Power analysis attacks: Revealing the secrets of smart cards S Mangard, E Oswald, T Popp Springer-Verlag New York Inc, 2007 | 2988 | 2007 |
Successfully attacking masked AES hardware implementations S Mangard, N Pramstaller, E Oswald International workshop on cryptographic hardware and embedded systems, 157-171, 2005 | 494 | 2005 |
An ASIC implementation of the AES SBoxes J Wolkerstorfer, E Oswald, M Lamberger Topics in Cryptology—CT-RSA 2002: The Cryptographers’ Track at the RSA …, 2002 | 487 | 2002 |
A side-channel analysis resistant description of the AES S-box E Oswald, S Mangard, N Pramstaller, V Rijmen Fast Software Encryption: 12th International Workshop, FSE 2005, Paris …, 2005 | 440 | 2005 |
An AES smart card implementation resistant to power analysis attacks C Herbst, E Oswald, S Mangard International conference on applied cryptography and network security, 239-252, 2006 | 393 | 2006 |
Power-analysis attack on an ASIC AES implementation SB Ors, F Gurkaynak, E Oswald, B Preneel International Conference on Information Technology: Coding and Computing …, 2004 | 341 | 2004 |
Practical template attacks C Rechberger, E Oswald International Workshop on Information Security Applications, 440-456, 2004 | 290 | 2004 |
One for all–all for one: unifying standard differential power analysis attacks S Mangard, E Oswald, FX Standaert IET Information Security 5 (2), 100-110, 2011 | 272 | 2011 |
Practical second-order DPA attacks for masked smart card implementations of block ciphers E Oswald, S Mangard, C Herbst, S Tillich Cryptographers’ Track at the RSA Conference, 192-207, 2006 | 252 | 2006 |
Power-analysis attacks on an FPGA–first experimental results SB Örs, E Oswald, B Preneel Cryptographic Hardware and Embedded Systems-CHES 2003: 5th International …, 2003 | 236 | 2003 |
The world is not enough: Another look on second-order DPA FX Standaert, N Veyrat-Charvillon, E Oswald, B Gierlichs, M Medwed, ... Advances in Cryptology-ASIACRYPT 2010: 16th International Conference on the …, 2010 | 215 | 2010 |
Template attacks on masking—resistance is futile E Oswald, S Mangard Cryptographers’ Track at the RSA Conference, 243-256, 2007 | 189 | 2007 |
Randomized addition-subtraction chains as a countermeasure against power attacks E Oswald, M Aigner Cryptographic Hardware and Embedded Systems—CHES 2001: Third International …, 2001 | 189 | 2001 |
Update on SHA-1 V Rijmen, E Oswald Topics in Cryptology–CT-RSA 2005: The Cryptographers’ Track at the RSA …, 2005 | 177 | 2005 |
Leakage resilient cryptography in practice FX Standaert, O Pereira, Y Yu, JJ Quisquater, M Yung, E Oswald Towards Hardware-Intrinsic Security: Foundations and Practice, 99-134, 2010 | 144 | 2010 |
Power analysis attacks and countermeasures T Popp, S Mangard, E Oswald IEEE Design & test of Computers 24 (6), 535-543, 2007 | 132 | 2007 |
An efficient masking scheme for AES software implementations E Oswald, K Schramm International Workshop on Information Security Applications, 292-305, 2005 | 130 | 2005 |
Template attacks on ECDSA M Medwed, E Oswald International Workshop on Information Security Applications, 14-27, 2008 | 113 | 2008 |
Towards Practical Tools for Side Channel Aware Software Engineering:'Grey Box'Modelling for Instruction Leakages D McCann, E Oswald, C Whitnall 26th USENIX security symposium (USENIX Security 17), 199-216, 2017 | 110* | 2017 |
Does My Device Leak Information? An a priori Statistical Power Analysis of Leakage Detection Tests L Mather, E Oswald, J Bandenburg, M Wójcik Advances in Cryptology-ASIACRYPT 2013: 19th International Conference on the …, 2013 | 108 | 2013 |