Information Theoretic Evaluation of Side-Channel Resistant Logic Styles
暂无分享,去创建一个
[1] Eric Peeters,et al. Template Attacks in Principal Subspaces , 2006, CHES.
[2] Ingrid Verbauwhede,et al. A logic level design methodology for a secure DPA resistant ASIC or FPGA implementation , 2004, Proceedings Design, Automation and Test in Europe Conference and Exhibition.
[3] P ? ? ? ? ? ? ? % ? ? ? ? , 1991 .
[4] Siva Sai Yerubandi,et al. Differential Power Analysis , 2002 .
[5] Ingrid Verbauwhede,et al. Design method for constant power consumption of differential logic circuits , 2005, Design, Automation and Test in Europe.
[6] John B. Shoven,et al. I , Edinburgh Medical and Surgical Journal.
[7] Sylvain Guilley,et al. The backend duplication method : A leakage-proof place-and-route strategy for ASICs , 2005 .
[8] Daisuke Suzuki,et al. Security Evaluation of DPA Countermeasures Using Dual-Rail Pre-charge Logic Style , 2006, CHES.
[9] Ingrid Verbauwhede,et al. Simulation models for side-channel information leaks , 2005, Proceedings. 42nd Design Automation Conference, 2005..
[10] George S. Taylor,et al. Security Evaluation of Asynchronous Circuits , 2003, CHES.
[11] M. Yung,et al. A Formal Practice-Oriented Model for the Analysis of Side-Channel Attacks , 2006 .
[12] Jean-Didier Legat,et al. A Dynamic Current Mode Logic to Counteract Power Analysis Attacks , 2004 .
[13] Eric Peeters,et al. Towards Security Limits in Side-Channel Attacks , 2006, CHES.
[14] M. I. Elmasry,et al. Dynamic current mode logic (DyCML): a new low-power high-performance logic style , 2001, IEEE J. Solid State Circuits.
[15] T. Eisenbarth. Theoretical Models for Side-Channel Attacks , 2008 .
[16] Stefan Mangard,et al. Masked Dual-Rail Pre-charge Logic: DPA-Resistance Without Routing Constraints , 2005, CHES.
[18] Moti Yung,et al. A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks (extended version) , 2009, IACR Cryptol. ePrint Arch..
[19] Wieland Fischer,et al. Masking at Gate Level in the Presence of Glitches , 2005, CHES.
[20] Dakshi Agrawal,et al. The EM Side-Channel(s) , 2002, CHES.
[21] Denis Flandre,et al. Low-swing current mode logic (LSCML): A new logic style for secure and robust smart cards against power analysis attacks , 2006, Microelectron. J..
[22] Pankaj Rohatgi,et al. Template Attacks , 2002, CHES.
[23] Stefan Mangard,et al. Side-Channel Leakage of Masked CMOS Gates , 2005, CT-RSA.
[24] Paul C. Kocher,et al. Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems , 1996, CRYPTO.
[25] Ingrid Verbauwhede,et al. Place and Route for Secure Standard Cell Design , 2004, CARDIS.
[26] Simon W. Moore,et al. Security evaluation against electromagnetic analysis at design time , 2005, Tenth IEEE International High-Level Design Validation and Test Workshop, 2005..
[27] Sylvain Guilley,et al. The "Backend Duplication" Method , 2005, CHES.
[28] Eric Peeters,et al. Towards security limits in side-channel attacks (with an application to block ciphers) , 2006 .