July, 2013}, publisher = {SciTePress}, year = {2013}, isbn = {978-989-8565-73-0}, timestamp = {Wed, 17 Aug 2022 12:15:27 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/2013.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/tsp/2013, title = {36th International Conference on Telecommunications and Signal Processing, {TSP} 2013, Rome, Italy, 2-4 July, 2013}, publisher = {{IEEE}}, year = {2013}, url = {https://ieeexplore.ieee.org/xpl/conhome/6597267/proceeding}, isbn = {978-1-4799-0402-0}, timestamp = {Wed, 17 Aug 2022 12:15:27 +0200}, biburl = {https://dblp.org/rec/conf/tsp/2013.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/isvlsi/2012, title = {{IEEE} Computer Society Annual Symposium on VLSI, {ISVLSI} 2012, Amherst, MA, USA, August 19-21, 2012}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://ieeexplore.ieee.org/xpl/conhome/6296433/proceeding}, isbn = {978-1-4673-2234-8}, timestamp = {Wed, 17 Aug 2022 12:15:27 +0200}, biburl = {https://dblp.org/rec/conf/isvlsi/2012.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/milcom/2012, title = {31st {IEEE} Military Communications Conference, {MILCOM} 2012, Orlando, FL, USA, October 29 - November 1, 2012}, publisher = {{IEEE}}, year = {2012}, url = {https://ieeexplore.ieee.org/xpl/conhome/6383191/proceeding}, isbn = {978-1-4673-1729-0}, timestamp = {Wed, 17 Aug 2022 12:15:27 +0200}, biburl = {https://dblp.org/rec/conf/milcom/2012.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/cardis/2011, editor = {Emmanuel Prouff}, title = {Smart Card Research and Advanced Applications - 10th {IFIP} {WG} 8.8/11.2 International Conference, {CARDIS} 2011, Leuven, Belgium, September 14-16, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7079}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-27257-8}, doi = {10.1007/978-3-642-27257-8}, isbn = {978-3-642-27256-1}, timestamp = {Wed, 17 Aug 2022 12:15:27 +0200}, biburl = {https://dblp.org/rec/conf/cardis/2011.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/csiirw/2011, editor = {Frederick T. Sheldon and Robert K. Abercrombie and Axel W. Krings}, title = {Proceedings of the 7th Cyber Security and Information Intelligence Research Workshop, {CSIIRW} 2011, Oak Ridge, TN, USA, October 12-14, 2011}, publisher = {{ACM}}, year = {2011}, url = {http://dl.acm.org/citation.cfm?id=2179298}, isbn = {978-1-4503-0945-5}, timestamp = {Wed, 17 Aug 2022 12:15:27 +0200}, biburl = {https://dblp.org/rec/conf/csiirw/2011.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ctrsa/2011, editor = {Aggelos Kiayias}, title = {Topics in Cryptology - {CT-RSA} 2011 - The Cryptographers' Track at the {RSA} Conference 2011, San Francisco, CA, USA, February 14-18, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6558}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-19074-2}, doi = {10.1007/978-3-642-19074-2}, isbn = {978-3-642-19073-5}, timestamp = {Wed, 17 Aug 2022 12:15:27 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/2011.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ddecs/2011, editor = {Rolf Kraemer and Adam Pawlak and Andreas Steininger and Mario Sch{\"{o}}lzel and Jaan Raik and Heinrich Theodor Vierhaus}, title = {14th {IEEE} International Symposium on Design and Diagnostics of Electronic Circuits {\&} Systems, {DDECS} 2011, Cottbus, Germany, April 13-15, 2011}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://ieeexplore.ieee.org/xpl/conhome/5771301/proceeding}, isbn = {978-1-4244-9755-3}, timestamp = {Wed, 17 Aug 2022 12:15:27 +0200}, biburl = {https://dblp.org/rec/conf/ddecs/2011.