Cryptology ePrint Archive: Report 2014/854
Available versions in chronological order
20141022:163819 (posted 22-Oct-2014 16:38:19 UTC)
Power Analysis Attack on Hardware Implementation of MAC-Keccak on FPGAs
Pei Luo, Yunsi Fei, Xin Fang, A. Adam Ding, Miriam Leeser, and David R. Kaeli
Original publication (in the same form): 2014 International Conference on ReConFigurable Computing and FPGAs (ReConFig)
20141030:193326 (posted 30-Oct-2014 19:33:26 UTC)
Power Analysis Attack on Hardware Implementation of MAC-Keccak on FPGAs
Pei Luo, Yunsi Fei, Xin Fang, A. Adam Ding, Miriam Leeser, and David R. Kaeli
Original publication (in the same form): 2014 International Conference on ReConFigurable Computing and FPGAs (ReConFig)
20141030:193506 (posted 30-Oct-2014 19:35:06 UTC)
Power Analysis Attack on Hardware Implementation of MAC-Keccak on FPGAs
Pei Luo, Yunsi Fei, Xin Fang, A. Adam Ding, Miriam Leeser, and David R. Kaeli
Original publication (in the same form): 2014 International Conference on ReConFigurable Computing and FPGAs (ReConFig)
20141030:195701 (posted 30-Oct-2014 19:57:01 UTC)
Power Analysis Attack on Hardware Implementation of MAC-Keccak on FPGAs
Pei Luo, Yunsi Fei, Xin Fang, A. Adam Ding, Miriam Leeser, and David R. Kaeli
Original publication (in the same form): 2014 International Conference on ReConFigurable Computing and FPGAs (ReConFig)
20141030:204134 (posted 30-Oct-2014 20:41:34 UTC)
Power Analysis Attack on Hardware Implementation of MAC-Keccak on FPGAs
Pei Luo, Yunsi Fei, Xin Fang, A. Adam Ding, Miriam Leeser, and David R. Kaeli
Original publication (in the same form): 2014 International Conference on ReConFigurable Computing and FPGAs (ReConFig)
[
Cryptology ePrint archive
]