22.01.2015 Views

AES Guest Lecturer

AES Guest Lecturer

AES Guest Lecturer

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

References<br />

Security and Attacking <strong>AES</strong><br />

Power-analysis attack on an ASIC <strong>AES</strong> implementation<br />

Ors, S.B.; Gurkaynak, F.; Oswald, E.; Preneel, B.;Information Technology:<br />

Coding and Computing, 2004. Proceedings. ITCC 2004. International<br />

Conference onVolume 2, 2004 Page(s):546 - 552 Vol.2<br />

Algebraic attacks on cipher systems<br />

Penzhorn, W.T.;<br />

AFRICON, 2004. 7th AFRICON Conference in Africa<br />

Volume 2, 2004 Page(s):969 - 974 Vol.2<br />

Cache-Timing attacks on <strong>AES</strong> Daniel J Bernstein<br />

Preliminary version of report to National Science Foundation, grant CCR-<br />

9983950

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!