Revealing AES Encryption Device Key on 328P Microcontrollers with Differential Power Analysis
暂无分享,去创建一个
Arwin Datumaya Wahyudi Sumari | Adang Suwandi Ahmad | Yusuf Kurniawan | Sarwono Sutikno | Septafiansyah Dwi Putra
[1] Louis Goubin,et al. DES and Differential Power Analysis (The "Duplication" Method) , 1999, CHES.
[2] Aciek Ida Wuryandari,et al. Brain-Inspired Knowledge-Growing System: Towards a True Cognitive Agent , 2012 .
[3] Nidhi Goel,et al. FPGA implementation of an 8-bit AES architecture: A rolled and masked S-Box approach , 2015, 2015 Annual IEEE India Conference (INDICON).
[4] Adang Suwandi Ahmad,et al. NAIDS design using ChiMIC-KGS , 2017, 2017 International Symposium on Electronics and Smart Devices (ISESD).
[5] Roberto Gorrieri,et al. Foundations of Security Analysis and Design III, FOSAD 2004/2005 Tutorial Lectures , 2005, FOSAD.
[6] Trio Adiono,et al. Cognitive artificial intelligence (CAI) software based on knowledge growing system (KGS) for diagnosing heart block and arrythmia , 2017, 2017 6th International Conference on Electrical Engineering and Informatics (ICEEI).
[7] Arwin Datumaya Wahyudi Sumari,et al. The implementation of A3S information fusion algorithm for interpreting Dissolved Gas Analysis (DGA) based on Doernenburg Ratio , 2017, 2017 International Symposium on Electronics and Smart Devices (ISESD).
[8] Adang Suwandi Ahmad,et al. Cognitive artificial intelligence method for measuring transformer performance , 2016, 2016 Future Technologies Conference (FTC).
[9] Yu Chen,et al. A Survey on the Application of FPGAs for Network Infrastructure Security , 2011, IEEE Communications Surveys & Tutorials.
[10] Richard Mengko,et al. Direction of ventricle contraction based on precordial lead ECG signal , 2016, 2016 4th International Conference on Cyber and IT Service Management.
[11] Seddik Bri,et al. High throughput FPGA Implementation of Data Encryption Standard with time variable sub-keys , 2016 .
[12] P. Kalpana,et al. Power analysis attack on 8051 microcontrollers , 2014, 2014 IEEE International Conference on Computational Intelligence and Computing Research.
[13] Adang Suwandi Ahmad,et al. Security analysis of BC3 algorithm for differential power analysis attack , 2017, 2017 International Symposium on Electronics and Smart Devices (ISESD).
[14] Massoud Masoumi,et al. Novel Approach to Protect Advanced Encryption Standard Algorithm Implementation Against Differential Electromagnetic and Power Analysis , 2015, IEEE Transactions on Information Forensics and Security.
[15] Adang Suwandi Ahmad,et al. Design of an AES Device as Device Under Test in a DPA Attack , 2018, Int. J. Netw. Secur..
[16] E. LESTER SMITH,et al. AND OTHERS , 2005 .
[17] S. Venkateswarlu,et al. An Overview of Acoustic Side-Channel Attack , 2013 .
[18] Adang Suwandi Ahmad,et al. DPA-countermeasure with knowledge growing system , 2016, 2016 International Symposium on Electronics and Smart Devices (ISESD).
[19] Paul C. Kocher,et al. Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems , 1996, CRYPTO.
[20] S. Venkateswarlu,et al. Security against Timing Analysis Attack , 2015 .
[21] Trio Adiono,et al. Implementation Knowledge Growing System Algorithm using VHDL , 2016, 2016 International Symposium on Electronics and Smart Devices (ISESD).
[22] Srivaths Ravi,et al. Security as a new dimension in embedded system design , 2004, Proceedings. 41st Design Automation Conference, 2004..
[23] Adang Suwandi Ahmad,et al. Power analysis attack on implementation of DES , 2016, 2016 International Conference on Information Technology Systems and Innovation (ICITSI).
[24] Eli Biham,et al. Differential cryptanalysis of DES-like cryptosystems , 1990, Journal of Cryptology.
[25] A. Arivazhagan,et al. RTL Modelling for the Cipher Blcok Chaining Mode (Cbc) for Data Security , 2017 .
[26] François-Xavier Standaert,et al. A Tutorial on Physical Security and Side-Channel Attacks , 2004, FOSAD.
[27] Ingrid Verbauwhede,et al. Empirical comparison of side channel analysis distinguishers on DES in hardware , 2009, 2009 European Conference on Circuit Theory and Design.
[28] Christophe Clavier,et al. Correlation Power Analysis with a Leakage Model , 2004, CHES.
[29] Sylvain Guilley,et al. SoCs security: a war against side-channels , 2004, Ann. des Télécommunications.
[30] Adang Suwandi Ahmad,et al. Attacking AES-Masking Encryption Device with Correlation Power Analysis , 2018, Int. J. Commun. Networks Inf. Secur..
[31] Sylvain Guilley,et al. Common framework to evaluate modern embedded systems against side-channel attacks , 2011, 2011 IEEE International Conference on Technologies for Homeland Security (HST).
[32] Fengqi Yu,et al. Enhanced Correlation Power Analysis Attack on Smart Card , 2008, 2008 The 9th International Conference for Young Computer Scientists.
[33] Siva Sai Yerubandi,et al. Differential Power Analysis , 2002 .