Power Analysis of Single-Rail Storage Elements as Used in MDPL
暂无分享,去创建一个
Christof Paar | Thomas Eisenbarth | Amir Moradi | Axel Poschmann | C. Paar | T. Eisenbarth | A. Moradi | A. Poschmann
[1] Daisuke Suzuki,et al. Security Evaluation of DPA Countermeasures Using Dual-Rail Pre-charge Logic Style , 2006, CHES.
[2] Daisuke Suzuki,et al. DPA Leakage Models for CMOS Logic Circuits , 2005, CHES.
[3] Stefan Mangard,et al. Side-Channel Leakage of Masked CMOS Gates , 2005, CT-RSA.
[4] Paul C. Kocher,et al. Differential Power Analysis , 1999, CRYPTO.
[5] Marc Joye,et al. Cryptographic Hardware and Embedded Systems - CHES 2004 , 2004, Lecture Notes in Computer Science.
[6] Berk Sunar,et al. Cryptographic Hardware and Embedded Systems - CHES 2005, 7th International Workshop, Edinburgh, UK, August 29 - September 1, 2005, Proceedings , 2005, CHES.
[7] Kil-Hyun Nam,et al. Information Security and Cryptology - ICISC 2007, 10th International Conference, Seoul, Korea, November 29-30, 2007, Proceedings , 2007, ICISC.
[8] Mitsuru Matsui,et al. Cryptographic Hardware and Embedded Systems - CHES 2006, 8th International Workshop, Yokohama, Japan, October 10-13, 2006, Proceedings , 2006, CHES.
[9] Stefan Mangard,et al. Practical Attacks on Masked Hardware , 2009, CT-RSA.
[10] Patrick Schaumont,et al. Changing the Odds Against Masked Logic , 2006, Selected Areas in Cryptography.
[11] Marc Fischlin,et al. Topics in Cryptology – CT-RSA 2009 , 2009 .
[12] David A. Wagner,et al. Towards Efficient Second-Order Power Analysis , 2004, CHES.
[13] Christophe Clavier,et al. Correlation Power Analysis with a Leakage Model , 2004, CHES.
[14] Stefan Mangard,et al. Masked Dual-Rail Pre-charge Logic: DPA-Resistance Without Routing Constraints , 2005, CHES.
[15] Aggelos Kiayias,et al. Polynomial Reconstruction Based Cryptography , 2001, Selected Areas in Cryptography.
[16] Ingrid Verbauwhede,et al. Place and Route for Secure Standard Cell Design , 2004, CARDIS.
[17] Thomas Zefferer,et al. Evaluation of the Masked Logic Style MDPL on a Prototype Chip , 2007, CHES.
[18] Alfred Menezes,et al. Topics in Cryptology – CT-RSA 2005 , 2005 .
[19] Amir Moradi,et al. Power Analysis Attacks on MDPL and DRSL Implementations , 2007, ICISC.
[20] Ingrid Verbauwhede,et al. Cryptographic Hardware and Embedded Systems - CHES 2007, 9th International Workshop, Vienna, Austria, September 10-13, 2007, Proceedings , 2007, CHES.
[21] Michael Wiener,et al. Advances in Cryptology — CRYPTO’ 99 , 1999 .
[22] Benedikt Gierlichs. DPA-Resistance Without Routing Constraints? , 2007, CHES.
[23] Patrick Schaumont,et al. Masking and Dual-Rail Logic Don't Add Up , 2007, CHES.
[24] Zhimin Chen,et al. Dual-Rail Random Switching Logic: A Countermeasure to Reduce Side Channel Leakage , 2006, CHES.
[25] Benedikt Gierlichs. DPA-Resistance Without Routing Constraints? - A Cautionary Note About MDPL Security - , 2007 .
[26] Stefan Mangard,et al. Power analysis attacks - revealing the secrets of smart cards , 2007 .
[27] I. Verbauwhede,et al. A dynamic and differential CMOS logic with signal independent power consumption to withstand differential power analysis on smart cards , 2002, Proceedings of the 28th European Solid-State Circuits Conference.
[28] Sylvain Guilley,et al. The "Backend Duplication" Method , 2005, CHES.
[29] Stefan Mangard,et al. Successfully Attacking Masked AES Hardware Implementations , 2005, CHES.
[30] Daisuke Suzuki,et al. Random Switching Logic: A New Countermeasure against DPA and Second-Order DPA at the Logic Level , 2007, IEICE Trans. Fundam. Electron. Commun. Comput. Sci..
[31] Ingrid Verbauwhede,et al. A logic level design methodology for a secure DPA resistant ASIC or FPGA implementation , 2004, Proceedings Design, Automation and Test in Europe Conference and Exhibition.