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/host/2011, title = {{HOST} 2011, Proceedings of the 2011 {IEEE} International Symposium on Hardware-Oriented Security and Trust (HOST), 5-6 June 2011, San Diego, California, {USA}}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://ieeexplore.ieee.org/xpl/conhome/5946040/proceeding}, isbn = {978-1-4577-1059-9}, timestamp = {Wed, 17 Aug 2022 12:15:27 +0200}, biburl = {https://dblp.org/rec/conf/host/2011.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ichit/2011-2, editor = {Geuk Lee and Daniel Howard and Dominik Slezak}, title = {Convergence and Hybrid Information Technology - 5th International Conference, {ICHIT} 2011, Daejeon, Korea, September 22-24, 2011. Proceedings}, series = {Communications in Computer and Information Science}, volume = {206}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-24106-2}, doi = {10.1007/978-3-642-24106-2}, isbn = {978-3-642-24105-5}, timestamp = {Wed, 17 Aug 2022 12:15:27 +0200}, biburl = {https://dblp.org/rec/conf/ichit/2011-2.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ispacs/2011, title = {International Symposium on Intelligent Signal Processing and Communications Systems, {ISPACS} 2011, Chiang Mai, Thailand, December 7-9, 2011}, publisher = {{IEEE}}, year = {2011}, url = {https://ieeexplore.ieee.org/xpl/conhome/6138394/proceeding}, isbn = {978-1-4577-2165-6}, timestamp = {Wed, 17 Aug 2022 12:15:27 +0200}, biburl = {https://dblp.org/rec/conf/ispacs/2011.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/itng/2011, editor = {Shahram Latifi}, title = {Eighth International Conference on Information Technology: New Generations, {ITNG} 2011, Las Vegas, Nevada, USA, 11-13 April 2011}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://ieeexplore.ieee.org/xpl/conhome/5945012/proceeding}, isbn = {978-0-7695-4367-3}, timestamp = {Wed, 17 Aug 2022 12:15:27 +0200}, biburl = {https://dblp.org/rec/conf/itng/2011.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/worldcis/2011, title = {2011 World Congress on Internet Security, WorldCIS 2011, London, UK, February 21-23, 2011}, publisher = {{IEEE}}, year = {2011}, url = {https://ieeexplore.ieee.org/xpl/conhome/5743110/proceeding}, isbn = {978-1-4244-8879-7}, timestamp = {Wed, 17 Aug 2022 12:15:27 +0200}, biburl = {https://dblp.org/rec/conf/worldcis/2011.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:reference/crypt/2011, editor = {Henk C. A. van Tilborg and Sushil Jajodia}, title = {Encyclopedia of Cryptography and Security, 2nd Ed}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-1-4419-5906-5}, doi = {10.1007/978-1-4419-5906-5}, isbn = {978-1-4419-5905-8}, timestamp = {Wed, 17 Aug 2022 12:15:27 +0200}, biburl = {https://dblp.org/rec/reference/crypt/2011.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/IEEEias/2010, title = {Sixth International Conference on Information Assurance and Security, {IAS} 2010, Atlanta, GA, USA, August 23-25, 2010}, publisher = {{IEEE}}, year = {2010}, url = {https://ieeexplore.ieee.org/xpl/conhome/5594714/proceeding}, isbn = {978-1-4244-7407-3}, timestamp = {Wed, 17 Aug 2022 12:15:27 +0200}, biburl = {https://dblp.org/rec/conf/IEEEias/2010.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/acns/2010, editor = {Jianying Zhou and Moti Yung}, title = {Applied Cryptography and Network Security, 8th International Conference, {ACNS} 2010, Beijing, China, June 22-25, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6123}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13708-2}, doi = {10.1007/978-3-642-13708-2}, isbn = {978-3-642-13707-5}, timestamp = {Wed, 17 Aug 2022 12:15:27 +0200}, biburl = {https://dblp.org/rec/conf/acns/2010.