Improved algebraic side-channel attack on AES
暂无分享,去创建一个
Stanislav Bulygin | Annelie Heuser | Michael Zohner | Johannes A. Buchmann | Michael Walter | Mohamed Saied Emam Mohamed
[1] Annelie Heuser,et al. Intelligent Machine Homicide - Breaking Cryptographic Devices Using Support Vector Machines , 2012, COSADE.
[2] François-Xavier Standaert,et al. Algebraic Side-Channel Attacks on the AES: Why Time also Matters in DPA , 2009, CHES.
[3] Aviezri S. Fraenkel,et al. Complexity of problems in games, graphs and algebraic equations , 1979, Discret. Appl. Math..
[4] Michael Brickenstein,et al. PolyBoRi: A framework for Gröbner-basis computations with Boolean polynomials , 2009, J. Symb. Comput..
[5] Gregory V. Bard,et al. Algebraic Cryptanalysis , 2009 .
[6] Avishai Wool,et al. Algebraic Side-Channel Analysis in the Presence of Errors , 2010, CHES.
[7] Tao Wang,et al. MDASCA: An Enhanced Algebraic Side-Channel Attack for Error Tolerance and New Leakage Model Exploitation , 2012, COSADE.
[8] François-Xavier Standaert,et al. Fresh Re-keying: Security against Side-Channel and Fault Attacks for Low-Cost Devices , 2010, AFRICACRYPT.
[9] Donald W. Loveland,et al. A machine program for theorem-proving , 2011, CACM.
[10] Matthew J. B. Robshaw,et al. Algebraic aspects of the advanced encryption standard , 2006 .
[11] Stefan Mangard,et al. Power analysis attacks - revealing the secrets of smart cards , 2007 .
[12] Avishai Wool,et al. Tolerant Algebraic Side-Channel Analysis of AES , 2012, IACR Cryptol. ePrint Arch..
[13] Sylvain Guilley,et al. Template Attacks with a Power Model , 2007, IACR Cryptol. ePrint Arch..
[14] Berk Sunar,et al. Cryptographic Hardware and Embedded Systems - CHES 2005, 7th International Workshop, Edinburgh, UK, August 29 - September 1, 2005, Proceedings , 2005, CHES.
[15] Avishai Wool,et al. Algebraic Side-Channel Attacks Beyond the Hamming Weight Leakage Model , 2012, CHES.
[16] Mate Soos,et al. Grain of Salt --- an Automated Way to Test Stream Ciphers through SAT Solvers , 2010 .
[17] Claude Carlet,et al. Analysis of the algebraic side channel attack , 2012, Journal of Cryptographic Engineering.
[18] Hilary Putnam,et al. A Computing Procedure for Quantification Theory , 1960, JACM.
[19] Gregory V. Bard,et al. Algebraic, AIDA/Cube and Side Channel Analysis of KATAN Family of Block Ciphers , 2010, INDOCRYPT.
[20] François-Xavier Standaert,et al. Algebraic Side-Channel Attacks , 2009, Inscrypt.
[21] Toby Walsh,et al. Handbook of satisfiability , 2009 .
[22] M. Karnaugh. The map method for synthesis of combinational logic circuits , 1953, Transactions of the American Institute of Electrical Engineers, Part I: Communication and Electronics.
[23] Pankaj Rohatgi,et al. Template Attacks , 2002, CHES.
[24] Stanislav Bulygin,et al. Algebraic Cryptanalysis of the Round-Reduced and Side Channel Analysis of the Full PRINTCipher-48 , 2011, CANS.