EP2031792B1
(en )
2013-01-09
Secure modular exponentiation with leak minimization for smartcards and other cryptosystems
EP1088295B1
(en )
2007-08-15
Balanced cryptographic computational method and apparatus for leak minimization in smartcards and other cryptosystems
EP1090480B1
(en )
2019-01-09
Improved des and other cryptographic processes with leak minimization for smartcards and other cryptosystems
US20040025032A1
(en )
2004-02-05
Method and system for resistance to statiscal power analysis
JP4671571B2
(ja )
2011-04-20
秘密情報の処理装置および秘密情報の処理プログラムを格納するメモリ
US20060090081A1
(en )
2006-04-27
Device and method with reduced information leakage
RU2579990C2
(ru )
2016-04-10
Защита от пассивного сниффинга
US7123717B1
(en )
2006-10-17
Countermeasure method in an electronic component which uses an RSA-type public key cryptographic algorithm
US20240187206A1
(en )
2024-06-06
Method and system for protecting cryptographic operations against side-channel attacks
Seo et al.
2019
SCA-resistant GCM implementation on 8-Bit AVR microcontrollers
US7174016B2
(en )
2007-02-06
Modular exponentiation algorithm in an electronic component using a public key encryption algorithm
EP4372548A1
(en )
2024-05-22
Protecting cryptographic operations againt horizontal side-channel analysis attacks
HK1129005B
(zh )
2013-09-27
用於智能咭和其他密碼系統的具有最小泄漏的安全模塊化求幂
EP1802024B1
(en )
2012-03-07
Balanced cryptographic computational method and apparatus for leak minimization in smartcards and other cryptosystems
Li et al.
2019
Power Analysis Attacks against QUAD.
EP1933496A2
(en )
2008-06-18
Improved DES and other cryptographic processes with leak minimization for smartcards and other cryptosystems
JP2008224830A
(ja )
2008-09-25
耐タンパーベキ乗演算方法
CA2398441A1
(en )
2001-08-23
Method and apparatus for balanced electronic operations
Hardware
0
Hardware Attacks on Cryptographic Devices
CA2397077A1
(en )
2001-08-23
Encoding method and system resistant to power analysis
HK1116961A
(zh )
2009-01-02
用於智能卡和其它密碼系統的具有泄漏最小化的改進型des及其它加密處理
AU2002348963A1
(en )
2003-05-26
Device and method with reduced information leakage