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/apccas/2010, title = {{IEEE} Asia Pacific Conference on Circuits and Systems, {APCCAS} 2010, Kuala Lumpur, Malaysia, December 6-9, 2010}, publisher = {{IEEE}}, year = {2010}, url = {https://ieeexplore.ieee.org/xpl/conhome/5767825/proceeding}, isbn = {978-1-4244-7454-7}, timestamp = {Wed, 17 Aug 2022 12:15:27 +0200}, biburl = {https://dblp.org/rec/conf/apccas/2010.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/date/2010, editor = {Giovanni De Micheli and Bashir M. Al{-}Hashimi and Wolfgang M{\"{u}}ller and Enrico Macii}, title = {Design, Automation and Test in Europe, {DATE} 2010, Dresden, Germany, March 8-12, 2010}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://ieeexplore.ieee.org/xpl/conhome/5450668/proceeding}, isbn = {978-1-4244-7054-9}, timestamp = {Wed, 17 Aug 2022 12:15:27 +0200}, biburl = {https://dblp.org/rec/conf/date/2010.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/delta/2010, title = {Fifth {IEEE} International Symposium on Electronic Design, Test {\&} Applications, {DELTA} 2010, Ho Chi Minh City, Vietnam, January 13-15, 2010}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://ieeexplore.ieee.org/xpl/conhome/5438527/proceeding}, isbn = {978-0-7695-3978-2}, timestamp = {Wed, 17 Aug 2022 12:15:27 +0200}, biburl = {https://dblp.org/rec/conf/delta/2010.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/isvlsi/2010, title = {{IEEE} Computer Society Annual Symposium on VLSI, {ISVLSI} 2010, 5-7 July 2010, Lixouri Kefalonia, Greece}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://ieeexplore.ieee.org/xpl/conhome/5570021/proceeding}, isbn = {978-0-7695-4076-4}, timestamp = {Wed, 17 Aug 2022 12:15:27 +0200}, biburl = {https://dblp.org/rec/conf/isvlsi/2010.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:books/sp/platzner10, editor = {Marco Platzner and J{\"{u}}rgen Teich and Norbert Wehn}, title = {Dynamically Reconfigurable Systems - Architectures, Design Methods and Applications}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-90-481-3485-4}, doi = {10.1007/978-90-481-3485-4}, isbn = {978-9-04-813484-7}, timestamp = {Wed, 17 Aug 2022 12:15:27 +0200}, biburl = {https://dblp.org/rec/books/sp/platzner10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ecctd/2009, title = {19th European Conference on Circuit Theory and Design, {ECCTD} 2009, Antalya, Turkey, August 23-27, 2009}, publisher = {{IEEE}}, year = {2009}, url = {https://ieeexplore.ieee.org/servlet/opac?punumber=5247537}, isbn = {978-1-4244-3896-9}, timestamp = {Wed, 17 Aug 2022 12:15:27 +0200}, biburl = {https://dblp.org/rec/conf/ecctd/2009.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/iscid/2009, editor = {Yongchuan Tang and Jonathan Lawry}, title = {2009 Second International Symposium on Computational Intelligence and Design, {ISCID} 2009, Changsha, Hunan, China, 12-14 December 2009, 2 Volumes}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://ieeexplore.ieee.org/xpl/conhome/5367995/proceeding}, isbn = {978-0-7695-3865-5}, timestamp = {Wed, 17 Aug 2022 12:15:27 +0200}, biburl = {https://dblp.org/rec/conf/iscid/2009.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/delta/2008, title = {4th {IEEE} International Symposium on Electronic Design, Test and Applications, {DELTA} 2008, Hong Kong, January 23-25, 2008}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://ieeexplore.ieee.org/xpl/conhome/4459488/proceeding}, isbn = {978-0-7695-3110-6}, timestamp = {Wed, 17 Aug 2022 12:15:27 +0200}, biburl = {https://dblp.org/rec/conf/delta/2008.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/eit/2008, title = {2008 {IEEE} International Conference on Electro/Information Technology, {EIT} 2008, held at Iowa State University, Ames, Iowa, USA, May 18-20, 2008}, publisher = {{IEEE}}, year = {2008}, isbn = {978-1-4244-2030-8}, timestamp = {Wed, 17 Aug 2022 12:15:27 +0200}, biburl = {https://dblp.org/rec/conf/eit/2008.