Towards a framework to perform DPA attack on GALS pipeline architectures
暂无分享,去创建一个
[1] Fernando Gehm Moraes,et al. A Robust Architectural Approach for Cryptographic Algorithms Using GALS Pipelines , 2011, IEEE Design & Test of Computers.
[2] Catherine H. Gebotys,et al. A countermeasure for EM attack of a wireless PDA , 2005, International Conference on Information Technology: Coding and Computing (ITCC'05) - Volume II.
[3] Máire O'Neill,et al. FPGA implementation and analysis of random delay insertion countermeasure against DPA , 2008, 2008 International Conference on Field-Programmable Technology.
[4] Akashi Satoh,et al. High-Resolution Side-Channel Attack Using Phase-Based Waveform Matching , 2006, CHES.
[5] Stefan Mangard,et al. Power analysis attacks - revealing the secrets of smart cards , 2007 .
[6] Y. V. Venkatesh,et al. On the uncertainty inequality as applied to discrete signals , 2006, Int. J. Math. Math. Sci..
[7] Denis Réal,et al. Defeating classical Hardware Countermeasures: a new processing for Side Channel Analysis , 2008, 2008 Design, Automation and Test in Europe.
[8] Sorin A. Huss,et al. On Clock Frequency Effects in Side Channel Attacks of Symmetric Block Ciphers , 2012, 2012 5th International Conference on New Technologies, Mobility and Security (NTMS).
[9] Bart Preneel,et al. Power Analysis of an FPGA: Implementation of Rijndael: Is Pipelining a DPA Countermeasure? , 2004, CHES.
[10] Jasper G. J. van Woudenberg,et al. Improving Differential Power Analysis by Elastic Alignment , 2011, CT-RSA.
[11] Sorin A. Huss,et al. A General Approach to Power Trace Alignment for the Assessment of Side-Channel Resistance of Hardened Cryptosystems , 2012, 2012 Eighth International Conference on Intelligent Information Hiding and Multimedia Signal Processing.
[12] Christophe Clavier,et al. Differential Power Analysis in the Presence of Hardware Countermeasures , 2000, CHES.
[13] Akashi Satoh,et al. DPA Using Phase-Based Waveform Matching against Random-Delay Countermeasure , 2007, 2007 IEEE International Symposium on Circuits and Systems.
[14] Arun K. Somani,et al. Countering Power Analysis Attacks UsingReliable and Aggressive Designs , 2014, IEEE Transactions on Computers.
[15] Christophe Clavier,et al. Correlation Power Analysis with a Leakage Model , 2004, CHES.
[16] J. Shynk. Frequency-domain and multirate adaptive filtering , 1992, IEEE Signal Processing Magazine.
[17] Siva Sai Yerubandi,et al. Differential Power Analysis , 2002 .
[18] Sylvain Guilley,et al. Novel Applications of Wavelet Transforms based Side-Channel Analysis , 2011 .