[图书][B] Wireless security and cryptography: specifications and implementations

N Sklavos, M Manninger, X Zhang, O Koufopavlou… - 2017 - taylorfrancis.com
As the use of wireless devices becomes widespread, so does the need for strong and
secure transport protocols. Even with this intensified need for securing systems, using …

Cryptographic computation using masking to prevent differential power analysis and other attacks

PC Kocher, JM Jaffe, BC Jun - US Patent 7,668,310, 2010 - Google Patents
Methods and apparatuses are disclosed for improving DES and other cryptographic
protocols against external monitor ing attacks by reducing the amount (and signal-to-noise …

Differential power analysis method and apparatus

PC Kocher, JM Jaffe, BC Jun - US Patent 7,587,044, 2009 - Google Patents
OTHER PUBLICATIONS (65) Prior Publication Data Back, Adam,“Non-Interactive Forward
Secrecy” Sep. 6, 1996. US 20O2/O124178 A1 Sep. 5, 2002(Continued) Related US …

Prevention of side channel attacks against block cipher implementations and other cryptographic systems

PC Kocher, JM Jaffe, BC Jun - US Patent 7,787,620, 2010 - Google Patents
Methods and apparatuses are disclosed for improving DES and other cryptographic
protocols against external monitoring attacks by reducing the amount (and signal-to-noise …

Leak-resistant cryptographic payment smartcard

PC Kocher, JM Jaffe - US Patent 7,506,165, 2009 - Google Patents
6,049,613 A 4/2000 Jakobsson.................... 380/47 WO WO97/13342 4f1997 6,064,724. A
5/2000 Kelly......... 370.92. 04 WO WO97, 14085 4f1997 6,064,740 A 5/2000 Curiger et …

Payment smart cards with hierarchical session key derivation providing security against differential power analysis and other attacks

PC Kocher - US Patent 7,941,666, 2011 - Google Patents
3. A 53. Elam et al. 5,552,776 A 9/1996 Wade et al. 4214, 126 A T. 1980 WE 5,557,346 A
9/1996 Lipner et al. 4,225.962 A 9, 1980 ME 1 5,559.887 A 9, 1996 Davis et al. 4,243,890 A …

Differential power analysis

PC Kocher, JM Jaffe, BC Jun - US Patent 7,634,083, 2009 - Google Patents
Abstract Information leaked from smart cards and other tamper resistant cryptographic
devices can be statistically analyzed to determine keys or other secret data. A data collection …

Differential power analysis—resistant cryptographic processing

PC Kocher, JM Jaffe, BC Jun - US Patent 8,879,724, 2014 - Google Patents
(74) Attorney, Agent, or Firm—Finnegan, Henderson, Farabow, Garrett & Dunner, LLP (57)
ABSTRACT Information leaked from Smart cards and other tamper resis tant cryptographic …

A tool for static detection of timing channels in Java

A Lux, A Starostin - Journal of Cryptographic Engineering, 2011 - Springer
A timing attack exploits the variance in the running time of a crypto-algorithm's
implementation in order to infer confidential information. Such a dependence between …

Side-channel analysis attacks on hardware implementations of cryptographic algorithms

SB Örs, B Preneel, I Verbauwhede - Wireless security and …, 2007 - books.google.com
Traditionally, the main task of cryptographic hardware is the acceleration of operations
frequently used in cryptosystems or the acceleration of a complete cryptographic algorithm …