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/icecsys/2008, title = {15th {IEEE} International Conference on Electronics, Circuits and Systems, {ICECS} 2008, St. Julien's, Malta, August 31 2008-September 3, 2008}, publisher = {{IEEE}}, year = {2008}, url = {https://ieeexplore.ieee.org/xpl/conhome/4664823/proceeding}, isbn = {978-1-4244-2181-7}, timestamp = {Wed, 17 Aug 2022 12:15:27 +0200}, biburl = {https://dblp.org/rec/conf/icecsys/2008.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/iscas/2008, title = {International Symposium on Circuits and Systems {(ISCAS} 2008), 18-21 May 2008, Sheraton Seattle Hotel, Seattle, Washington, {USA}}, publisher = {{IEEE}}, year = {2008}, url = {https://ieeexplore.ieee.org/xpl/conhome/4534149/proceeding}, isbn = {978-1-4244-1683-7}, timestamp = {Wed, 17 Aug 2022 12:15:27 +0200}, biburl = {https://dblp.org/rec/conf/iscas/2008.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/sbcci/2008, editor = {Marcelo Lubaszewski and Michel Renovell and Rajesh K. Gupta}, title = {Proceedings of the 21st Annual Symposium on Integrated Circuits and Systems Design, {SBCCI} 2008, Gramado, Brazil, September 1-4, 2008}, publisher = {{ACM}}, year = {2008}, isbn = {978-1-60558-231-3}, timestamp = {Wed, 17 Aug 2022 12:15:27 +0200}, biburl = {https://dblp.org/rec/conf/sbcci/2008.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/synasc/2008, editor = {Viorel Negru and Tudor Jebelean and Dana Petcu and Daniela Zaharie}, title = {{SYNASC} 2008, 10th International Symposium on Symbolic and Numeric Algorithms for Scientific Computing, Timisoara, Romania, 26-29 September 2008}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://ieeexplore.ieee.org/xpl/conhome/5204773/proceeding}, isbn = {978-0-7695-3523-4}, timestamp = {Wed, 17 Aug 2022 12:15:27 +0200}, biburl = {https://dblp.org/rec/conf/synasc/2008.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ctrsa/2007, editor = {Masayuki Abe}, title = {Topics in Cryptology - {CT-RSA} 2007, The Cryptographers' Track at the {RSA} Conference 2007, San Francisco, CA, USA, February 5-9, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4377}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11967668}, doi = {10.1007/11967668}, isbn = {3-540-69327-0}, timestamp = {Wed, 17 Aug 2022 12:15:27 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/2007.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/indocrypt/2007, editor = {K. Srinathan and C. Pandu Rangan and Moti Yung}, title = {Progress in Cryptology - {INDOCRYPT} 2007, 8th International Conference on Cryptology in India, Chennai, India, December 9-13, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4859}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-77026-8}, doi = {10.1007/978-3-540-77026-8}, isbn = {978-3-540-77025-1}, timestamp = {Wed, 17 Aug 2022 12:15:27 +0200}, biburl = {https://dblp.org/rec/conf/indocrypt/2007.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/iscas/2007, title = {International Symposium on Circuits and Systems {(ISCAS} 2007), 27-20 May 2007, New Orleans, Louisiana, {USA}}, publisher = {{IEEE}}, year = {2007}, url = {https://ieeexplore.ieee.org/xpl/conhome/4252534/proceeding}, isbn = {1-4244-0920-9}, timestamp = {Wed, 17 Aug 2022 12:15:27 +0200}, biburl = {https://dblp.org/rec/conf/iscas/2007.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/vlsid/2007, title = {20th International Conference on {VLSI} Design {(VLSI} Design 2007), Sixth International Conference on Embedded Systems {(ICES} 2007), 6-10 January 2007, Bangalore, India}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://ieeexplore.ieee.org/xpl/conhome/4091978/proceeding}, isbn = {0-7695-2762-0}, timestamp = {Wed, 17 Aug 2022 12:15:27 +0200}, biburl = {https://dblp.org/rec/conf/vlsid/2007.