Electromagnetic Side-Channel Analysis for Hardware and Software Watermarking
暂无分享,去创建一个
[1] Mark Mohammad Tehranipoor,et al. Detecting malicious inclusions in secure hardware: Challenges and solutions , 2008, 2008 IEEE International Workshop on Hardware-Oriented Security and Trust.
[2] Paul C. Kocher,et al. Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems , 1996, CRYPTO.
[3] P. Maurine,et al. Evaluation of countermeasures against electromagnetic analysis , 2009, 2009 International Symposium on Electromagnetic Compatibility - EMC Europe.
[4] Wim van Eck,et al. Electromagnetic radiation from video display units: An eavesdropping risk? , 1985, Comput. Secur..
[5] Tim Güneysu,et al. Trojan Side-Channels: Lightweight Hardware Trojans through Side-Channel Engineering , 2009, CHES.
[6] Andrey Bogdanov,et al. PRESENT: An Ultra-Lightweight Block Cipher , 2007, CHES.
[7] William Zhu,et al. Algorithms to Watermark Software Through Register Allocation , 2005, DRMTICS.
[8] I. Markov,et al. Designing Chips that Protect Themselves , 2010 .
[9] Peng Zhang,et al. The Power of Electromagnetic Analysis on Embedded Cryptographic Ics , 2008, 2008 International Conference on Embedded Software and Systems Symposia.
[10] Jean-Jacques Quisquater,et al. ElectroMagnetic Analysis (EMA): Measures and Counter-Measures for Smart Cards , 2001, E-smart.
[11] Yiorgos Makris,et al. Hardware Trojan detection using path delay fingerprint , 2008, 2008 IEEE International Workshop on Hardware-Oriented Security and Trust.
[12] Mark Mohammad Tehranipoor,et al. Trustworthy Hardware: Identifying and Classifying Hardware Trojans , 2010, Computer.
[13] Christof Paar,et al. Side-Channel based Watermarks for IP Protection , 2010 .
[14] Christof Paar,et al. Side-channel based watermarks for integrated circuits , 2010, 2010 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST).
[15] Francis Olivier,et al. Electromagnetic Analysis: Concrete Results , 2001, CHES.
[16] Michael Stepp,et al. More on graph theoretic software watermarks: Implementation, analysis, and attacks , 2009, Inf. Softw. Technol..
[17] Hervé Chabanne,et al. Electromagnetic Side Channels of an FPGA Implementation of AES , 2004, IACR Cryptol. ePrint Arch..
[18] Sebastian Danicic,et al. An Evaluation of Static Java Bytecode Watermarking , 2010 .
[19] B. Preneel,et al. Differential Electromagnetic Attack on an FPGA Implementation of Elliptic Curve Cryptosystems , 2006, 2006 World Automation Congress.
[20] Christof Paar,et al. Security on FPGAs: State-of-the-art implementations and attacks , 2004, TECS.
[21] Wayne P. Burleson,et al. Implementing hardware Trojans: Experiences from a hardware Trojan challenge , 2011, 2011 IEEE 29th International Conference on Computer Design (ICCD).
[22] Dakshi Agrawal,et al. Multi-channel Attacks , 2003, CHES.
[23] Christof Paar,et al. Physical Cryptanalysis of KeeLoq Code Hopping Applications , 2008, IACR Cryptol. ePrint Arch..
[24] Ken Eguro,et al. FPGA side-channel receivers , 2011, FPGA '11.
[25] Siva Sai Yerubandi,et al. Differential Power Analysis , 2002 .
[26] C. D. Walter,et al. Distinguishing Exponent Digits by Observing Modular Subtractions , 2001, CT-RSA.
[27] Miodrag Potkonjak,et al. Intellectual Property Metering , 2001, Information Hiding.
[28] Pankaj Rohatgi,et al. Template Attacks , 2002, CHES.
[29] Christof Paar,et al. Side-channel watermarks for embedded software , 2011, 2011 IEEE 9th International New Circuits and systems conference.