Techniques of Side Channel Cryptanalysis
暂无分享,去创建一个
[1] Peter K. Pearson,et al. IPA: A New Class of Power Attacks , 1999, CHES.
[2] Thomas S. Messerges,et al. Securing the AES Finalists Against Power Analysis Attacks , 2000, FSE.
[3] 中嶋 純子,et al. Cryptographic Hardware and Embedded Systems (CHES'99)国際会議参加報告 , 1999 .
[4] Suresh Chari,et al. A Cautionary Note Regarding Evaluation of AES Candidates on Smart-Cards , 1999 .
[5] Alfred Menezes,et al. Handbook of Applied Cryptography , 2018 .
[6] Richard J. Lipton,et al. On the Importance of Checking Cryptographic Protocols for Faults (Extended Abstract) , 1997, EUROCRYPT.
[7] Adi Shamir,et al. Protecting Smart Cards from Passive Power Analysis with Detached Power Supplies , 2000, CHES.
[8] Pankaj Rohatgi,et al. Towards Sound Approaches to Counteract Power-Analysis Attacks , 1999, CRYPTO.
[9] Trevor York,et al. Book Review: Principles of CMOS VLSI Design: A Systems Perspective , 1986 .
[10] M. Kuhn,et al. The Advanced Computing Systems Association Design Principles for Tamper-resistant Smartcard Processors Design Principles for Tamper-resistant Smartcard Processors , 2022 .
[11] M. F.,et al. Bibliography , 1985, Experimental Gerontology.
[12] Howard M. Heys,et al. A Timing Attack on RC5 , 1998, Selected Areas in Cryptography.
[13] William M. Daley,et al. Security Requirements for Cryptographic Modules , 1999 .
[14] Louis Goubin,et al. DES and Differential Power Analysis (The "Duplication" Method) , 1999, CHES.
[15] Thomas S. Messerges,et al. Using Second-Order Power Analysis to Attack DPA Resistant Software , 2000, CHES.
[16] Peter Wright,et al. Spy Catcher : The Candid Autobiography of a Senior Intelligence Officer , 1987 .
[17] Dan Boneh,et al. TWENTY YEARS OF ATTACKS ON THE RSA CRYPTOSYSTEM , 1999 .
[18] Bernd Meyer,et al. Differential Fault Attacks on Elliptic Curve Cryptosystems , 2000, CRYPTO.
[19] Eli Biham,et al. Differential Fault Analysis of Secret Key Cryptosystems , 1997, CRYPTO.
[20] Mitsuru Matsui,et al. The First Experimental Cryptanalysis of the Data Encryption Standard , 1994, CRYPTO.
[21] Mihir Bellare,et al. The Exact Security of Digital Signatures - HOw to Sign with RSA and Rabin , 1996, EUROCRYPT.
[22] Gunnar Blom,et al. Probability and Statistics: Theory and Applications , 1990 .
[23] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[24] Markus G. Kuhn,et al. Tamper resistance: a cautionary note , 1996 .
[25] Douglas R. Stinson,et al. Cryptography: Theory and Practice , 1995 .
[26] Tim Collins,et al. Secure contactless smartcard ASIC with DPA protection , 2000, Proceedings of the IEEE 2000 Custom Integrated Circuits Conference (Cat. No.00CH37044).
[27] V. Barnett,et al. Probability and Statistics: Theory and Applications. , 1978 .
[28] Eli Biham,et al. Differential Cryptanalysis of the Data Encryption Standard , 1993, Springer New York.
[29] Ralph Howard,et al. Data encryption standard , 1987 .
[30] Paul C. Kocher,et al. Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems , 1996, CRYPTO.
[31] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[32] Christophe Clavier,et al. Differential Power Analysis in the Presence of Hardware Countermeasures , 2000, CHES.
[33] Bruce Schneier,et al. Side Channel Cryptanalysis of Product Ciphers , 1998, J. Comput. Secur..
[34] Paul Dischamp,et al. Power Analysis, What Is Now Possible , 2000, ASIACRYPT.
[35] Siva Sai Yerubandi,et al. Differential Power Analysis , 2002 .
[36] Jean-Jacques Quisquater,et al. A Practical Implementation of the Timing Attack , 1998, CARDIS.
[37] David Chaum,et al. Blind Signatures for Untraceable Payments , 1982, CRYPTO.
[38] Werner Schindler,et al. A Timing Attack against RSA with the Chinese Remainder Theorem , 2000, CHES.
[39] Rita Mayer-Sommer,et al. Smartly Analyzing the Simplicity and the Power of Simple Power Analysis on Smartcards , 2000, CHES.
[40] Thomas S. Messerges,et al. Investigations of Power Analysis Attacks on Smartcards , 1999, Smartcard.
[41] Jean-Sébastien Coron,et al. On Boolean and Arithmetic Masking against Differential Power Analysis , 2000, CHES.
[42] Jacques Stern,et al. Probing Attacks on Tamper-Resistant Devices , 1999, CHES.
[43] Marcos A. Kiwi,et al. Strength of two data encryption standard implementations under timing attacks , 1998, TSEC.