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/wisa/2007, editor = {Sehun Kim and Moti Yung and Hyung{-}Woo Lee}, title = {Information Security Applications, 8th International Workshop, {WISA} 2007, Jeju Island, Korea, August 27-29, 2007, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4867}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-77535-5}, doi = {10.1007/978-3-540-77535-5}, isbn = {978-3-540-77534-8}, timestamp = {Wed, 17 Aug 2022 12:15:27 +0200}, biburl = {https://dblp.org/rec/conf/wisa/2007.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/cardis/2006, editor = {Josep Domingo{-}Ferrer and Joachim Posegga and Daniel Schreckling}, title = {Smart Card Research and Advanced Applications, 7th {IFIP} {WG} 8.8/11.2 International Conference, {CARDIS} 2006, Tarragona, Spain, April 19-21, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3928}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11733447}, doi = {10.1007/11733447}, isbn = {3-540-33311-8}, timestamp = {Wed, 17 Aug 2022 12:15:27 +0200}, biburl = {https://dblp.org/rec/conf/cardis/2006.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/cis/2006, editor = {Yuping Wang and Yiu{-}ming Cheung and Hai{-}Lin Liu}, title = {Computational Intelligence and Security, International Conference, {CIS} 2006, Guangzhou, China, November 3-6, 2006, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4456}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-74377-4}, doi = {10.1007/978-3-540-74377-4}, isbn = {978-3-540-74376-7}, timestamp = {Wed, 17 Aug 2022 12:15:27 +0200}, biburl = {https://dblp.org/rec/conf/cis/2006.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/iscas/2006, title = {International Symposium on Circuits and Systems {(ISCAS} 2006), 21-24 May 2006, Island of Kos, Greece}, publisher = {{IEEE}}, year = {2006}, url = {https://ieeexplore.ieee.org/xpl/conhome/11145/proceeding}, isbn = {0-7803-9389-9}, timestamp = {Wed, 17 Aug 2022 12:15:27 +0200}, biburl = {https://dblp.org/rec/conf/iscas/2006.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/patmos/2006, editor = {Johan Vounckx and Nadine Az{\'{e}}mard and Philippe Maurine}, title = {Integrated Circuit and System Design. Power and Timing Modeling, Optimization and Simulation, 16th International Workshop, {PATMOS} 2006, Montpellier, France, September 13-15, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4148}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11847083}, doi = {10.1007/11847083}, isbn = {3-540-39094-4}, timestamp = {Wed, 17 Aug 2022 12:15:27 +0200}, biburl = {https://dblp.org/rec/conf/patmos/2006.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/acisp/2005, editor = {Colin Boyd and Juan Manuel Gonz{\'{a}}lez Nieto}, title = {Information Security and Privacy, 10th Australasian Conference, {ACISP} 2005, Brisbane, Australia, July 4-6, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3574}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/b137750}, doi = {10.1007/b137750}, isbn = {3-540-26547-3}, timestamp = {Wed, 17 Aug 2022 12:15:27 +0200}, biburl = {https://dblp.org/rec/conf/acisp/2005.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ches/2005, editor = {Josyula R. Rao and Berk Sunar}, title = {Cryptographic Hardware and Embedded Systems - {CHES} 2005, 7th International Workshop, Edinburgh, UK, August 29 - September 1, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3659}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11545262}, doi = {10.1007/11545262}, isbn = {3-540-28474-5}, timestamp = {Wed, 17 Aug 2022 12:15:27 +0200}, biburl = {https://dblp.org/rec/conf/ches/2005.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/hpcc/2005, editor = {Laurence Tianruo Yang and Omer F. Rana and Beniamino Di Martino and Jack J. Dongarra}, title = {High Performance Computing and Communications, First International Conference, {HPCC} 2005, Sorrento, Italy, September 21-23, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3726}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11557654}, doi = {10.1007/11557654}, isbn = {3-540-29031-1}, timestamp = {Wed, 17 Aug 2022 12:15:27 +0200}, biburl = {https://dblp.org/rec/conf/hpcc/2005.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/iscas/2005, title = {International Symposium on Circuits and Systems {(ISCAS} 2005), 23-26 May 2005, Kobe, Japan}, publisher = {{IEEE}}, year = {2005}, url = {https://ieeexplore.ieee.org/xpl/conhome/9898/proceeding}, isbn = {0-7803-8834-8}, timestamp = {Wed, 17 Aug 2022 12:15:27 +0200}, biburl = {https://dblp.org/rec/conf/iscas/2005.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:reference/crypt/2005, editor = {Henk C. A. van Tilborg}, title = {Encyclopedia of Cryptography and Security}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/0-387-23483-7}, doi = {10.1007/0-387-23483-7}, isbn = {978-0-387-23473-1}, timestamp = {Wed, 17 Aug 2022 12:15:27 +0200}, biburl = {https://dblp.org/rec/reference/crypt/2005.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/cardis/2004, editor = {Jean{-}Jacques Quisquater and Pierre Paradinas and Yves Deswarte and Anas Abou El Kalam}, title = {Smart Card Research and Advanced Applications VI, {IFIP} 18th World Computer Congress, {TC8/WG8.8} {\&} {TC11/WG11.2} Sixth International Conference on Smart Card Research and Advanced Applications (CARDIS), 22-27 August 2004, Toulouse, France}, series = {{IFIP}}, volume = {153}, publisher = {Kluwer/Springer}, year = {2004}, isbn = {1-4020-8146-4}, timestamp = {Wed, 17 Aug 2022 12:15:27 +0200}, biburl = {https://dblp.org/rec/conf/cardis/2004.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ches/2003, editor = {Colin D. Walter and {\c{C}}etin Kaya Ko{\c{c}} and Christof Paar}, title = {Cryptographic Hardware and Embedded Systems - {CHES} 2003, 5th International Workshop, Cologne, Germany, September 8-10, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2779}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-45238-6}, doi = {10.1007/978-3-540-45238-6}, isbn = {3-540-40833-9}, timestamp = {Wed, 17 Aug 2022 12:15:27 +0200}, biburl = {https://dblp.org/rec/conf/ches/2003.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/csreaSAM/2003-1, editor = {Hamid R. Arabnia and Youngsong Mun}, title = {Proceedings of the International Conference on Security and Management, {SAM} '03, June 23 - 26, 2003, Las Vegas, Nevada, USA, Volume 1}, publisher = {{CSREA} Press}, year = {2003}, isbn = {1-932415-16-5}, timestamp = {Wed, 17 Aug 2022 12:15:27 +0200}, biburl = {https://dblp.org/rec/conf/csreaSAM/2003-1.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/dac/2003, title = {Proceedings of the 40th Design Automation Conference, {DAC} 2003, Anaheim, CA, USA, June 2-6, 2003}, publisher = {{ACM}}, year = {2003}, url = {http://dl.acm.org/citation.cfm?id=775832}, isbn = {1-58113-688-9}, timestamp = {Wed, 17 Aug 2022 12:15:27 +0200}, biburl = {https://dblp.org/rec/conf/dac/2003.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/fse/2003, editor = {Thomas Johansson}, title = {Fast Software Encryption, 10th International Workshop, {FSE} 2003, Lund, Sweden, February 24-26, 2003, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2887}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/b93938}, doi = {10.1007/b93938}, isbn = {3-540-20449-0}, timestamp = {Wed, 17 Aug 2022 12:15:27 +0200}, biburl = {https://dblp.org/rec/conf/fse/2003.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/wisa/2003, editor = {Kijoon Chae and Moti Yung}, title = {Information Security Applications, 4th International Workshop, {WISA} 2003, Jeju Island, Korea, August 25-27, 2003, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2908}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/b95188}, doi = {10.1007/b95188}, isbn = {3-540-20827-5}, timestamp = {Wed, 17 Aug 2022 12:15:27 +0200}, biburl = {https://dblp.org/rec/conf/wisa/2003.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ches/2002, editor = {Burton S. Kaliski Jr. and {\c{C}}etin Kaya Ko{\c{c}} and Christof Paar}, title = {Cryptographic Hardware and Embedded Systems - {CHES} 2002, 4th International Workshop, Redwood Shores, CA, USA, August 13-15, 2002, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2523}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/3-540-36400-5}, doi = {10.1007/3-540-36400-5}, isbn = {3-540-00409-2}, timestamp = {Wed, 17 Aug 2022 12:15:27 +0200}, biburl = {https://dblp.org/rec/conf/ches/2002.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/icisc/2002, editor = {Pil Joong Lee and Chae Hoon Lim}, title = {Information Security and Cryptology - {ICISC} 2002, 5th International Conference Seoul, Korea, November 28-29, 2002, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2587}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/3-540-36552-4}, doi = {10.1007/3-540-36552-4}, isbn = {3-540-00716-4}, timestamp = {Wed, 17 Aug 2022 12:15:27 +0200}, biburl = {https://dblp.org/rec/conf/icisc/2002.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/iscas/2001, title = {Proceedings of the 2001 International Symposium on Circuits and Systems, {ISCAS} 2001, Sydney, Australia, May 6-9, 2001}, publisher = {{IEEE}}, year = {2001}, url = {https://ieeexplore.ieee.org/xpl/conhome/7344/proceeding}, isbn = {0-7803-6685-9}, timestamp = {Wed, 17 Aug 2022 12:15:27 +0200}, biburl = {https://dblp.org/rec/conf/iscas/2001.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ches/2000, editor = {{\c{C}}etin Kaya Ko{\c{c}} and Christof Paar}, title = {Cryptographic Hardware and Embedded Systems - {CHES} 2000, Second International Workshop, Worcester, MA, USA, August 17-18, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1965}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-44499-8}, doi = {10.1007/3-540-44499-8}, isbn = {3-540-41455-X}, timestamp = {Wed, 17 Aug 2022 12:15:27 +0200}, biburl = {https://dblp.org/rec/conf/ches/2000.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ches/1999, editor = {{\c{C}}etin Kaya Ko{\c{c}} and Christof Paar}, title = {Cryptographic Hardware and Embedded Systems, First International Workshop, CHES'99, Worcester, MA, USA, August 12-13, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1717}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-48059-5}, doi = {10.1007/3-540-48059-5}, isbn = {3-540-66646-X}, timestamp = {Wed, 17 Aug 2022 12:15:27 +0200}, biburl = {https://dblp.org/rec/conf/ches/1999.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/crypto/1999, editor = {Michael J. Wiener}, title = {Advances in Cryptology - {CRYPTO} '99, 19th Annual International Cryptology Conference, Santa Barbara, California, USA, August 15-19, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1666}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-48405-1}, doi = {10.1007/3-540-48405-1}, isbn = {3-540-66347-9}, timestamp = {Wed, 17 Aug 2022 12:15:27 +0200}, biburl = {https://dblp.org/rec/conf/crypto/1999.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.